Search results for: critical Rayleigh number
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14579

Search results for: critical Rayleigh number

12419 Understanding the Factors behind Graduate Employability in the United Arab Emirates

Authors: Mohammed Islam

Abstract:

Graduate employability is a well debated topic by governments, employers, and higher education institutes (HEI) across the world. Much of the focus of these debates have centred around the skills that graduates bring or should bring to the job market, a point echoed by United Arab Emirates (UAE) policy makers and employers. While some research has been carried out on graduates' employability skills, little or no attention has been paid to the forces at play in developing employability policy and its subsequent implementation. The focus of debate has been on a perceived skills gap rather than policy. Recognising a gap in the literature, this paper details a study of UAE employability policy development. Taking a social constructionist approach, this case study views policy as discursive and socially constructed through interactions with key stakeholders. It is within the myriad of interdependent socio-political factors and social practices, particularly power relationships, that this paper explores UAE policy on graduate employability. In doing so, this adds to the debate on graduate employability from the perspective of policy and explores its roots in the interaction between human activity and the ‘system’. Data was collected from two main sources: documentary review and semi-structured interviews. Policies and publicly stated rhetoric on graduate employability were analysed using Critical Discourse Analysis. Semi-structured interviews with representatives from policy makers, HEIs, and employers were reviewed through Thematic Analysis. The theoretical framework for the discussion of findings draws from social practice theories and highlights the factors at play in access to employment for UAE graduates. This case study presents a methodological approach to policy studies that can be applied beyond the context under investigation. Education policy researchers are provided with an opportunity to compare similarities and differences with their own specific contexts.

Keywords: critical discourse analysis, employability, methodology, policy, social constructionism

Procedia PDF Downloads 118
12418 Discussing Embedded versus Central Machine Learning in Wireless Sensor Networks

Authors: Anne-Lena Kampen, Øivind Kure

Abstract:

Machine learning (ML) can be implemented in Wireless Sensor Networks (WSNs) as a central solution or distributed solution where the ML is embedded in the nodes. Embedding improves privacy and may reduce prediction delay. In addition, the number of transmissions is reduced. However, quality factors such as prediction accuracy, fault detection efficiency and coordinated control of the overall system suffer. Here, we discuss and highlight the trade-offs that should be considered when choosing between embedding and centralized ML, especially for multihop networks. In addition, we present estimations that demonstrate the energy trade-offs between embedded and centralized ML. Although the total network energy consumption is lower with central prediction, it makes the network more prone for partitioning due to the high forwarding load on the one-hop nodes. Moreover, the continuous improvements in the number of operations per joule for embedded devices will move the energy balance toward embedded prediction.

Keywords: central machine learning, embedded machine learning, energy consumption, local machine learning, wireless sensor networks, WSN

Procedia PDF Downloads 140
12417 Developing Students’ Academic Writing Skills through Scientific Reading: Using Questions and Answer Activities

Authors: Makhim Artikova, Shavkat Duschanov

Abstract:

So far, there have been a plethora of attempts to improve learners’ academic writing skills. However, this issue remains to be a real concern among the majority of students, especially those who are standing on their academic life threshold. The purpose of this research is improving students’ academic writing skills through 'Questions and Answer Reading' activities. Using well-prepared and well-chosen reading materials (from textbooks, scientific journals, or magazines) and applying questions and answer activities in the classroom facilitate learners to become great critical readers. Furthermore, it boosts their writing skills, which are the most crucial part of students’ personal and academic developments. In this activity, the class is divided into small groups of four. Then, the instructor will give students whether one section of the text or full text asking them to read and to find unfamiliar words within the group. After discovering the meaning of unknown words, each group has to share their findings with the class. In the next stage of the activity, students should be asked to create questions in a group based on the given reading material. Follow by each group should ask the other groups their questions which are an excellent opportunity to challenge leads to improve critical thinking skills. In the last part, the students are asked to write the text or article summary, which is the activity core that pilots to the writing skills perfection. This engaging activity highlights the effectiveness of incorporating reading materials into the classroom when it comes to improving students’ composition writings. Structural writing after every reading activity resulted in improving students’ coherence and cohesion in writing well-organized essays. Having experimented with high school 9th and 11th-grade students, implementing reading activities into the classroom is proved to be a productive tool to enhance one’s academic writing skills. In the future, this method planning to be implemented among university students.

