Search results for: internal and external network
8277 Geochemical Characterization of Geothermal Waters in Albania, Preliminary Results
Authors: Aurela Jahja, Katarzyna Wątor, Arjan Beqiraj, Piotr Rusiniak, Nevton Kodhelaj
Abstract:
Albanian geological terrains represent an important node of the Alpine – Mediterranean mountain belt and are divided into several predominantly NNW - SSE striking geotectonic units, which, based on the presence or lack of Cretaceous transgression and magmatic rocks, belong to Internal or External Albanides. The internal (Korabi, Mirdita and Gashi) units are characterized by the Lower Cretaceous discordance and the presence of abundant magmatic rocks whereas in the external (Alps, Krasta-Cukali, Kruja, Ionian, Sazani and Peri Adriatic Depression) units an almost continuous sedimentation from Triassic to Paleogene is evidenced. The internal and external units show relevant differences in both geothermal and heat flow density values. The gradient values vary from 15-21.3 to 36 mK/m, while the heat flow density ranges from 42 to 60 mW/m2, in the external (Preadriatic Depression) and internal (ophiolitic belt) units, respectively. The geothermal fluids, which are found in natural springs and deep oil wells of Albania, are located in four thermo-mineral provinces: a) Peshkopi (Korabi) province; b) Kruja province; c) Preadriatic basin province, and d) South Ionian province. Thirteen geothermal waters were sampled from 11 natural springs and 2 deep wells, of which 6 springs and 2 wells from Kruja, 1 spring from Peshkopia, 2 springs from Preadriatic basin and 2 springs South Ionian province. Temperature, pH and Electrical Conductivity were measured in situ, while in laboratory were analyzed by ICP method major anions and cations and several trace elements (B, Li, Sr, Rb, I, Br, etc.). The measured values of temperature, pH and electrical conductivity range within 17-63°C, 6.26-7.92 and 724- 26856µS/cm intervals, respectively. The chemical type of the Albania thermal waters is variable. In the Kruja province prevail the Cl-SO4-NaCa and Cl-Na-Ca water types; while SO4-Ca, HCO3-Ca and Cl-HCO3-Na-Ca, and Cl-Na are found in the provinces of Peshkopi, Ionian and Preadriatic basin, respectively. In the Cl-SO4-HCO3 triangular diagram most of the geothermal waters are close to the chloride corner that belong to “mature waters”, typical of geothermal deep and hot fluids. Only samples from the Ionian province are located within the region of high bicarbonate concentration and they can be classified as peripheral waters that may have mixed with cold groundwater. In the Na-Ca-Mg and Na-K-Mg triangular diagram the majority of waters fall in the corner of sodium, suggesting that their cation ratios are controlled by mineral-solution equilibrium. There is a linear relationship between Cl and B which indicates the mixing of geothermal water with cold water, where the low-chlorine thermal waters from Ionian basin and Preadriatic depression provinces are distinguished by high-chlorine thermal waters from Kruja province. The Cl/Br molar ration of the thermal waters from Kruja province ranges from 1000 to 2660 and separates them from the thermal waters of Ionian basin and Preadriatic depression provinces having Cl/Br molar ratio lower than 650. The apparent increase of Cl/Br molar ratio that correlates with the increasing of the chloride, is probably related with dissolution of the Halite.Keywords: geothermal fluids, geotectonic units, natural springs, deep wells, mature waters, peripheral waters
Procedia PDF Downloads 2178276 Understanding and Improving Neural Network Weight Initialization
Authors: Diego Aguirre, Olac Fuentes
Abstract:
In this paper, we present a taxonomy of weight initialization schemes used in deep learning. We survey the most representative techniques in each class and compare them in terms of overhead cost, convergence rate, and applicability. We also introduce a new weight initialization scheme. In this technique, we perform an initial feedforward pass through the network using an initialization mini-batch. Using statistics obtained from this pass, we initialize the weights of the network, so the following properties are met: 1) weight matrices are orthogonal; 2) ReLU layers produce a predetermined number of non-zero activations; 3) the output produced by each internal layer has a unit variance; 4) weights in the last layer are chosen to minimize the error in the initial mini-batch. We evaluate our method on three popular architectures, and a faster converge rates are achieved on the MNIST, CIFAR-10/100, and ImageNet datasets when compared to state-of-the-art initialization techniques.Keywords: deep learning, image classification, supervised learning, weight initialization
Procedia PDF Downloads 1348275 A Practical Protection Method for Parallel Transmission-Lines Based on the Fault Travelling-Waves
Authors: Mohammad Reza Ebrahimi
Abstract:
In new restructured power systems, swift fault detection is very important. The parallel transmission-lines are vastly used in this kind of power systems because of high amount of energy transferring. In this paper, a method based on the comparison of two schemes, i.e., i) maximum magnitude of travelling-wave (TW) energy ii) the instants of maximum energy occurrence at the circuits of parallel transmission-line is proposed. Using the travelling-wave of fault in order to faulted line identification this method has noticeable operation time. Moreover, the algorithm can cover for identification of faults as external or internal faults. For an internal fault, the exact location of the fault can be estimated confidently. A lot of simulations have been done with PSCAD/EMTDC to verify the performance of the proposed algorithm.Keywords: travelling-wave, maximum energy, parallel transmission-line, fault location
Procedia PDF Downloads 1848274 Packaging in the Design Synthesis of Novel Aircraft Configuration
Authors: Paul Okonkwo, Howard Smith
Abstract:
A study to estimate the size of the cabin and major aircraft components as well as detect and avoid interference between internally placed components and the external surface, during the conceptual design synthesis and optimisation to explore the design space of a BWB, was conducted. Sizing of components follows the Bradley cabin sizing and rubber engine scaling procedures to size the cabin and engine respectively. The interference detection and avoidance algorithm relies on the ability of the Class Shape Transform parameterisation technique to generate polynomial functions of the surfaces of a BWB aircraft configuration from the sizes of the cabin and internal objects using few variables. Interference detection is essential in packaging of non-conventional configuration like the BWB because of the non-uniform airfoil-shaped sections and resultant varying internal space. The unique configuration increases the need for a methodology to prevent objects from being placed in locations that do not sufficiently enclose them within the geometry.Keywords: packaging, optimisation, BWB, parameterisation, aircraft conceptual design
