Search results for: dead zone protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4133

Search results for: dead zone protection

2123 A Practical Protection Method for Parallel Transmission-Lines Based on the Fault Travelling-Waves

Authors: Mohammad Reza Ebrahimi

Abstract:

In new restructured power systems, swift fault detection is very important. The parallel transmission-lines are vastly used in this kind of power systems because of high amount of energy transferring. In this paper, a method based on the comparison of two schemes, i.e., i) maximum magnitude of travelling-wave (TW) energy ii) the instants of maximum energy occurrence at the circuits of parallel transmission-line is proposed. Using the travelling-wave of fault in order to faulted line identification this method has noticeable operation time. Moreover, the algorithm can cover for identification of faults as external or internal faults. For an internal fault, the exact location of the fault can be estimated confidently. A lot of simulations have been done with PSCAD/EMTDC to verify the performance of the proposed algorithm.

Keywords: travelling-wave, maximum energy, parallel transmission-line, fault location

Procedia PDF Downloads 182
2122 National Defense and Armed Forces Development in the Member States of the Visegrad Group

Authors: E. Hronyecz

Abstract:

Guaranteeing the independence of the V4 Member States, the protection of their national values and their citizens, and the security of the Central and Eastern European region requires the development of military capabilities in terms of the capabilities of nations. As a result, European countries have begun developing capabilities and forces, within which nations are seeking to strengthen the capabilities of their armies and make their interoperability more effective. One aspect of this is the upgrading of military equipment, personnel equipment, and other human resources. Based on the author's preliminary researches - analyzing the scientific literature, the relevant statistical data and conducting of professional consultations with the experts of the research field – it can clearly claimed for all four states of Visegrad Group that a change of direction in the field of defense has been noticeable since the second half of the last decade. Collective defense came to the forefront again; the military training, professionalism, and radical modernization of technical equipment becoming crucial.

Keywords: armed forces, cooperation, development, Visegrad Group

Procedia PDF Downloads 129
2121 Sustainable Tourism at the Bedside of Local Development of a Rural Coastline Village: Taleza, Collo, Algeria

Authors: Sihem Ferah, Karima Messaoudi

Abstract:

Tourism is far from of being apprehended as a closed space limited to a defined area. The different experiences in the world have shown that tourism should be set up in the city, where locals can meet tourists, to know their history, tradition, culture, and relationship with the territory. In Algeria, the strategy employed in the context of promoting tourism is to integrate sustainable tourism based on a set of instruments such as the tourism expansion areas named ZET. Unfortunately, these areas have promoted the economic and environmental dimension, neglecting the social dimension which is the responsible of the community well–being. The case of Taleza village in Collo (characterized by its various potential) demonstrates clearly this paradox between the planned tourism in the ZET in Taleza as an economic product and the Tourism lived inside this local environment. When people by their genius and innovative action have succeeded to create an alternative tourism (social tourism) developed through guesthouses, sales of local products which have participated in promoting local Tourism Taleza. The aim of this research is to find a strong position between the planned space ZET and the village of Taleža where sustainable tourism can be installed that encourages the social membership, preservation of the natural heritage of Taleza and generates economic benefits that will ensure a local development of the village and will succeed in maintain sustainable tourism on its territory.

Keywords: sustainable tourism, local development, rural areas, tourism expansion zone

Procedia PDF Downloads 420
2120 The Nexus between Counter Terrorism and Human Rights with a Perspective on Cyber Terrorism

Authors: Allan Munyao Mukuki

Abstract:

The nexus between terrorism and human rights has become a big challenge in the fight against terrorism globally. This is hinged on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognised in the Vienna Declaration and Programme of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, terrorism constitutes an assault on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitisation’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then concludes with recommendations on how to balance counter-terrorism and human rights in the modern age.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation

Procedia PDF Downloads 397
2119 Strategy and Maze Surgery (Atrial fibrillation Surgery)