Keywords: academic writing, coherence and cohesion, questions and answer activities, scientific reading

Procedia PDF Downloads 107
12416 Relevance Of Cognitive Rehabilitation Amongst Children Having Chronic Illnesses – A Theoretical Analysis

Authors: Pulari C. Milu Maria Anto

Abstract:

Background: Cognitive Rehabilitation/Retraining has been variously used in the research literature to represent non-pharmacological interventions that target the cognitive impairments with the goal of ameliorating cognitive function and functional behaviors to optimize the quality of life. Along with adult’s cognitive impairments, the need to address acquired cognitive impairments (due to any chronic illnesses like CHD - congenital heart diseases or ALL - Acute Lymphoblastic Leukemia) among child populations is inevitable. Also, it has to be emphasized as same we consider the cognitive impairments seen in the children having neurodevelopmental disorders. Methods: All published brain image studies (Hermann, B. et al,2002, Khalil, A. et al., 2004, Follin, C. et al, 2016, etc.) and studies emphasizing cognitive impairments in attention, memory, and/or executive function and behavioral aspects (Henkin, Y. et al,2007, Bellinger, D. C., & Newburger, J. W. (2010), Cheung, Y. T., et al,2016, that could be identified were reviewed. Based on a systematic review of the literature from (2000 -2021) different brain imaging studies, increased risk of neuropsychological and psychosocial impairments are briefly described. Clinical and research gap in the area is discussed. Results:30 papers, both Indian studies and foreign publications (Sage journals, Delhi psychiatry journal, Wiley Online Library, APA PsyNet, Springer, Elsevier, Developmental medicine, and child neurology), were identified. Conclusions: In India, a very limited number of brain imaging studies and neuropsychological studies have done by indicating the cognitive deficits of a child having or undergone chronic illness. None of the studies have emphasized the relevance nor the need of implementingCR among such children, even though its high time to address but still not established yet. The review of the current evidence is to bring out an insight among rehabilitation professionals in establishing a child specific CR and to publish new findings regarding the implementation of CR among such children. Also, this study will be an awareness on considering cognitive aspects of a child having acquired cognitive deficit (due to chronic illness), especially during their critical developmental period.

Keywords: cognitive rehabilitation, neuropsychological impairments, congenital heart diseases, acute lymphoblastic leukemia, epilepsy, and neuroplasticity

Procedia PDF Downloads 170
12415 Modeling and Optimal Control of Pneumonia Disease with Cost Effective Strategies

Authors: Getachew Tilahun, Oluwole Makinde, David Malonza

Abstract:

We propose and analyze a non-linear mathematical model for the transmission dynamics of pneumonia disease in a population of varying size. The deterministic compartmental model is studied using stability theory of differential equations. The effective reproduction number is obtained and also the local and global asymptotically stability conditions for the disease free and as well as for the endemic equilibria are established. The model exhibit a backward bifurcation and the sensitivity indices of the basic reproduction number to the key parameters are determined. Using Pontryagin’s maximum principle, the optimal control problem is formulated with three control strategies; namely disease prevention through education, treatment and screening. The cost effectiveness analysis of the adopted control strategies revealed that the combination of prevention and treatment is the most cost effective intervention strategies to combat the pneumonia pandemic. Numerical simulation is performed and pertinent results are displayed graphically.

Keywords: cost effectiveness analysis, optimal control, pneumonia dynamics, stability analysis, numerical simulation

Procedia PDF Downloads 311
12414 Thermal Barrier Coated Diesel Engine With Neural Networks Mathematical Modelling

Authors: Hanbey Hazar, Hakan Gul

Abstract:

In this study; piston, exhaust, and suction valves of a diesel engine were coated in 300 mm thickness with Tungsten Carbide (WC) by using the HVOF coating method. Mathematical modeling of a coated and uncoated (standardized) engine was performed by using ANN (Artificial Neural Networks). The purpose was to decrease the number of repetitions of tests and reduce the test cost through mathematical modeling of engines by using ANN. The results obtained from the tests were entered in ANN and therefore engines' values at all speeds were estimated. Results obtained from the tests were compared with those obtained from ANN and they were observed to be compatible. It was also observed that, with thermal barrier coating, hydrocarbon (HC), carbon monoxide (CO), and smoke density values of the diesel engine decreased; but nitrogen oxides (NOx) increased. Furthermore, it was determined that results obtained through mathematical modeling by means of ANN reduced the number of test repetitions. Therefore, it was understood that time, fuel and labor could be saved in this way.

Keywords: Artificial Neural Network, Diesel Engine, Mathematical Modelling, Thermal Barrier Coating

Procedia PDF Downloads 520
12413 Risk Assessment of Particulate Matter (PM10) in Makkah, Saudi Arabia

Authors: Turki M. Habeebullah, Atef M. F. Mohammed, Essam A. Morsy

Abstract:

In recent decades, particulate matter (PM10) have received much attention due to its potential adverse health impact and the subsequent need to better control or regulate these pollutants. The aim of this paper is focused on study risk assessment of PM10 in four different districts (Shebikah, Masfalah, Aziziyah, Awali) in Makkah, Saudi Arabia during the period from 1 Ramadan 1434 AH - 27 Safar 1435 AH. samples was collected by using Low Volume Sampler (LVS Low Volume Sampler) device and filtration method for estimating the total concentration of PM10. The study indicated that the mean PM10 concentrations were 254.6 (186.1 - 343.2) µg/m3 in Shebikah, 184.9 (145.6 - 271.4) µg/m3 in Masfalah, 162.4 (92.4 - 253.8) µg/m3 in Aziziyah, and 56.0 (44.5 - 119.8) µg/m3 in Awali. These values did not exceed the permissible limits in PME (340 µg/m3 as daily average). Furthermore, health assessment is carried out using AirQ2.2.3 model to estimate the number of hospital admissions due to respiratory diseases. The cumulative number of cases per 100,000 were 1534 (18-3050 case), which lower than that recorded in the United States, Malaysia. The concentration response coefficient was 0.49 (95% CI 0.05 - 0.70) per 10 μg/m3 increase of PM10.