Procedia PDF Downloads 4628273 Legal Responsibility of the External Auditor Qualitative Case Study of Libyan Environment
Authors: Bubaker F. Shareia
Abstract:
The aim of this paper is to determine a general frame of the auditor's legal responsibilities in Libya which were implied in professional codes and rules, these codes and rules were concerned with the auditor's rights and duties in conducting his professional duties. This will provide a background for the Libyan accounting profession, and the challenges in tailoring Auditors to meet third party's needs. Being informed of the kinds of legal responsibilities which the external auditors could face during conducting their duties. The study is based on a literature review and archival research, reinforced by a qualitative case study comprised of interviews, questionnaire and a study of internal documents. To reach such an understanding, the researcher designed two questionnaires for collecting the data. One questionnaire was distributed among the certified public accountant firms in Libya and the second was distributed among a group of randomly selected lawyers and judges in the same country. Most auditors agreed upon the determination of their responsibilities toward the state and they emphasized that their responsibilities toward their clients were limited to the accepted standards of auditing. Moreover, all auditors who were surveyed emphasized that there has never been any juridical claims against them, and as a consequence they have never paid any legal fines. This study focuses on one country, which does limit its generalisability. However, it also suggests fruitful research areas in considering the impact and challenge of the historic factors in the accounting profession in emerging economies.Keywords: accounting, external auditor, legal responsibilities, libyan accounting profession
Procedia PDF Downloads 1478272 Motivation and Efficiency of Quality Management Systems Implementation: A Study of Kosovo Organizations
Authors: Naim Ismajli, Ilir Rexhepi
Abstract:
The article presents the results of the study about the motives and efficiency of quality management system (Quality System, QS) implementation in Kosovo companies. The main purpose of the study was to find out why Kosovo companies seek the implementation and certification of QS in accordance with the requirements of the ISO 9001 series of the standards and what has changed after the QS implementation. Furthermore, the results of the research were compared with similar performed in the other European countries. The performed research revealed that the implementation of QS mostly results in the benefits of an intangible nature that are internal to the company. In addition, although the main reasons to start implementing QS are the expectations of the external advantages, the implementation results mostly in the increase of the internal benefits such as an improvement in the definition of the responsibilities and obligations of the employees, a decrease in the nonconformities, better communication among the employees, and increased efficiency.Keywords: quality management systems, ISO 9001, total quality management, environmental management system, ISO 14000, competitiveness, efciency
Procedia PDF Downloads 3648271 Killing for the Great Peace: An Internal Perspective on the Anti-Manchu Theme in the Taiping Movement
Authors: Zihao He
Abstract:
The majority of existing studies on the Taiping Movement (1851-1864) viewed their anti-Manchu attitudes as nationalist agendas: Taiping was aimed at revolting against the Manchu government and establishing a new political regime. To explain these aggressive and violent attitudes towards Manchu, these studies mainly found socio-economic factors and stressed the status of “being deprived”. Even the ‘demon-slaying’ narrative of the Taiping to dehumanize the Manchu tends to be viewed as a “religious tool” to achieve their political, nationalist aim. This paper argues that these studies on Taiping’s anti-Manchu attitudes and behaviors are analyzed from an external angle and have two major problems. Firstly, they distinguished “religion” from “nationalist” or “political”, focusing on the “political” nature of the movement. “Religion” and the religious experience within Taiping were largely ignored. This paper argues that there was no separable and independent “religion” in the Taiping Movement, as opposed to secular, nationalist politics. Secondly, these analyses held an external perspective on Taiping’s anti-Manchu agenda. Demonizing and killing Manchu were viewed as purely political actions. On the contrary, this paper focuses on the internal perspective of anti-Manchu narratives in the Taiping Movement. The method of this paper is mainly textual analysis, focusing on the official documents, edicts, and proclamations of the Taiping movement. It views the writing of the Taiping as a coherent narrative and rhetoric, which was attractive and convincing for its followers. In terms of the main findings, firstly, internal and external perspectives on anti-Manchu violence are different. Externally, violence was viewed as a tool and necessary process to achieve the political goal. However, internally speaking, in Taiping’s writing, violence was a result of Godlessness, which would be solved as far as the faith in God is restored in China. Having a framework of universal love among human beings as sons and daughters of the Heavenly Father and killing was forbidden, the Taiping excluded Manchus from the family of human beings and demonized them. “Demon-slaying” was not violence. It was constructed as a necessary process to achieve the Great Peace. Moreover, Taiping’s anti-Manchu violence was not merely “political.” Rather, the category “religion” and its binary opposition, “secular,” is not suitable for Taiping. A key point related to this argument is the revolutionary violence against the Manchu government, which inherited the traditional “Heavenly Mandate” model. From an internal, theological perspective, anti-Manchu was ordained and commanded by the Heavenly Father. Manchu, as a regime, was standing as a hindrance in the path toward God. Besides, Manchu was not only viewed as a regime, but they were also “demons.” Therefore, the paper examines how Manchus were dehumanized in Taiping’s writings and were situated outside of the consideration of nonviolent and love. Manchu as a regime and Manchu as demons are in a dynamic relationship. As a regime, the Manchu government was preventing Chinese people from worshipping the Heavenly Father, so they were demonized. As they were demons, killing Manchus during the revolt was justified and not viewed as being contradicted the universal love among human beings.Keywords: anti-manchu, demon-slaying, heavenly mandate, religion and violence, the taiping movement.