Authors: Shirin Jalili, Ramin Ghasemi Shayan

Abstract:

Atrial fibrillation is the foremost common arrhythmia around the world, with expanding recurrence famous with age. Thromboembolic occasions and strokes are the number one cause of mortality and morbidity. For patients who don't react to restorative treatment for rate and beat control, the maze method offers an elective treatment mediation. pharmaco-medical treatment for atrial fibrillation is pointed at the control of rate or cadence, intrusive treatment for atrial fibrillation is pointed at cadence control. An obtrusive approach may comprise of percutaneous catheter treatment, surgery, or a crossover approach. Since the maze method is recognized as the foremost successful way to dispense with AF, combining the maze strategy amid major cardiac surgeries has been received in clinical hone. the maze strategy, moreover known as Cox¬maze iii or the ‘cut¬and¬sew’ method, involves making different incisions within the atria to make an arrangement of scars that dispose of each potential zone of re¬entry. The electrical drive is constrained through a maze of scars that coordinates the electrical drive from the sinus node to the av node. By settling the headstrong period between ranges of scar, re¬entry is disposed of. in this article, we evaluate the Maze surgery method that's the surgical method of choice for the treatment of restorative atrial fibrillation.

Keywords: atrial fibrillation, congenital heart disease, procedure, maze surgery, treatment

Procedia PDF Downloads 135
2118 Seismic Active Zones and Mechanism of Earthquakes in Northern Egypt

Authors: Awad Hassoup, Sayed Abdallah, Mohamed Dahy

Abstract:

Northern Egypt is known to be seismically active from the past several thousand years, based on the historical records and documents of eyewitnesses on one- hand and instrumental records on the other hand. Instrumental, historical and pre- historical seismicity data indicate that large destructive earthquakes have occurred quite frequently in the investigated area. The interaction of the African, Arabian, Eurasian plates and Sinai sub-plate is the main factor behind the seismicity of northern part of Egypt. All earthquakes occur at shallow depth and are concentrated at four seismic zones, these zones including the Gulfs of Suez and Aqaba, around the entrance of the Gulf of Suez and the fourth one is located at the south- west of great Cairo (Dahshour area). The seismicity map of the previous zones shows that the activity is coincide with the major tectonic trends of the Suez rift, Aqaba rift with their connection with the great rift system of the Red Sea and Gulf of Suez- Cairo- Alexandria trend. On the other hand, the focal mechanisms of some earthquakes occurred inside the studied area and having small to moderate size show a variety of patterns. The most predominant type is normal faulting.

Keywords: Northern Egypt, seismic active zone, seismicity, focal mechanism

Procedia PDF Downloads 426
2117 Historic Fire Occurrence in Hemi-Boreal Forests: Exploring Natural and Cultural Scots Pine Multi-Cohort Fire Regimes in Lithuania

Authors: Charles Ruffner, Michael Manton, Gintautas Kibirkstis, Gediminas Brazaitas, Vitas Marozas, Ekaterine Makrickiene, Rutile Pukiene, Per Angelstam

Abstract:

In dynamic boreal forests, fire is an important natural disturbance, which drives regeneration and mortality of living and dead trees, and thus successional trajectories. However, current forest management practices focusing on wood production only have effectively eliminated fire as a stand-level disturbance. While this is generally well studied across much of Europe, in Lithuania, little is known about the historic fire regime and the role fire plays as a management tool towards the sustainable management of future landscapes. Focusing on Scots pine forests, we explore; i) the relevance of fire disturbance regimes on forestlands of Lithuania; ii) fire occurrence in the Dzukija landscape for dry upland and peatland forest sites, and iii) correlate tree-ring data with climate variables to ascertain climatic influences on growth and fire occurrence. We sampled and cross-dated 132 Scots pine samples with fire scars from 4 dry pine forest stands and 4 peatland forest stands, respectively. The fire history of each sample was analyzed using standard dendrochronological methods and presented in FHAES format. Analyses of soil moisture and nutrient conditions revealed a strong probability of finding forests that have a high fire frequency in Scots pine forests (59%), which cover 34.5% of Lithuania’s current forestland. The fire history analysis revealed 455 fire scars and 213 fire events during the period 1742-2019. Within the Dzukija landscape, the mean fire interval was 4.3 years for the dry Scots pine forest and 8.7 years for the peatland Scots pine forest. However, our comparison of fire frequency before and after 1950 shows a marked decrease in mean fire interval. Our data suggest that hemi-boreal forest landscapes of Lithuania provide strong evidence that fire, both human and lightning-ignited fires, has been and should be a natural phenomenon and that the examination of biological archives can be used to guide sustainable forest management into the future. Currently, fire use is prohibited by law as a tool for forest management in Lithuania. We recommend introducing trials that use low-intensity prescribed burning of Scots pine stands as a regeneration tool towards mimicking natural forest disturbance regimes.

Keywords: biodiversity conservation, cultural burning, dendrochronology, forest dynamics, forest management, succession

Procedia PDF Downloads 197
2116 Management of Intellectual Property Rights: Strategic Patenting

Authors: Waheed Oseni

Abstract:

This article reviews emergent global trends in intellectual property protection and identifies patenting as a strategic initiative. Recent developments in software and method of doing business patenting are fast transforming the e‐business landscape. The article discusses the emergent global regulatory framework concerning intellectual property rights and the strategic value of patenting. Important features of a corporate patenting portfolio are described. Superficially, the e‐commerce landscape appears to be dominated by dotcom start-ups or the “dotcomization” of existing brick and mortar companies. But, in reality, at its very bedrock is intellectual property (IP). In this connection, the recent avalanche of patenting of software and method‐of‐doing‐business (MDB) in the USA is a very significant development with regard to rules governing IP rights and, therefore, e‐commerce. Together with the World Trade Organization’s (WTO) IP rules, there is an emerging global regulatory framework for IP rights, an understanding of which is necessary for designing effective e‐commerce strategies.

Keywords: intellectual property, patents, methods, computer software

Procedia PDF Downloads 523
2115 Ethical Framework in Organ Transplantation and the Priority Line between Law and Life

Authors: Abel Sichinava

Abstract:

The need for organ transplantation is vigorously increasing worldwide. The numbers on the waiting lists grow, but the number of donors is not keeping up with the demand even though there is a legal possibility of decreasing the gap between the demand and supply. Most countries around the globe are facing an organ donation problem (living or deceased); however, the extent of the problem differs based on how well developed a country is. The determining issues seem to be centered on how aware the society is about the concept of organ donation, as well as cultural and religious factors. Even if people are aware of the benefits of organ donation, they may still have fears that keep them from being in complete agreement with the idea. Some believe that in the case of deceased organ donation: “the brain dead human body may recover from its injuries” or “the sick might get less appropriate treatment if doctors know they are potential donors.” In the case of living organ donations, people sometimes fear that after the donation, “it might reduce work efficiency, cause health deterioration or even death.” Another major obstacle in the organ shortage is a lack of a well developed ethical framework. In reality, there are truly an immense number of people on the waiting list, and they have only two options in order to receive a suitable organ. First is the legal way, which is to wait until their turn. Sadly, numerous patients die while on the waiting list before an appropriate organ becomes available for transplant. The second option is an illegal way: seeking an organ in a country where they can possibly get. To tell the truth, in people’s desire to live, they may choose the second option if their resources are sufficient. This process automatically involves “organ brokers.” These are people who get organs from vulnerable poor people by force or betrayal. As mentioned earlier, the high demand and low supply leads to human trafficking. The subject of the study was the large number of society from different backgrounds of their belief, culture, nationality, level of education, socio-economic status. The great majority of them interviewed online used “Google Drive Survey” and others in person. All statistics and information gathered from trusted sources annotated in the reference list and above mentioned considerable testimonies shared by the respondents are the fundamental evidence of a lack of the well developed ethical framework. In conclusion, the continuously increasing number of people on the waiting list and an irrelevant ethical framework, lead people to commit to atrocious, dehumanizing crimes. Therefore, world society should be equally obligated to think carefully and make vital decisions together for the advancement of an organ donations and its ethical framework.