Keywords: air pollution, respiratory diseases, airQ2.2.3, Makkah

Procedia PDF Downloads 440
12412 Bit Error Rate Performance of MIMO Systems for Wireless Communications

Authors: E. Ghayoula, M. Haj Taieb, A. Bouallegue, J. Y. Chouinard, R. Ghayoula

Abstract:

This paper evaluates the bit error rate (BER) performance of MIMO systems for wireless communication. MIMO uses multiple transmitting antennas, multiple receiving antennas and the space-time block codes to provide diversity. MIMO transmits signal encoded by space-time block (STBC) encoder through different transmitting antennas. These signals arrive at the receiver at slightly different times. Spatially separated multiple receiving antennas are employed to provide diversity reception to combat the effect of fading in the channel. This paper presents a detailed study of diversity coding for MIMO systems. STBC techniques are implemented and simulation results in terms of the BER performance with varying number of MIMO transmitting and receiving antennas are presented. Our results show how increasing the number of both transmit and receive antenna improves system performance and reduces the bit error rate.

Keywords: MIMO systems, diversity, BER, MRRC, SIMO, MISO, STBC, alamouti, SNR

Procedia PDF Downloads 483
12411 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 433
12410 Relation of Radar and Hail Parameters in the Continetal Part of Croatia

Authors: Damir Počakal

Abstract:

Continental part Croatia is exposed, mainly in the summer months, to the frequent occurrence of severe thunderstorms and hail. In the 1960s, aiming to protect and reduce the damage, an operational hail suppression system was introduced in that area. The current protected area is 26800 km2 and has about 580 hail suppression stations (rockets and ground generators) which are managed with 8 radar centres (S-band radars). In order to obtain objective and precise hailstone measurement for different research studies, hailpads were installed on all this stations in 2001. Additionally the dense hailpad network with the dimensions of 20 km x 30 km (1 hailpad per 4 km2), was established in the area with the highest average number of days with hail in Croatia in 2002. This paper presents analysis of relation between radar measured parameters of Cb cells in the time of hail fall with physical parameters of hail (max. diameter, number of hail stones and kinetic energy) measured on hailpads in period 2002 -2014. In addition are compared radar parameters of Cb cells with and without hail on the ground located at the same time over the polygon area.

Keywords: Cb cell, hail, radar, hailpad

Procedia PDF Downloads 287
12409 Stability and Sensitivity Analysis of Cholera Model with Treatment Class

Authors: Yunusa Aliyu Hadejia

Abstract:

Cholera is a gastrointestinal disease caused by a bacterium called Vibrio Cholerae which spread as a result of eating food or drinking water contaminated with feaces from an infected person. In this work we proposed and analyzed the impact of isolating infected people and give them therapeutic treatment, the specific objectives of the research was to formulate a mathematical model of cholera transmission incorporating treatment class, to make analysis on stability of equilibrium points of the model, positivity and boundedness was shown to ensure that the model has a biological meaning, the basic reproduction number was derived by next generation matrix approach. The result of stability analysis show that the Disease free equilibrium was both locally and globally asymptotically stable when R_0< 1 while endemic equilibrium has locally asymptotically stable when R_0> 1. Sensitivity analysis was perform to determine the contribution of each parameter to the basic reproduction number. Numerical simulation was carried out to show the impact of the model parameters using MAT Lab Software.

Keywords: mathematical model, treatment, stability, sensitivity

Procedia PDF Downloads 88
12408 Performance Degradation for the GLR Test-Statistics for Spatial Signal Detection

Authors: Olesya Bolkhovskaya, Alexander Maltsev

Abstract:

Antenna arrays are widely used in modern radio systems in sonar and communications. The solving of the detection problems of a useful signal on the background of noise is based on the GLRT method. There is a large number of problem which depends on the known a priori information. In this work, in contrast to the majority of already solved problems, it is used only difference spatial properties of the signal and noise for detection. We are analyzing the influence of the degree of non-coherence of signal and noise unhomogeneity on the performance characteristics of different GLRT statistics. The description of the signal and noise is carried out by means of the spatial covariance matrices C in the cases of different number of known information. The partially coherent signal is simulated as a plane wave with a random angle of incidence of the wave concerning a normal. Background noise is simulated as random process with uniform distribution function in each element. The results of investigation of degradation of performance characteristics for different cases are represented in this work.