Procedia PDF Downloads 678270 21st Century Business Dynamics: Acting Local and Thinking Global through Extensive Business Reporting Language (XBRL)
Authors: Samuel Faboyede, Obiamaka Nwobu, Samuel Fakile, Dickson Mukoro
Abstract:
In the present dynamic business environment of corporate governance and regulations, financial reporting is an inevitable and extremely significant process for every business enterprise. Several financial elements such as Annual Reports, Quarterly Reports, ad-hoc filing, and other statutory/regulatory reports provide vital information to the investors and regulators, and establish trust and rapport between the internal and external stakeholders of an organization. Investors today are very demanding, and emphasize greatly on authenticity, accuracy, and reliability of financial data. For many companies, the Internet plays a key role in communicating business information, internally to management and externally to stakeholders. Despite high prominence being attached to external reporting, it is disconnected in most companies, who generate their external financial documents manually, resulting in high degree of errors and prolonged cycle times. Chief Executive Officers and Chief Financial Officers are increasingly susceptible to endorsing error-laden reports, late filing of reports, and non-compliance with regulatory acts. There is a lack of common platform to manage the sensitive information – internally and externally – in financial reports. The Internet financial reporting language known as eXtensible Business Reporting Language (XBRL) continues to develop in the face of challenges and has now reached the point where much of its promised benefits are available. This paper looks at the emergence of this revolutionary twenty-first century language of digital reporting. It posits that today, the world is on the brink of an Internet revolution that will redefine the ‘business reporting’ paradigm. The new Internet technology, eXtensible Business Reporting Language (XBRL), is already being deployed and used across the world. It finds that XBRL is an eXtensible Markup Language (XML) based information format that places self-describing tags around discrete pieces of business information. Once tags are assigned, it is possible to extract only desired information, rather than having to download or print an entire document. XBRL is platform-independent and it will work on any current or recent-year operating system, or any computer and interface with virtually any software. The paper concludes that corporate stakeholders and the government cannot afford to ignore the XBRL. It therefore recommends that all must act locally and think globally now via the adoption of XBRL that is changing the face of worldwide business reporting.Keywords: XBRL, financial reporting, internet, internal and external reports
Procedia PDF Downloads 2858269 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture
Authors: Takumi Shindo, Koji Okamura
Abstract:
The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.Keywords: ICN, information centric network, CCN, energy
Procedia PDF Downloads 3378268 Analysis of the Occurrence of Hydraulic Fracture Phenomena in Roudbar Lorestan Dam
Authors: Masoud Ghaemi, MohammadJafar Hedayati, Faezeh Yousefzadeh, Hoseinali Heydarzadeh
Abstract:
According to the statistics of the International Committee on Large Dams, internal erosion and piping (scour) are major causes of the destruction of earth-fill dams. If such dams are constructed in narrow valleys, the valley walls will increase the arching of the dam body due to the transfer of vertical and horizontal stresses, so the occurrence of hydraulic fracturing in these embankments is more likely. Roudbar Dam in Lorestan is a clay-core pebble earth-fill dam constructed in a relatively narrow valley in western Iran. Three years after the onset of impoundment, there has been a fall in dam behavior. Evaluation of the dam behavior based on the data recorded on the instruments installed inside the dam body and foundation confirms the occurrence of internal erosion in the lower and adjacent parts of the core on the left support (abutment). The phenomenon of hydraulic fracturing is one of the main causes of the onset of internal erosion in this dam. Accordingly, the main objective of this paper is to evaluate the validity of this hypothesis. To evaluate the validity of this hypothesis, the dam behavior during construction and impoundment has been first simulated with a three-dimensional numerical model. Then, using validated empirical equations, the safety factor of the occurrence of hydraulic fracturing phenomenon upstream of the dam score was calculated. Then, using the artificial neural network, the failure time of the given section was predicted based on the maximum stress trend created. The study results show that steep slopes of valley walls, sudden changes in coefficient, and differences in compressibility properties of dam body materials have caused considerable stress transfer from core to adjacent valley walls, especially at its lower levels. This has resulted in the coefficient of confidence of the occurrence of hydraulic fracturing in each of these areas being close to one in each of the empirical equations used.Keywords: arching, artificial neural network, FLAC3D, hydraulic fracturing, internal erosion, pore water pressure
Procedia PDF Downloads 1768267 The Effect of Durability and Pathogen Strains on the Wheat Induced Resistance against Zymoseptoria tritici as a Response to Paenibacillus sp. Strain B2
Authors: E. Samain, T. Aussenac, D. van Tuinen, S. Selim
Abstract:
Plant growth promoting rhizobacteria are known as potential biofertilizers and plant resistance inducers. The present work aims to study the durability of the resistance induced as a response to wheat seeds inoculation with PB2 and its influence by Z. tritici strains. The internal and external roots colonization have been determined in vitro, seven days post inoculation, by measuring the colony forming unit (CFU). In planta experimentations were done under controlled conditions included four wheat cultivars with different levels of resistance against Septoria Leaf Blotch (SLB) and four Z. tritici strains with high aggressiveness and resistance levels to fungicides. Plantlets were inoculated with PB2 at sowing and infected with Z. tritici at 3 leaves or tillering growth stages. The infection level with SLB was evaluated at 17 days post inoculation using real-time quantitative polymerase chain reaction (PCR). Results showed that PB2 has a high potential of wheat root external colonization (> 10⁶ CFU/g of root). However, the internal colonization seems to be cultivar dependent. Indeed, PB2 has not been observed as endophytic for one cultivar but has a high level of internal colonization with more than 104 CFU/g of root concerning the three others. Two wheat cultivars (susceptible and moderated resistant) were used to investigate PB2-induced resistance (PB2-IR). After the first infection with Z. tritici, results showed that PB2-IR has conferred a high protection efficiency (40-90%) against SLB in the two tested cultivars. Whereas the PB2-IR was effective against all tested strains with the moderate resistant cultivar, it was higher with the susceptible cultivar (> 64%) but against three of the four tested strains. Concerning the durability of the PB2-IR, after the second infection timing, it has been observed a significant decrease (10-59%) depending strains in the moderate resistant cultivar. Contrarily, the susceptible cultivar showed a stable and high protection level (76-84%) but against three of the four tested strains and interestingly, the strain that overcame PB2-IR was not the same as that of the first infection timing. To conclude, PB2 induces a high and durable resistance against Z. tritici. The PB2-IR is pathogen strain, plant growth stage and genotype dependent. These results may explain the loss of the induced resistance effectiveness under field conditions.Keywords: induced resistance, Paenibacillus sp. strain B2, wheat genotypes, Zymoseptoria tritici
Procedia PDF Downloads 1498266 On the Effects of External Cross-Flow Excitation Forces on the Vortex-Induced-Vibrations of an Oscillating Cylinder
Authors: Abouzar Kaboudian, Ravi Chaithanya Mysa, Boo Cheong Khoo, Rajeev Kumar Jaiman
Abstract:
Vortex induced vibrations can significantly affect the effectiveness of structures in aerospace as well as offshore marine industries. The oscillatory nature of the forces resulting from the vortex shedding around bluff bodies can result in undesirable effects such as increased loading, stresses, deflections, vibrations and noise in the structures, and also reduced fatigue life of the structures. To date, most studies concentrate on either the free oscillations or the prescribed motion of the bluff bodies. However, the structures in operation are usually subject to the external oscillatory forces (e.g. due to the platform motions in offshore industries). In this work, we present the effects of the external cross-flow forces on the vortex-induced vibrations of an oscillating cylinder. The effects of the amplitude, as well as the frequency of the external force on the fluid-forces on the oscillating cylinder are carefully studied and presented. Moreover, we present the transition of the response to be dominated by the vortex-induced-vibrations to the range where it is mostly dictated by the external oscillatory forces. Furthermore, we will discuss how the external forces can affect the flow structures around a cylinder. All results are compared against free oscillations of the cylinder.Keywords: circular cylinder, external force, vortex-shedding, VIV
Procedia PDF Downloads 3718265 The Impact of Fiscal Policy on Gross Domestic Product under Contributions of Level of External Debt in Developing Countries
Authors: Zohreh Bang Tavakoli, Shuktika Chatterjee
Abstract:
This study investigates the fiscal policy impact on countries’ economic growth in developing countries with a different external debt level. The fiscal policy effectiveness has been re-emphasized in the global financial crisis of 2008 with the external debt as its new contemporary driver (Ruščáková and Semančíková, 2016). According to Bouakez, (2014 ) different theories have proposed the economic consequence of fiscal policy, specifically for developing countries. However, fiscal policy literature is lacking research regarding the fiscal policy’s effectiveness with the external debt’s contributions through comprehensive study (Canh, 2018). Also, according to scholars, high levels of external debt will influence economic growth. First, through foreign resources and channel of investment in which high level of debt decreases the amount of foreign investment in the developing countries. Second, through the deterioration of foreign investors and fiscal policies related to a high level of debt (Cordella, et.al., 2010). Therefore, this study proposed that only countries with a low external debt level and appropriate fiscal policies and good quality institutions can gain the proper quantity and quality of foreign investors, which will help the economic growth. For this, this research is examining the impact of fiscal policy on developing countries' economic growth in the situation of different external debt levels.Keywords: fiscal policy, external debt, gross domestic product, developing countries
Procedia PDF Downloads 1578264 Stimuli Responsives of Crosslinked Poly on 2-HydroxyEthyl MethAcrylate – Optimization of Parameters by Experimental Design
Authors: Tewfik Bouchaour, Salah Hamri, Yasmina Houda Bendahma, Ulrich Maschke
Abstract:
Stimuli-responsive materials based on UV crosslinked acrylic polymer networks are fabricated. A various kinds of polymeric systems, hydrophilic polymers based on 2-Hydroxyethyl methacrylate have been widely studied because of their ability to simulate biological tissues, which leads to many applications. The acrylic polymer network PHEMA developed by UV photopolymerization has been used for dye retention. For these so-called smart materials, the properties change in response to an external stimulus. In this contribution, we report the influence of some parameters (initial composition, temperature, and nature of components) in the properties of final materials. Optimization of different parameters is examined by experimental design.Keywords: UV photo-polymerization, PHEMA, external stimulus, optimization
Procedia PDF Downloads 2558263 Peculiarities of Internal Friction and Shear Modulus in 60Co γ-Rays Irradiated Monocrystalline SiGe Alloys
Authors: I. Kurashvili, G. Darsavelidze, T. Kimeridze, G. Chubinidze, I. Tabatadze
Abstract:
At present, a number of modern semiconductor devices based on SiGe alloys have been created in which the latest achievements of high technologies are used. These devices might cause significant changes to networking, computing, and space technology. In the nearest future new materials based on SiGe will be able to restrict the A3B5 and Si technologies and firmly establish themselves in medium frequency electronics. Effective realization of these prospects requires the solution of prediction and controlling of structural state and dynamical physical –mechanical properties of new SiGe materials. Based on these circumstances, a complex investigation of structural defects and structural-sensitive dynamic mechanical characteristics of SiGe alloys under different external impacts (deformation, radiation, thermal cycling) acquires great importance. Internal friction (IF) and shear modulus temperature and amplitude dependences of the monocrystalline boron-doped Si1-xGex(x≤0.05) alloys grown by Czochralski technique is studied in initial and 60Co gamma-irradiated states. In the initial samples, a set of dislocation origin relaxation processes and accompanying modulus defects are revealed in a temperature interval of 400-800 ⁰C. It is shown that after gamma-irradiation intensity of relaxation internal friction in the vicinity of 280 ⁰C increases and simultaneously activation parameters of high temperature relaxation processes reveal clear rising. It is proposed that these changes of dynamical mechanical characteristics might be caused by a decrease of the dislocation mobility in the Cottrell atmosphere enriched by the radiation defects.Keywords: internal friction, shear modulus, gamma-irradiation, SiGe alloys
Procedia PDF Downloads 1408262 Software Architecture Implications on Development Productivity: A Case of Malawi Point of Care Electronic Medical Records
Authors: Emmanuel Mkambankhani, Tiwonge Manda
Abstract:
Software platform architecture includes system components, their relationships, and design, as well as evolution principles. Software architecture and documentation affect a platform's customizability and openness to external innovators, thus affecting developer productivity. Malawi Point of Care (POC) Electronic Medical Records System (EMRS) follows some architectural design standards, but it lacks third-party innovators and is difficult to customize as compared to CommCare and District Health Information System 2 (DHIS2). Improving software architecture and documentation for the Malawi POC will increase productivity and third-party contributions. A conceptual framework based on Generativity and Boundary Resource Model (BRM) was used to compare the three platforms. Interviews, observations, and document analysis were used to collect primary and secondary data. Themes were found by analyzing qualitative and quantitative data, which led to the following results. Configurable, flexible, and cross-platform software platforms and the availability of interfaces (Boundary Resources) that let internal and external developers interact with the platform's core functionality, hence boosting developer productivity. Furthermore, documentation increases developer productivity, while its absence inhibits the use of resources. The study suggests that the architecture and openness of the Malawi POC EMR software platform will be improved by standardizing web application program interfaces (APIs) and making interfaces that can be changed by the user. In addition, increasing the availability of documentation and training will improve the use of boundary resources, thus improving internal and third-party development productivity.Keywords: health systems, configurable platforms, software architecture, software documentation, software development productivity
Procedia PDF Downloads 888261 Evaluation of Egg Quality Parameters in the Isa Brown Line in Intensive Production Systems in the Ocaña Region, Norte de Santander
Authors: Meza-Quintero Myriam, Lobo Torrado Katty Andrea, Sanchez Picon Yesenia, Hurtado-Lugo Naudin
Abstract:
The objective of the study was to evaluate the internal and external quality of the egg in the three production housing systems: floor, cage, and grazing of laying birds of the Isa Brown line, in the laying period between weeks 35 to 41; 135 hens distributed in 3 treatments of 45 birds per repetition were used (the replicas were the seven weeks of the trial). The feeding treatment supplied in the floor and cage systems contained 114 g/bird/day; for the grazing system, 14 grams less concentrate was provided. Nine eggs were collected to be studied and analyzed in the animal nutrition laboratory (3 eggs per housing system). The random statistical model was implemented: for the statistical analysis of the data, the statistical software of IBM® Statistical Products and Services Solution (SPSS) version 2.3 was used. The evaluation and follow-up instruments were the vernier caliper for the measurement in millimeters, a YolkFan™16 from Roche DSM for the evaluation of the egg yolk pigmentation, a digital scale for the measurement in grams, a micrometer for the measurement in millimeters and evaluation in the laboratory using dry matter, ashes, and ethereal extract. The results suggested that equivalent to the size of the egg (0.04 ± 3.55) and the thickness of the shell (0.46 ± 3.55), where P-Value> 0.05 was obtained, weight albumen (0.18 ± 3.55), albumen height (0.38 ± 3.55), yolk weight (0.64 ± 3.55), yolk height (0.54 ± 3.55) and for yolk pigmentation (1.23 ± 3.55). It was concluded that the hens in the three production systems, floor, cage, and grazing, did not show significant statistical differences in the internal and external quality of the chicken in the parameters studied egg for the production system.Keywords: biological, territories, genetic resource, egg
Procedia PDF Downloads 798260 Hierarchically Modeling Cognition and Behavioral Problems of an Under-Represented Group
Authors: Zhidong Zhang, Zhi-Chao Zhang
Abstract:
This study examines adolescent psychological and behavioral problems. The Achenbach systems of empirically based assessment (ASEBA) were used as the instrument. The problem framework consists of internal, external and social behavioral problems which are theoretically developed based on about 113 items plus relevant background variables. In this study, the sample consist of 1,975 sixth and seventh grade students in Northeast China. Stratified random sampling method was used to collect the data, meaning that samples were from different school districts, schools, and classes. The researchers looked at both macro and micro effect. Therefore, multilevel analysis techniques were used in the data analysis. The parts of the research results indicated that the background variables such as extracurricular activities were directly related to students’ internal problems.Keywords: behavioral problems, anxious/depressed problems, internalizing problems, mental health, under-represented groups, empirically-based assessment, hierarchical modeling, ASEBA, multilevel analysis
Procedia PDF Downloads 6038259 Photoluminescent Properties of Noble Metal Nanoparticles Supported Yttrium Aluminum Garnet Nanoparticles Doped with Cerium (Ⅲ) Ions
Authors: Mitsunobu Iwasaki, Akifumi Iseda
Abstract:
Yttrium aluminum garnet doped with cerium (Ⅲ) ions (Y3Al5O12:Ce3+, YAG:Ce3+) has attracted a great attention because it can efficiently convert the blue light into a very broad yellow emission band, which produces white light emitting diodes and is applied for panel displays. To improve the brightness and resolution of the display, a considerable attention has been directed to develop fine phosphor particles. We have prepared YAG:Ce3+ nanophosphors by environmental-friendly wet process. The peak maximum of absorption spectra of surface plasmon of Ag nanopaticles are close to that of the excitation spectra (460 nm) of YAG:Ce3+. It can be expected that Ag nanoparticles supported onto the surface of YAG:Ce3+ (Ag-YAG:Ce3+) enhance the absorption of Ce3+ ions. In this study, we have prepared Ag-YAG:Ce3+ nanophosphors and investigated their photoluminescent properties. YCl3・6H2O and AlCl3・6H2O with a molar ratio of Y:Al=3:5 were dissolved in ethanol (100 ml), and CeCl3•7H2O (0.3 mol%) was further added to the above solution. Then, NaOH (4.6×10-2 mol) dissolved in ethanol (50 ml) was added dropwise to the mixture under reflux over 2 hours, and the solution was further refluxed for 1 hour. After cooling to room temperature, precipitates in the reaction mixture were heated at 673 K for 1 hour. After the calcination, the particles were immersed in AgNO3 solution for 1 hour, followed by sintering at 1123 K for 1 hour. YAG:Ce3+ were confirmed to be nanocrystals with a crystallite size of 50-80 nm in diameter. Ag nanoparticles supported onto YAG:Ce3+ were single nanometers in diameter. The excitation and emission spectra were 454 nm and 539 nm at a maximum wavelength, respectively. The emission intensity was maximum for Ag-YAG:Ce3+ immersed into 0.5 mM AgCl (Ag-YAG:Ce (0.5 mM)). The absorption maximum (461 nm) was increased for Ag-YAG:Ce3+ in comparison with that for YAG:Ce3+, indicating that the absorption was enhanced by the addition of Ag. The external and internal quantum efficiencies became 11.2 % and 36.9 % for Ag-YAG:Ce (0.5 mM), respectively. The emission intensity and absorption maximum of Ag-YAG:Ce (0.5 mM)×n (n=1, 2, 3) were increased with an increase of the number of supporting times (n), respectively. The external and internal quantum efficiencies were increased for the increase of n, respectively. The external quantum efficiency of Ag-YAG:Ce (0.5 mM) (n=3) became twice as large as that of YAG:Ce. In conclusion, Ag nanoparticles supported onto YAG:Ce3+ increased absorption and quantum efficiency. Therefore, the support of Ag nanoparticles enhanced the photoluminescent properties of YAG:Ce3+.Keywords: plasmon, quantum efficiency, silver nanoparticles, yttrium aluminum garnet
Procedia PDF Downloads 2658258 Empirical Investigation for the Correlation between Object-Oriented Class Lack of Cohesion and Coupling
Authors: Jehad Al Dallal
Abstract:
The design of the internal relationships among object-oriented class members (i.e., attributes and methods) and the external relationships among classes affects the overall quality of the object-oriented software. The degree of relatedness among class members is referred to as class cohesion and the degree to which a class is related to other classes is called class coupling. Well designed classes are expected to exhibit high cohesion and low coupling values. In this paper, using classes of three open-source Java systems, we empirically investigate the relation between class cohesion and coupling. In the empirical study, five lack-of-cohesion metrics and eight coupling metrics are considered. The empirical study results show that class cohesion and coupling internal quality attributes are inversely correlated. The strength of the correlation highly depends on the cohesion and coupling measurement approaches.Keywords: class cohesion measure, class coupling measure, object-oriented class, software quality