Keywords: donation, ethical framwork, organ, transplant

Procedia PDF Downloads 146
2114 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 329
2113 Assessment of Compost Usage Quality and Quality for Agricultural Use: A Case Study of Hebron District, Palestine

Authors: Mohammed A. A. Sarhan, Issam A. Al-Khatib

Abstract:

Complying with the technical specifications of compost production is of high importance not only for environmental protection but also for increasing the productivity and promotion of compost use by farmers in agriculture. This study focuses on the compost quality of the Palestinian market and farmers’ attitudes toward agricultural use of compost. The quality is assessed through selection of 20 compost samples of different suppliers and producers and lab testing for quality parameters, while the farmers’ attitudes to compost use for agriculture are evaluated through survey questionnaire of 321 farmers in the Hebron area. The results showed that the compost in the Palestinian markets is of medium quality due to partial or non-compliance with the quality standards and guidelines. The Palestinian farmers showed a positive attitude since 91.2% of them have the desire to use compost in agriculture. The results also showed that knowledge of difference between compost and chemical fertilizers, perception of compost benefits and previously experiencing problems in compost use, are significant factors affecting the farmers’ attitude toward the use of compost as an organic fertilizer.

Keywords: attitude, compost, compost quality, organic fertilizer, manure

Procedia PDF Downloads 165
2112 Experimental and Theoretical Analysis of the Electromagnetic Environment in the Vicinity of Two 220Kv Power Lines

Authors: Wafa Tourab, Abdessalem Babouri, Mohamed Nemamcha

Abstract:

This work presents an experimental and theoretical characterization of electromagnetic environment in the vicinity of EL-HADJAR high voltage substation located in the eastern Algerian within a very high populated zone. There have been analyses on the effects of electromagnetic fields emanating from coupled multi-lines power systems on the health of the workers and people living in proximity of substations. An experimental investigation has been conducted around a circuit of two 220Kv lines running in parallel. The experimental results are validated by a flexible code of calculus developed in the environment Matlab. The implications of the results are discussed and are in very good agreement with the ICNIRP reference levels for occupational and non-occupational exposures. In a case of study, the separation between the two structures “S” is varied to demonstrate its influence on the electric and magnetic charges quantities generated by the circuit of lines proposed. It is found that increasing S decreases the electric and magnetic fields which occur at the center of the structure then reduces the coupling between lines. We concluded that the evaluation of the spacing between the phase conductors is of paramount interest in the preparation of the line’s implantation inside the electrical posts to reduce them radiations in the environment.

Keywords: low frequency, electromagnetic fields, electromagnetic coupling, high voltage power lines

Procedia PDF Downloads 386
2111 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 86
2110 The Effect of Work Site Dangers on the Management of Construction Projects in Syria

Authors: Mohammed Aljoma, Eblal Zakzok

Abstract:

Safety is a science that seeks to protect and avoid humans from risks in any field and prevent losses in properties and lives as much as possible. On the other hand, occupational safety goals aim to protect workers from risks which can occur during work execution. The main purpose of occupational safety is to ultimately protect people, properties and the environment by reducing accidents and injuries that may cause losses and damages. To achieve this goal, we must remove the direct and indirect reasons which cause accidents and injuries; some of the reasons of accidents are the unsafe cases and inept behavior or both of them. This research focuses on the manner of providing instant protection from the very first beginning to people, properties and the environment by: -Inserting safety demands in the planning and designing works by identifying risk levels in every task of the project, -Using a new risk managing system or modifying or changing a previously-used one.