Keywords: GLRT, Neumann-Pearson’s criterion, Test-statistics, degradation, spatial processing, multielement antenna array

Procedia PDF Downloads 377
12407 Classification of Political Affiliations by Reduced Number of Features

Authors: Vesile Evrim, Aliyu Awwal

Abstract:

By the evolvement in technology, the way of expressing opinions switched the direction to the digital world. The domain of politics as one of the hottest topics of opinion mining research merged together with the behavior analysis for affiliation determination in text which constitutes the subject of this paper. This study aims to classify the text in news/blogs either as Republican or Democrat with the minimum number of features. As an initial set, 68 features which 64 are constituted by Linguistic Inquiry and Word Count (LIWC) features are tested against 14 benchmark classification algorithms. In the later experiments, the dimensions of the feature vector reduced based on the 7 feature selection algorithms. The results show that Decision Tree, Rule Induction and M5 Rule classifiers when used with SVM and IGR feature selection algorithms performed the best up to 82.5% accuracy on a given dataset. Further tests on a single feature and the linguistic based feature sets showed the similar results. The feature “function” as an aggregate feature of the linguistic category, is obtained as the most differentiating feature among the 68 features with 81% accuracy by itself in classifying articles either as Republican or Democrat.

Keywords: feature selection, LIWC, machine learning, politics

Procedia PDF Downloads 377
12406 Financial Fraud Prediction for Russian Non-Public Firms Using Relational Data

Authors: Natalia Feruleva

Abstract:

The goal of this paper is to develop the fraud risk assessment model basing on both relational and financial data and test the impact of the relationships between Russian non-public companies on the likelihood of financial fraud commitment. Relationships mean various linkages between companies such as parent-subsidiary relationship and person-related relationships. These linkages may provide additional opportunities for committing fraud. Person-related relationships appear when firms share a director, or the director owns another firm. The number of companies belongs to CEO and managed by CEO, the number of subsidiaries was calculated to measure the relationships. Moreover, the dummy variable describing the existence of parent company was also included in model. Control variables such as financial leverage and return on assets were also implemented because they describe the motivating factors of fraud. To check the hypotheses about the influence of the chosen parameters on the likelihood of financial fraud, information about person-related relationships between companies, existence of parent company and subsidiaries, profitability and the level of debt was collected. The resulting sample consists of 160 Russian non-public firms. The sample includes 80 fraudsters and 80 non-fraudsters operating in 2006-2017. The dependent variable is dichotomous, and it takes the value 1 if the firm is engaged in financial crime, otherwise 0. Employing probit model, it was revealed that the number of companies which belong to CEO of the firm or managed by CEO has significant impact on the likelihood of financial fraud. The results obtained indicate that the more companies are affiliated with the CEO, the higher the likelihood that the company will be involved in financial crime. The forecast accuracy of the model is about is 80%. Thus, the model basing on both relational and financial data gives high level of forecast accuracy.

Keywords: financial fraud, fraud prediction, non-public companies, regression analysis, relational data

Procedia PDF Downloads 110
12405 The Effect of Traffic Load on the Maximum Response of a Cable-Stayed Bridge under Blast Loads

Authors: S. K. Hashemi, M. A. Bradford, H. R. Valipour

Abstract:

The Recent collapse of bridges has raised the awareness about safety and robustness of bridges subjected to extreme loading scenarios such as intentional/unintentional blast loads. The air blast generated by the explosion of bombs or fuel tankers leads to high-magnitude short-duration loading scenarios that can cause severe structural damage and loss of critical structural members. Hence, more attentions need to put towards bridge structures to develop guidelines to increase the resistance of such structures against the probable blast. Recent advancements in numerical methods have brought about the viable and cost effective facilities to simulate complicated blast scenarios and subsequently provide useful reference for safeguarding design of critical infrastructures. In the previous studies common bridge responses to blast load, the traffic load is sometimes not included in the analysis. Including traffic load will increase the axial compression in bridge piers especially when the axial load is relatively small. Traffic load also can reduce the uplift of girders and deck when the bridge experiences under deck explosion. For more complicated structures like cable-stayed or suspension bridges, however, the effect of traffic loads can be completely different. The tension in the cables increase and progressive collapse is likely to happen while traffic loads exist. Accordingly, this study is an attempt to simulate the effect of traffic load cases on the maximum local and global response of an entire cable-stayed bridge subjected to blast loadings using LS-DYNA explicit finite element code. The blast loads ranged from small to large explosion placed at different positions above the deck. Furthermore, the variation of the traffic load factor in the load combination and its effect on the dynamic response of the bridge under blast load is investigated.

Keywords: blast, cable-stayed bridge, LS-DYNA, numerical, traffic load

Procedia PDF Downloads 325
12404 Safeguarding the Construction Industry: Interrogating and Mitigating Emerging Risks from AI in Construction

Authors: Abdelrhman Elagez, Rolla Monib

Abstract:

This empirical study investigates the observed risks associated with adopting Artificial Intelligence (AI) technologies in the construction industry and proposes potential mitigation strategies. While AI has transformed several industries, the construction industry is slowly adopting advanced technologies like AI, introducing new risks that lack critical analysis in the current literature. A comprehensive literature review identified a research gap, highlighting the lack of critical analysis of risks and the need for a framework to measure and mitigate the risks of AI implementation in the construction industry. Consequently, an online survey was conducted with 24 project managers and construction professionals, possessing experience ranging from 1 to 30 years (with an average of 6.38 years), to gather industry perspectives and concerns relating to AI integration. The survey results yielded several significant findings. Firstly, respondents exhibited a moderate level of familiarity (66.67%) with AI technologies, while the industry's readiness for AI deployment and current usage rates remained low at 2.72 out of 5. Secondly, the top-ranked barriers to AI adoption were identified as lack of awareness, insufficient knowledge and skills, data quality concerns, high implementation costs, absence of prior case studies, and the uncertainty of outcomes. Thirdly, the most significant risks associated with AI use in construction were perceived to be a lack of human control (decision-making), accountability, algorithm bias, data security/privacy, and lack of legislation and regulations. Additionally, the participants acknowledged the value of factors such as education, training, organizational support, and communication in facilitating AI integration within the industry. These findings emphasize the necessity for tailored risk assessment frameworks, guidelines, and governance principles to address the identified risks and promote the responsible adoption of AI technologies in the construction sector.

Keywords: risk management, construction, artificial intelligence, technology

Procedia PDF Downloads 38
12403 Physics-Based Earthquake Source Models for Seismic Engineering: Analysis and Validation for Dip-Slip Faults

Authors: Percy Galvez, Anatoly Petukhin, Paul Somerville, Ken Miyakoshi, Kojiro Irikura, Daniel Peter

Abstract:

Physics-based dynamic rupture modelling is necessary for estimating parameters such as rupture velocity and slip rate function that are important for ground motion simulation, but poorly resolved by observations, e.g. by seismic source inversion. In order to generate a large number of physically self-consistent rupture models, whose rupture process is consistent with the spatio-temporal heterogeneity of past earthquakes, we use multicycle simulations under the heterogeneous rate-and-state (RS) friction law for a 45deg dip-slip fault. We performed a parametrization study by fully dynamic rupture modeling, and then, a set of spontaneous source models was generated in a large magnitude range (Mw > 7.0). In order to validate rupture models, we compare the source scaling relations vs. seismic moment Mo for the modeled rupture area S, as well as average slip Dave and the slip asperity area Sa, with similar scaling relations from the source inversions. Ground motions were also computed from our models. Their peak ground velocities (PGV) agree well with the GMPE values. We obtained good agreement of the permanent surface offset values with empirical relations. From the heterogeneous rupture models, we analyzed parameters, which are critical for ground motion simulations, i.e. distributions of slip, slip rate, rupture initiation points, rupture velocities, and source time functions. We studied cross-correlations between them and with the friction weakening distance Dc value, the only initial heterogeneity parameter in our modeling. The main findings are: (1) high slip-rate areas coincide with or are located on an outer edge of the large slip areas, (2) ruptures have a tendency to initiate in small Dc areas, and (3) high slip-rate areas correlate with areas of small Dc, large rupture velocity and short rise-time.

Keywords: earthquake dynamics, strong ground motion prediction, seismic engineering, source characterization

Procedia PDF Downloads 139
12402 Optimization of Multiplier Extraction Digital Filter On FPGA

Authors: Shiksha Jain, Ramesh Mishra

Abstract:

One of the most widely used complex signals processing operation is filtering. The most important FIR digital filter are widely used in DSP for filtering to alter the spectrum according to some given specifications. Power consumption and Area complexity in the algorithm of Finite Impulse Response (FIR) filter is mainly caused by multipliers. So we present a multiplier less technique (DA technique). In this technique, precomputed value of inner product is stored in LUT. Which are further added and shifted with number of iterations equal to the precision of input sample. But the exponential growth of LUT with the order of FIR filter, in this basic structure, makes it prohibitive for many applications. The significant area and power reduction over traditional Distributed Arithmetic (DA) structure is presented in this paper, by the use of slicing of LUT to the desired length. An architecture of 16 tap FIR filter is presented, with different length of slice of LUT. The result of FIR Filter implementation on Xilinx ISE synthesis tool (XST) vertex-4 FPGA Tool by using proposed method shows the increase of the maximum frequency, the decrease of the resources as usage saving in area with more number of slices and the reduction dynamic power.

Keywords: multiplier less technique, linear phase symmetric FIR filter, FPGA tool, look up table

Procedia PDF Downloads 383
12401 Magnetohydrodynamics (MHD) Boundary Layer Flow Past A Stretching Plate with Heat Transfer and Viscous Dissipation

Authors: Jiya Mohammed, Tsadu Shuaib, Yusuf Abdulhakeem

Abstract:

The research work focuses on the cases of MHD boundary layer flow past a stretching plate with heat transfer and viscous dissipation. The non-linear of momentum and energy equation are transform into ordinary differential equation by using similarity transformation, the resulting equation are solved using Adomian Decomposition Method (ADM). An attempt has been made to show the potentials and wide range application of the Adomian decomposition method in the comparison with the previous one in solving heat transfer problems. The Pade approximates value (η= 11[11, 11]) is use on the difficulty at infinity. The results are compared by numerical technique method. A vivid conclusion can be drawn from the results that ADM provides highly precise numerical solution for non-linear differential equations. The result where accurate especially for η ≤ 4, a general equating terms of Eckert number (Ec), Prandtl number (Pr) and magnetic parameter ( ) is derived which was used to investigate velocity and temperature profiles in boundary layer.