Procedia PDF Downloads 2328257 Assets Integrity Management in Oil and Gas Production Facilities through Corrosion Mitigation and Inspection Strategy: A Case Study of Sarir Oilfield
Authors: Iftikhar Ahmad, Youssef Elkezza
Abstract:
Sarir oilfield is in North Africa. It has facilities for oil and gas production. The assets of the Sarir oilfield can be divided into five following categories, namely: (i) well bore and wellheads; (ii) vessels such as separators, desalters, and gas processing facilities; (iii) pipelines including all flow lines, trunk lines, and shipping lines; (iv) storage tanks; (v) other assets such as turbines and compressors, etc. The nature of the petroleum industry recognizes the potential human, environmental and financial consequences that can result from failing to maintain the integrity of wellheads, vessels, tanks, pipelines, and other assets. The importance of effective asset integrity management increases as the industry infrastructure continues to age. The primary objective of assets integrity management (AIM) is to maintain assets in a fit-for-service condition while extending their remaining life in the most reliable, safe, and cost-effective manner. Corrosion management is one of the important aspects of successful asset integrity management. It covers corrosion mitigation, monitoring, inspection, and risk evaluation. External corrosion on pipelines, well bores, buried assets, and bottoms of tanks is controlled with a combination of coatings by cathodic protection, while the external corrosion on surface equipment, wellheads, and storage tanks is controlled by coatings. The periodic cleaning of the pipeline by pigging helps in the prevention of internal corrosion. Further, internal corrosion of pipelines is prevented by chemical treatment and controlled operations. This paper describes the integrity management system used in the Sarir oil field for its oil and gas production facilities based on standard practices of corrosion mitigation and inspection.Keywords: assets integrity management, corrosion prevention in oilfield assets, corrosion management in oilfield, corrosion prevention, inspection activities
Procedia PDF Downloads 868256 Advances in Health Risk Assessment of Mycotoxins in Africa
Authors: Wilfred A. Abiaa, Chibundu N. Ezekiel, Benedikt Warth, Michael Sulyok, Paul C. Turner, Rudolf Krska, Paul F. Moundipa
Abstract:
Mycotoxins are a wide range of toxic secondary metabolites of fungi that contaminate various food commodities worldwide especially in sub-Saharan Africa (SSA). Such contamination seriously compromises food safety and quality posing a serious problem for human health as well as to trade and the economy. Their concentrations depend on various factors, such as the commodity itself, climatic conditions, storage conditions, seasonal variances, and processing methods. When humans consume foods contaminated by mycotoxins, they exert toxic effects to their health through various modes of actions. Rural populations in sub-Saharan Africa, are exposed to dietary mycotoxins, but it is supposed that exposure levels and health risks associated with mycotoxins between SSA countries may vary. Dietary exposures and health risk assessment studies have been limited by lack of equipment for the proper assessment of the associated health implications on consumer populations when they eat contaminated agricultural products. As such, mycotoxin research is premature in several SSA nations with product evaluation for mycotoxin loads below/above legislative limits being inadequate. Few nations have health risk assessment reports mainly based on direct quantification of the toxins in foods ('external exposure') and linking food levels with data from food frequency questionnaires. Nonetheless, the assessment of the exposure and health risk to mycotoxins requires more than the traditional approaches. Only a fraction of the mycotoxins in contaminated foods reaches the blood stream and exert toxicity ('internal exposure'). Also, internal exposure is usually smaller than external exposure thus dependence on external exposure alone may induce confounders in risk assessment. Some studies from SSA earlier focused on biomarker analysis mainly on aflatoxins while a few recent studies have concentrated on the multi-biomarker analysis of exposures in urine providing probable associations between observed disease occurrences and dietary mycotoxins levels. As a result, new techniques that could assess the levels of exposures directly in body tissue or fluid, and possibly link them to the disease state of individuals became urgent.Keywords: mycotoxins, biomarkers, exposure assessment, health risk assessment, sub-Saharan Africa
Procedia PDF Downloads 5738255 Healthcare Fire Disasters: Readiness, Response and Resilience Strategies: A Real-Time Experience of a Healthcare Organization of North India
Authors: Raman Sharma, Ashok Kumar, Vipin Koushal
Abstract:
Healthcare facilities are always seen as places of haven and protection for managing the external incidents, but the situation becomes more difficult and challenging when such facilities themselves are affected from internal hazards. Such internal hazards are arguably more disruptive than external incidents affecting vulnerable ones, as patients are always dependent on supportive measures and are neither in a position to respond to such crisis situation nor do they know how to respond. The situation becomes more arduous and exigent to manage if, in case critical care areas like Intensive Care Units (ICUs) and Operating Rooms (OR) are convoluted. And, due to these complexities of patients’ in-housed there, it becomes difficult to move such critically ill patients on immediate basis. Healthcare organisations use different types of electrical equipment, inflammable liquids, and medical gases often at a single point of use, hence, any sort of error can spark the fire. Even though healthcare facilities face many fire hazards, damage caused by smoke rather than flames is often more severe. Besides burns, smoke inhalation is primary cause of fatality in fire-related incidents. The greatest cause of illness and mortality in fire victims, particularly in enclosed places, appears to be the inhalation of fire smoke, which contains a complex mixture of gases in addition to carbon monoxide. Therefore, healthcare organizations are required to have a well-planned disaster mitigation strategy, proactive and well prepared manpower to cater all types of exigencies resulting from internal as well as external hazards. This case report delineates a true OR fire incident in Emergency Operation Theatre (OT) of a tertiary care multispecialty hospital and details the real life evidence of the challenges encountered by OR staff in preserving both life and property. No adverse event was reported during or after this fire commotion, yet, this case report aimed to congregate the lessons identified of the incident in a sequential and logical manner. Also, timely smoke evacuation and preventing the spread of smoke to adjoining patient care areas by opting appropriate measures, viz. compartmentation, pressurisation, dilution, ventilation, buoyancy, and airflow, helped to reduce smoke-related fatalities. Henceforth, precautionary measures may be implemented to mitigate such incidents. Careful coordination, continuous training, and fire drill exercises can improve the overall outcomes and minimize the possibility of these potentially fatal problems, thereby making a safer healthcare environment for every worker and patient.Keywords: healthcare, fires, smoke, management, strategies
Procedia PDF Downloads 658254 Secure Content Centric Network
Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris
Abstract:
Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer
Procedia PDF Downloads 6428253 The Impact of Migrants’ Remittances on Household Poverty and Inequality: A Case Study of Mazar-i-Sharif, Balkh Province, Afghanistan
Authors: Baqir Khawari
Abstract:
This study has been undertaken to investigate the impact of remittances on household poverty and inequality using OLS and Logit Models with a strictly multi-random sampling method. The result of the OLS model reveals that if the per capita international remittances increase by 1%, then it is estimated that the per capita income will increase by 0.071% and 0.059% during 2019/20 and 2020/21, respectively. In addition, a 1% increase in external remittances results in a 0.0272% and 0.025% reduction in per capita depth of poverty and a 0.0149% and 0.0145% decrease in severity of poverty during 2019/20 and 2020/21, respectively. It is also shown that the effect of external remittances on poverty is greater than internal remittances. In terms of inequality, the result represents that remittances reduced the Gini coefficient by 2% and 7% during 2019/20 and 2020/21, respectively. Further, it is bold that COVID-19 negatively impacts the amount of received remittances by households, thus resulting in a reduction in the size of the effect of remittances. Therefore, a concerted effort of effective policies and governance and international assistance is imperative to address this prolonged problem.Keywords: migration, remittances, poverty, inequality, COVID-19, Afghanistan
Procedia PDF Downloads 668252 Recovery of an Area Degraded by Gullies in the Municipality of Monte Alto (SP), Brazil
Authors: Layane Sara Vieira, Paulo Egidio Bernardo, Roberto Saverio Souza Costa
Abstract:
Anthropogenic occupations and agricultural explorations without concern for the preservation and sustainability of the activity result in soil degradation that can make rural activity unfeasible. The objective of this work was to characterize and evaluate the recovery costs of an area degraded by major erosion (gully) in the municipality of Monte Alto (SP). Topographic characterization was carried out by means of a planialtimetric survey with a total station. The contours of the gully, internal area, slope height, contribution area, volume, and costs of operations for the recovery of the gully were delimited. The results obtained showed that the gully has a length of 145.56 m, a maximum width of 36.61 m, and a gap of 19.48 m. The external area of the gully is 1,039.8741 m², and the internal area is 119.3470 m². The calculated volume was 3,282.63 m³. The intervention area for breaking slopes was measured at 8,471.29 m², requiring the construction of 19 terraces in this area, vertically spaced at 2.8 m. The estimated costs for mechanical recovery of the gully were R$ 19,167.84 (US$ 3.657,98).Keywords: erosion, volumetric assessment, soil degradation, terraces
Procedia PDF Downloads 1068251 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 4508250 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It
Authors: Claire Norman-Maillet
Abstract:
Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19
Procedia PDF Downloads 688249 A Social Network Analysis of the Palestinian Feminist Network Tal3at
Authors: Maath M. Musleh
Abstract:
This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.Keywords: feminism, Palestine, social network analysis, Tal3at
Procedia PDF Downloads 2638248 Design a Network for Implementation a Hospital Information System
Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇
Abstract:
A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network
Procedia PDF Downloads 438