Keywords: planning, scheduling, risk management, project duration, site safety

Procedia PDF Downloads 295
2109 Anonymity and Irreplaceability: Gross Anatomical Practices in Japanese Medical Education

Authors: Ayami Umemura

Abstract:

Without exception, all the bodies dissected in the gross anatomical practices are bodies that have lived irreplaceable lives, laughing and talking with family and friends. While medical education aims to cultivate medical knowledge that is universally applicable to all human bodies, it relies on a unique, irreplaceable, and singular entity. In this presentation, we will explore the ``irreplaceable relationship'' that is cultivated between medical students and anonymous cadavers during gross anatomical practices, drawing on Emmanuel Levinas's ``ethics of the face'' and Martin Buber's discussion of “I-Thou.'' Through this, we aim to present ``a different ethic'' that emerges only in the context of face-to-face relationships, which differs from the generalized, institutionalized, mass-produced ethics like seen in so-called ``ethics codes.'' Since the 1990s, there has been a movement around the world to use gross anatomical practices as an "educational tool" for medical professionalism and medical ethics, and some educational institutions have started disclosing the actual names, occupations, and places of birth of corpses to medical students. These efforts have also been criticized because they lack medical calmness. In any case, the issue here is that this information is all about the past that medical students never know directly. The critical fact that medical students are building relationships from scratch and spending precious time together without any information about the corpses before death is overlooked. Amid gross anatomical practices, a medical student is exposed to anonymous cadavers with faces and touching and feeling them. In this presentation, we will examine a collection of essays written by medical students on gross anatomical practices collected by the Japanese Association for Volunteer Body Donation from medical students across the country since 1978. There, we see the students calling out to the corpse, being called out to, being encouraged, superimposing the carcasses on their own immediate family, regretting parting, and shedding tears. Then, medical students can be seen addressing the dead body in the second person singular, “you.” These behaviors reveal an irreplaceable relationship between the anonymous cadavers and the medical students. The moment they become involved in an irreplaceable relationship between “I and you,” an accidental and anonymous encounter becomes inevitable. When medical students notice being the inevitable takers of voluntary and addressless gifts, they pledge to become “Good Doctors” owing the anonymous persons. This presentation aims to present “a different ethic” based on uniqueness and irreplaceability that comes from the faces of the others embedded in each context, which is different from “routine” and “institutionalized” ethics. That can only be realized ``because of anonymity''.

Keywords: anonymity, irreplaceability, uniqueness, singularlity, emanuel levinas, martin buber, alain badiou, medical education

Procedia PDF Downloads 58
2108 Increasing Abundance of Jellyfish in the Shorelines of Bangladesh: Analyzing the Policy Framework for Facing the Challenges

Authors: Md Mizanur Rahman, M. Aslam Alam, Muhammad Abu Yusuf

Abstract:

The abundance of Jellyfish across the coasts of the Bay of Bengal is increasing sharply due to marine pollution, increased sea acidification and climate change. Jellyfish draws our attention to address the local and global stressors. This also indicates that something wrong is happening in this bay behind the scenes. This study aimed to investigate how the policy framework governing the sea can be reformed. To do so, this study evaluated the existing policy, regulatory and institutional framework. Empirical data were collected from the middle coastal zone of Bangladesh. The secondary literature on policy, legal documents, and institutional arrangements were reviewed. The causes of poor coordination among different public sectors and non-compliance of laws were identified. The key findings show that despite the existing of Department of Environment, poor coordination with other departments, and lack of logistics and technical staffs have resulted in severe marine pollution and degradation of coastal and marine living resources. The existing policies had no monitoring and evaluation mechanisms. Non-compliance of the existing laws has been fueling the problems. This study provides an integrated policy and a guideline for updating the legal and institutional mechanism to manage coastal and marine living resources sustainably in Bangladesh to achieve Sustainable Development Goal 14.