Keywords: MHD, Adomian decomposition, boundary layer, viscous dissipation

Procedia PDF Downloads 544
12400 Performance Investigation of Unmanned Aerial Vehicles Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion

Authors: Ebrahim H. Kapeel, Ahmed M. Kamel, Hossam Hendy, Yehia Z. Elhalwagy

Abstract:

Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control law is designed for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.

Keywords: attitude control, nonlinear PID, dynamic inversion

Procedia PDF Downloads 99
12399 Pathological Gambling and Impulsivity: Comparison of the Eight Laboratory Measures of Inhibition Capacities

Authors: Semion Kertzman, Pinhas Dannon

Abstract:

Impulsive behaviour and the underlying brain processes are hypothesized to be central in the development and maintenance of pathological gambling. Inhibition ability can be differentially impaired in pathological gamblers (PGs). Aims: This study aimed to compare the ability of eight widely used inhibition measures to discriminate between PGs and healthy controls (HCs). Methods: PGs (N=51) and demographically matched HCs (N=51) performed cognitive inhibition (the Stroop), motor inhibition (the Go/NoGo) and reflective inhibition (the Matching Familiar Figures (MFFT)) tasks. Results: An augmented total interference response time in the Stroop task (η² =0.054), a large number of commission errors (η² =0.053) in the Go/NoGo task, and the total number of errors in the MFFT (η² =0.05) can discriminate PGs from HCs. Other measures are unable to differentiate between PGs and HCs. No significant correlations were observed between inhibition measures. Conclusion: Inhibition measures varied in the ability to discriminate PGs from HCs. Most inhibition measures were not relevant to gambling behaviour. PGs do not express rash, impulsive behaviour, such as quickly choosing an answer without thinking. In contrast, in PGs, inhibition impairment was related to slow-inaccurate performance.

Keywords: pathological gambling, impulsivity, neurocognition, addiction

Procedia PDF Downloads 296
12398 Research on Health Emergency Management Based on the Bibliometrics

Authors: Meng-Na Dai, Bao-Fang Wen, Gao-Pei Zhu, Chen-Xi Zhang, Jing Sun, Chang-Hai Tang, Zhi-Qiang Feng, Wen-Qiang Yin

Abstract:

Based on the analysis of literature in the health emergency management in China with recent 10 years, this paper discusses the Chinese current research hotspots, development trends and shortcomings in this field, and provides references for scholars to conduct follow-up research. CNKI(China National Knowledge Infrastructure), Weipu, and Wanfang were the databases of this literature. The key words during the database search were health, emergency, and management with the time from 2009 to 2018. The duplicate, non-academic, and unrelated documents were excluded. 901 articles were included in the literature review database. The main indicators of abstraction were, the number of articles published every year, authors, institutions, periodicals, etc. There are some research findings through the analysis of the literature. Overall, the number of literature in the health emergency management in China has shown a fluctuating downward trend in recent 10 years. Specifically, there is a lack of close cooperation between authors, which has not constituted the core team among them yet. Meanwhile, in this field, the number of high-level periodicals and quality literature is scarce. In addition, there are a lot of research hotspots, such as emergency management system, mechanism research, capacity evaluation index system research, plans and capacity-building research, etc. In the future, we should increase the scientific research funding of the health emergency management, encourage collaborative innovation among authors in multi-disciplinary fields, and create high-quality and high-impact journals in this field. The states should encourage scholars in this field to carry out more academic cooperation and communication with the whole world and improve the research in breadth and depth. Generally speaking, the research in health emergency management in China is still insufficient and needs to be improved.

Keywords: health emergency management, research situation, bibliometrics, literature

Procedia PDF Downloads 127
12397 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 309
12396 Muslims in Diaspora Negotiating Islam through Muslim Public Sphere and the Role of Media

Authors: Sabah Khan

Abstract:

The idea of universal Islam tends to exaggerate the extent of homogeneity in Islamic beliefs and practices across Muslim communities. In the age of migration, various Muslim communities are in diaspora. The immediate implication of this is what happens to Islam in diaspora? How Islam gets represented in new forms? Such pertinent questions need to be dealt with. This paper shall draw on the idea of religious transnationalism, primarily transnational Islam. There are multiple ways to conceptualize transnational phenomenon with reference to Islam in terms of flow of people, transnational organizations and networks; Ummah oriented solidarity and the new Muslim public sphere. This paper specifically deals with the new Muslim public sphere. It primarily refers to the space and networks enabled by new media and communication technologies, whereby Muslim identity and Islamic normativity are rehearsed, debated by people in different locales. A new sense of public is emerging across Muslim communities, which needs to be contextualized. This paper uses both primary and secondary data. Primary data elicited through content analysis of audio-visuals on social media and secondary sources of information ranging from books, articles, journals, etc. The basic aim of the paper is to focus on the emerging Muslim public sphere and the role of media in expanding public spheres of Islam. It also explores how Muslims in diaspora negotiate Islam and Islamic practices through media and the new Muslim public sphere. This paper cogently weaves in discussions firstly, of re-intellectualization of Islamic discourse in the public sphere. In other words, how Muslims have come to reimagine their collective identity and critically look at fundamental principles and authoritative tradition. Secondly, the emerging alternative forms of Islam by young Muslims in diaspora. In other words, how young Muslims search for unorthodox ways and media for religious articulation, including music, clothing and TV. This includes transmission and distribution of Islam in diaspora in terms of emerging ‘media Islam’ or ‘soundbite Islam’. The new Muslim public sphere has offered an arena to a large number of participants to critically engage with Islam, which leads not only to a critical engagement with traditional forms of Islamic authority but also emerging alternative forms of Islam and Islamic practices.

Keywords: Islam, media, Muslims, public sphere

Procedia PDF Downloads 255
12395 Ideology and the Writer's Commitment to National Development: Profiling the Nigerian Soldier in Isidore Okpewho's ‘The Last Duty and Festus Iyayi's Heroes’

Authors: Edwin Onwuka, Segun Omidiora, Eugenia Abiodun-Eniaiyekan

Abstract:

The Nigerian military is often the subject of active critical inquiries having played significant roles in Nigeria’s national development. However, the soldier is one of the most vilified characters in Nigeria’s imaginative literature, be it in poetry, drama or prose fiction. In the main, the characterization of soldiers is predictable because of their entrenched stereotype as oppressors, tyrants, bullies, rapists, despots, killers or at best law-breakers subject to no authority outside the military institution. In most novels, the soldier’s personality is associated with force and violence; still, few have defied the norm to portray soldiers that go against the grain of notoriety. Such novels have characterized the Nigerian soldier positively as a civil, thinking and human personality in relating to civil society. To a great extent, two major impetuses that influence literary representation of characters and institutions in African literature are ideology and commitment, and one necessarily impacts on the other in shaping the artistic vision of the writer. Using two war novels therefore as templates, this paper argues that the ideology that drives the Nigerian writer’s socio-cultural commitment to national development shapes their portrayal of the Nigerian soldier in imaginative literature. A major objective of this study, therefore, is to show through close textual analysis that the writers’ ideologies influence their perception and characterization of the Nigerian soldier in Isidore Okpewho’s The Last Duty and Festus Iyayi’s Heroes, two representative novels of both persuasions described above. New Historicism is the critical framework applied in this study and its conclusion is that the Nigerian writer’s characterization of the soldier is influenced by his ideological perception of the military in the policy against the backdrop of their past socio-political activities.

Keywords: commitment, ideology, national development, new historicism, Nigerian soldier

Procedia PDF Downloads 244
12394 Implementation of a Novel Modified Multilevel Inverter Topology for Grid Connected PV System

Authors: Dhivya Balakrishnan, Dhamodharan Shanmugam

Abstract:

Multilevel converters offer high power capability, associated with lower output harmonics and lower commutation losses. Their main disadvantage is their complexity requiring a great number of power devices and passive components, and a rather complex control circuitry. This paper proposes a single-phase seven-level inverter for grid connected PV systems, With a novel pulse width-modulated (PWM) control scheme. Three reference signals that are identical to each other with an offset that is equivalent to the amplitude of the triangular carrier signal were used to generate the PWM signals. The inverter is capable of producing seven levels of output-voltage levels from the dc supply voltage. This paper proposes a new multilevel inverter topology using an H-bridge output stage with two bidirectional auxiliary switches. The new topology produces a significant reduction in the number of power devices and capacitors required to implement a multilevel output using the asymmetric cascade configuration.

Keywords: asymmetric cascade configuration, H-Bridge, multilevel inverter, Pulse Width Modulation (PWM)

Procedia PDF Downloads 350
12393 Teaching for Social Justice: Towards Education for Sustainable Development

Authors: Nashwa Moheyeldine

Abstract:

Education for sustainable development (ESD) aims to preserve the rights of the present and future generations as well as preserving the globe, both humans and nature. ESD should aim not only to bring about consciousness of the current and future issues, but also to foster student agency to bring about change at schools, communities and nations. According to the Freirian concept of conscientização, (conscientization) — “learning to perceive social, political, and economic contradictions, and to take action against the oppressive elements of reality”, education aims to liberate people to understand and act upon their worlds. Social justice is greatly intertwined with a nation’s social, political and economic rights, and thus, should be targeted through ESD. “Literacy researchers have found that K-12 students who engage in social justice inquiries develop vital academic knowledge and skills, critical understandings about oppression in the world, and strong dispositions to continue working toward social justice beyond the initial inquiries they conduct”. Education for social justice greatly equips students with the critical thinking skills and sense of agency, that are required for responsible decision making that would ensure a sustainable world. In fact teaching for social justice is intersecting with many of the pedagogies such as multicultural education, cultural relevant pedagogy, education for sustainable development, critical theory pedagogy, (local and global) citizenship education, all of which aim to prepare students for awareness, responsibility and agency. Social justice pedagogy has three specific goals, including helping students develop 1) a sociopolitical consciousness - an awareness of the symbiotic relationship between the social and political factors that affect society, 2) a sense of agency, the freedom to act on one’s behalf and to feel empowered as a change agent, and 3) positive social and cultural identities. The keyword to social justice education is to expose the realities to the students, and challenge the students not only to question , but also to change. Social justice has been usually discussed through the subjects of history and social sciences, however, an interdisciplinary approach is essential to enhance the students’ understanding of their world. Teaching social justice through various subjects is also important, as it make students’ learning relevant to their lives. The main question that this paper seeks to answer is ‘How could social justice be taught through different subjects and tools, such as mathematics, literature through story-telling, geography, and service learning will be shown in this paper. Also challenges to education for social justice will be described. Education is not a neutral endeavor, but is either oriented toward the cause of liberation or in support of domination. In fact , classrooms can be “a microcosm of the emancipatory societies we seek to encourage”, education for the 21st century should be relevant to students' lives where it exposes life's realities to them. Education should also provide students with the basics of school subjects with the bigger goal of helping them make the world a better, more just place to live in.