Keywords: legal, institutional, framework, jellyfish

Procedia PDF Downloads 120
2107 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 413
2106 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic

Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato

Abstract:

Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.

Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security

Procedia PDF Downloads 361
2105 Comparative Study of Concrete Filled Steel I-Girder Bridge with Conventional Type of Bridge

Authors: Waheed Ahmad Safi, Shunichi Nakamura, Abdul Habib Ghaforzai

Abstract:

Steel and concrete composite bridge with concrete filled steel I-girder (CFIG) was proposed and FEM and laboratory tests were conducted to analysis bending and shear behavior. The proposed form of structural steel I-section is mainly used at the intermediate support zone by placing infilled concrete into the top and bottom flanges of steel I-section to resist negative bending moment. The bending and shear tests were carried out to find out the significance of CFIG section. The result for test showing that the bending and shear capacity of proposed CFIG is at least 3 times and 2 times greater than conventional steel I-section (IG) respectively. Finite element study was also carried out to ensure the result for laboratory tests due to bending and shear behavior and load transfer behavior of proposed structural form. Finite element result result agreed the test result. A design example was carried out for a four-span continuous highway bridge and design method was established.

Keywords: bending strength, concrete filled steel I-girder, steel I-girder, FEM, limit states design and shear strength

Procedia PDF Downloads 124
2104 Thermal Performance of Dual Flame Impinging Normally on to a Flat Surface

Authors: Satpal Singh, Subhash Chander

Abstract:

An experimental study has been conducted to evaluate the thermal performance of the CNG/air dual flame impinging normally on to a flat surface. The stability limits for the dual flame under both impinging and free conditions have been evaluated to select experimental operating range. Dual flame shape and structure have been explained with direct flame image and schematic diagram indicating modification in recirculation zone in presence of inner flame. Effects of various operating parameters like H/Dh, Re(o), Φ(o), and θ(o) on heat transfer characteristics have been discussed. Inner non-swirling flame Reynolds number (Re(i)) and equivalence ratio (Φ(i)) were kept constant. Heating patterns in the impingement region around the stagnation point have been altered significantly with change in the values of H/Dh, Re(o), Φ(o), and θ(o). The axial flow of inner flame has been notably effected with increase in Re(o). Heating was most favorable near stoichiometeric conditions of the outer swirling flame. However, the effect of change in swirl intensity (expressed in terms of θ(o)) on overall heat transfer efficiency was not as significant as in the case of other parameters. It has been inferred that best performance (higher uniformity and efficiency) of the dual flame impinging on a flat surface can be achieved at moderate value of separation distance (H/Dh of 2-3) and outer swirling flame Reynolds number (Re(o) of 7000-9000) under stoichiometeric conditions.

Keywords: dual flame, heat transfer, impingement, swirling insert, transmission efficiency

Procedia PDF Downloads 296
2103 The Antecedents That Effect to the Adventure Tourism in Krabi, Thailand

Authors: Autjira Songjan, Vimolsri Sansuk

Abstract:

The research aim to study the possible negative environmental impact by adventure tourism in Krabi, Thailand, which is a popular destination for adventure tourism. The research is carried out through quantitative and qualitative methods. Questionnaires are distributed to 400 adventure tourists: 160 Thai and 240 international tourists. Questions involved experiences and opinions towards the environment and certain practices which influence a protection or degradation of environment from tour guides, tour operators and tourists. Furthermore, in-depth interviews were carried out with 21 adventure tour operators operating 5 main adventure tours. The finding shows the various types of adventure activities in Krabi involve different kinds of nature, therefore the characteristics of the different adventure activities are likely to affect the physical environment in different level. Kayaking tours are managed inside the mangrove forests, and may lead to negative impact on the ecosystem of mangroves, through loud noise, pulling out the mangrove population.

Keywords: adventure activities, Krabi province in Thailand, physical environment, adventure tourism

Procedia PDF Downloads 264
2102 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication

Authors: Farhan A. Alenizi

Abstract:

Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.

Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing

Procedia PDF Downloads 157
2101 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 76
2100 Assessing Flood Risk and Mapping Inundation Zones in the Kelantan River Basin: A Hydrodynamic Modeling Approach

Authors: Fatemehsadat Mortazavizadeh, Amin Dehghani, Majid Mirzaei, Nurulhuda Binti Mohammad Ramli, Adnan Dehghani

Abstract:

Flood is Malaysia's most common and serious natural disaster. Kelantan River Basin is a tropical basin that experiences a rainy season during North-East Monsoon from November to March. It is also one of the hardest hit areas in Peninsular Malaysia during the heavy monsoon rainfall. Considering the consequences of the flood events, it is essential to develop the flood inundation map as part of the mitigation approach. In this study, the delineation of flood inundation zone in the area of Kelantan River basin using a hydrodynamic model is done by HEC-RAS, QGIS and ArcMap. The streamflow data has been generated with the weather generator based on the observation data. Then, the data is statistically analyzed with the Extreme Value (EV1) method for 2-, 5-, 25-, 50- and 100-year return periods. The minimum depth, maximum depth, mean depth, and the standard deviation of all the scenarios, including the OBS, are observed and analyzed. Based on the results, generally, the value of the data increases with the return period for all the scenarios. However, there are certain scenarios that have different results, which not all the data obtained are increasing with the return period. Besides, OBS data resulted in the middle range within Scenario 1 to Scenario 40.

Keywords: flood inundation, kelantan river basin, hydrodynamic model, extreme value analysis

Procedia PDF Downloads 67
2099 Optical Bands Splitting in Tm₃Fe₅O₁₂ Thin Films

Authors: R. Vidyasagar, G. L. S. Vilela, B. M. Guiraldelli, A. B. Henriques, J. Moodera

Abstract:

Nano-scaled magnetic systems that can have both magnetic and optical transitions controlled and manipulated by external means have received enormous research attention for their potential applications in magneto-optics and spintronic devices. Among several ferrimagnetic insulators, the Tm₃Fe₅O₁₂ (TmIG) has become a prototype material displaying huge perpendicular magnetic anisotropy. Nevertheless, the optical properties of nano-scale TnIG films have not yet been investigated. We report the observation of giant splitting in the optical transitions of high-quality thin films of Tm₃Fe₅O₁₂ (TmIG) grown by rf sputtering on gadolinium gallium garnet substrates (GGG-111) substrate. The optical absorbance profiles measured with optical absorption spectroscopy show a dual optical transition in visible frequency regimes attributed to the transitions of electrons from the O-2p valence band to the Fe-3d conduction band and from the O-2p valence band to the Fe-2p⁵3d⁶ excitonic states at the Γ-symmetric point of the TmIG Brillouin zone. When the thickness of the film is reduced from 120 nm to 7.5 nm, the 1st optical transition energy shifted from 2.98 to 3.11 eV ( ~130 meV), and the 2nd transition energy shifted from 2.62 to 2.56 eV (~ 60 meV). The giant band splitting of both transitions can be attributed to the population of excited states associated with the atomic modification pertaining to the compressive or tensile strains.

Keywords: optical transitions, thin films, ferrimagnetic insulator, strains

Procedia PDF Downloads 42
2098 Diagnostic and Analysis of the Performance of Freight Transportation on Urban Logistics System in the City of Sfax

Authors: Tarak Barhoumi, Younes Boujelbene

Abstract:

Nowadays, the problems of freight transport pose logistical constraints on the urban system in the city. The aim of this article is to gain a better understanding of the interactions between local traffic and interurban traffic on the one hand and between the location system and the transport system on the other hand. Thus, in a simulation and analysis approach cannot be restricted to the only transport system. The proposed approach is based on an assessment of the impact of freight transport, which is closely linked to the diagnostic method, based on two surveys carried out on the territory of the urban community of Sfax. These surveys are based on two main components 'establishment component' first and 'driver component' second. The results propose a reorganization of freight transport in the city of Sfax. First, an orientation of the heavy goods vehicles traffic towards the major axes of transport namely the ring roads (ring road N° 2, ring road N° 4 and ring road N° 11) and the penetrating news of the city. Then, the implementation of a retail goods delivery policy and the strengthening of logistics in the city. The creation of a logistics zone at the ring road N° 11 where various modes of freight transport meet, in order to decongest the roads of heavy goods traffic, reduce the cost of transport and thus improve the competitiveness of the economy regional.