Keywords: teaching for social justice, student agency, citizenship education, education

Procedia PDF Downloads 398
12392 Runoff Estimation in the Khiyav River Basin by Using the SCS_ CN Model

Authors: F. Esfandyari Darabad, Z. Samadi

Abstract:

The volume of runoff caused by rainfall in the river basin has enticed the researchers in the fields of the water management resources. In this study, first of the hydrological data such as the rainfall and discharge of the Khiyav river basin of Meshkin city in the northwest of Iran collected and then the process of analyzing and reconstructing has been completed. The soil conservation service (scs) has developed a method for calculating the runoff, in which is based on the curve number specification (CN). This research implemented the following model in the Khiyav river basin of Meshkin city by the GIS techniques and concluded the following fact in which represents the usage of weight model in calculating the curve numbers that provides the possibility for the all efficient factors which is contributing to the runoff creation such as; the geometric characteristics of the basin, the basin soil characteristics, vegetation, geology, climate and human factors to be considered, so an accurate estimation of runoff from precipitation to be achieved as the result. The findings also exposed the accident-prone areas in the output of the Khiyav river basin so it was revealed that the Khiyav river basin embodies a high potential for the flood creation.

Keywords: curve number, khiyav river basin, runoff estimation, SCS

Procedia PDF Downloads 610
12391 Non-Autonomous Seasonal Variation Model for Vector-Borne Disease Transferral in Kampala of Uganda

Authors: Benjamin Aina Peter, Amos Wale Ogunsola

Abstract:

In this paper, a mathematical model of malaria transmission was presented with the effect of seasonal shift, due to global fluctuation in temperature, on the increase of conveyor of the infectious disease, which probably alters the region transmission potential of malaria. A deterministic compartmental model was proposed and analyzed qualitatively. Both qualitative and quantitative approaches of the model were considered. The next-generation matrix is employed to determine the basic reproduction number of the model. Equilibrium points of the model were determined and analyzed. The numerical simulation is carried out using Excel Micro Software to validate and support the qualitative results. From the analysis of the result, the optimal temperature for the transmission of malaria is between and . The result also shows that an increase in temperature due to seasonal shift gives rise to the development of parasites which consequently leads to an increase in the widespread of malaria transmission in Kampala. It is also seen from the results that an increase in temperature leads to an increase in the number of infectious human hosts and mosquitoes.

Keywords: seasonal variation, indoor residual spray, efficacy of spray, temperature-dependent model

Procedia PDF Downloads 161
12390 Magneto-Hydrodynamic Mixed Convective Fluid Flow through Two Parallel Vertical Plates Channel with Hall, Chemical Reaction, and Thermal Radiation Effects

Authors: Okuyade Ighoroje Wilson Ata

Abstract:

Magneto-hydrodynamic mixed convective chemically reacting fluid flow through two parallel vertical plates channel with Hall, radiation, and chemical reaction effects are examined. The fluid is assumed to be chemically reactive, electrically conducting, magnetically susceptible, viscous, incompressible, and Newtonian; the plates are porous, electrically conductive, and heated to a high-temperature regime to generate thermal rays. The flow system is highly interactive, such that cross/double diffusion is present. The governing equations are partial differential equations transformed into ordinary differential equations using similarity transformation and solved by the method of Homotopy Perturbation. Expressions for the concentration, temperature, velocity, Nusselt number, Sherwood number, and Wall shear stress are obtained, computed, and presented graphically and tabularly. The analysis of results shows, amongst others, that an increase in the Raleigh number increases the main velocity and temperature but decreases the concentration. More so, an increase in chemical reaction rate increases the main velocity, temperature, rate of heat transfer from the terminal plate, the rate of mass transfer from the induced plate, and Wall shear stress on both the induced and terminal plates, decreasing the concentration, and the mass transfer rate from the terminal plate. Some of the obtained results are benchmarked with those of existing literature and are in consonance.

Keywords: chemical reaction, hall effect, magneto-hydrodynamic, radiation, vertical plates channel

Procedia PDF Downloads 71