Keywords: urban logistics systems, transport freight, diagnostics, evaluation

Procedia PDF Downloads 159
2097 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria

Authors: Akachi Odoemene

Abstract:

There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.

Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria

Procedia PDF Downloads 249
2096 Phytochemial Screening, Anti-Microbial and Mineral Determination of Brysocarpus coccineus Root

Authors: I. L. Ibrahim, A. Mann, A. Ndanaimi

Abstract:

The research involved phytochemical screening, antibacterial activities and mineral determination by flame photometry of the crude extract of Brysocarpus coccineus schum indeed were carried out. The result of Phytochemical screening reveal tha saponins, alkaloids, cardiac glycosides, and anthraquinones were present. This suggests that the plant extract could be used as anti-inflammatory and anti-bleeding agents. Estimation of mineral content shows that the crude extract of B. coccineus contains 0.73 (Na+), 1.06 (K+) and 1.98 (Ca+) which justifies its use to be safe for hypertensive patients and could be used to lower blood pressure. The antibacterial properties of aqueous and ethanol extract were studied against some bacteria; pseudomonas aeruginosa, Escherichia coli, Bacilus subtilis, Klebsilla penmuoniae by disc diffusion method. The aqueous extract showed significant activity against the organisms while the ethanol at concentrations 5-10mg/ml ethanol extract showed significant zone of inhibition against the organisms, E. coli, (19 mm), B. cereus (12 mm), P. aeruginosa (11 mm), K. pnemuoniae (11 mm). Minimum inhibitory concentration (MIC) was carried with considerable effect of inhibition on the organisms. The MIC values observed were 1, 24, 16 and 19 mm against E. coli, B. cereus, P. aeruginosa and K. pnemuoniae respectively. Therefore, the plant could be a potential source of antibacterial agent although more pharmacological and clinical study may be recommended.

Keywords: phytochemicals, microorganisms, screenings, mineral ions

Procedia PDF Downloads 410
2095 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS

Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili

Abstract:

Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.

Keywords: construction, debris flow, geoinformatics systems, program RAMMS

Procedia PDF Downloads 140
2094 Development of a Vacuum System for Orthopedic Drilling Processes and Determination of Optimal Processing Parameters for Temperature Control

Authors: Kadir Gök

Abstract:

In this study, a vacuum system was developed for orthopedic drilling processes, and the most efficient processing parameters were determined using statistical analysis of temperature rise. A reverse engineering technique was used to obtain a 3D model of the chip vacuum system, and the obtained point cloud data was transferred to Solidworks software in STL format. An experimental design method was performed by selecting different parameters and their levels, such as RPM, feed rate, and drill bit diameter, to determine the most efficient processing parameters in temperature rise using ANOVA. Additionally, the bone chip-vacuum device was developed and performed successfully to collect the whole chips and fragments in the bone drilling experimental tests, and the chip-collecting device was found to be useful in removing overheating from the drilling zone. The effects of processing parameters on the temperature levels during the chip-vacuuming were determined, and it was found that bone chips and fractures can be used as autograft and allograft for tissue engineering. Overall, this study provides significant insights into the development of a vacuum system for orthopedic drilling processes and the use of bone chips and fractures in tissue engineering applications.

Keywords: vacuum system, orthopedic drilling, temperature rise, bone chips

Procedia PDF Downloads 89