Search results for: problem posing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7309

Search results for: problem posing

5029 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 264
5028 Antmicrobial Packaging, a Step Towards Safe Food: A Review

Authors: Hafiz A. Sakandar, M. Afzaal, U. Khan, M. N. Akhtar

Abstract:

Food is the primary concern of living organisms, provision of diet for maintenance of good physical and mental health is a basic right of an individual and the outcome of factors related to diet on health has been matter of apprehension since ancient times. Healthy and fresh food always demanded by the consumers. Modern research has find out many alternatives of traditional packaging. Now the consumer knows that good packaging system is that which protects the food from the contaminants and increases shelf life of food product. While in Pakistan about 40% of fruits and vegetables lost due to spoilage caused by poor handling, transportation, and poor packaging interaction with other environmental conditions. So it is crucial for developing countries like Pakistan to pay attention to these exacerbating situations for economy losses by considering food packaging an ultimate solution to the problem.

Keywords: packaging, food safety, antimicrobial, food losses

Procedia PDF Downloads 552
5027 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 278
5026 Analysis of Stacked SCR-Based ESD Protection Circuit with Low Trigger Voltage and Latch-Up Immunity

Authors: Jun-Geol Park, Kyoung-Il Do, Min-Ju Kwon, Kyung-Hyun Park, Yong-Seo Koo

Abstract:

In this paper, we proposed the SCR (Silicon Controlled Rectifier)-based ESD (Electrostatic Discharge) protection circuit for latch-up immunity. The proposed circuit has a lower trigger voltage and a higher holding voltage characteristic by using the zener diode structure. These characteristics prevent latch-up problem in normal operating conditions. The proposed circuit was analyzed to figure out the electrical characteristics by the variations of design parameters D1, D2 and stack technology to obtain the n-fold electrical characteristics. The simulations are accomplished by using the Synopsys TCAD simulator. When using the stack technology, 2-stack has the holding voltage of 6.9V and 3-stack has the holding voltage of 10.9V.

Keywords: ESD, SCR, trigger voltage, holding voltage

Procedia PDF Downloads 526
5025 Optimization Based Obstacle Avoidance

Authors: R. Dariani, S. Schmidt, R. Kasper

Abstract:

Based on a non-linear single track model which describes the dynamics of vehicle, an optimal path planning strategy is developed. Real time optimization is used to generate reference control values to allow leading the vehicle alongside a calculated lane which is optimal for different objectives such as energy consumption, run time, safety or comfort characteristics. Strict mathematic formulation of the autonomous driving allows taking decision on undefined situation such as lane change or obstacle avoidance. Based on position of the vehicle, lane situation and obstacle position, the optimization problem is reformulated in real-time to avoid the obstacle and any car crash.

Keywords: autonomous driving, obstacle avoidance, optimal control, path planning

Procedia PDF Downloads 370
5024 Promoting 21st Century Skills through Telecollaborative Learning

Authors: Saliha Ozcan

Abstract:

Technology has become an integral part of our lives, aiding individuals in accessing higher order competencies, such as global awareness, creativity, collaborative problem solving, and self-directed learning. Students need to acquire these competencies, often referred to as 21st century skills, in order to adapt to a fast changing world. Today, an ever-increasing number of schools are exploring how engagement through telecollaboration can support language learning and promote 21st century skill development in classrooms. However, little is known regarding how telecollaboration may influence the way students acquire 21st century skills. In this paper, we aim to shed light to the potential implications of telecollaborative practices in acquisition of 21st century skills. In our context, telecollaboration, which might be carried out in a variety of settings both synchronously or asynchronously, is considered as the process of communicating and working together with other people or groups from different locations through online digital tools or offline activities to co-produce a desired work output. The study presented here will describe and analyse the implementation of a telecollaborative project between two high school classes, one in Spain and the other in Sweden. The students in these classes were asked to carry out some joint activities, including creating an online platform, aimed at raising awareness of the situation of the Syrian refugees. We conduct a qualitative study in order to explore how language, culture, communication, and technology merge into the co-construction of knowledge, as well as supporting the attainment of the 21st century skills needed for network-mediated communication. To this end, we collected a significant amount of audio-visual data, including video recordings of classroom interaction and external Skype meetings. By analysing this data, we verify whether the initial pedagogical design and intended objectives of the telecollaborative project coincide with what emerges from the actual implementation of the tasks. Our findings indicate that, as well as planned activities, unplanned classroom interactions may lead to acquisition of certain 21st century skills, such as collaborative problem solving and self-directed learning. This work is part of a wider project (KONECT, EDU2013-43932-P; Spanish Ministry of Economy and Finance), which aims to explore innovative, cross-competency based teaching that can address the current gaps between today’s educational practices and the needs of informed citizens in tomorrow’s interconnected, globalised world.

Keywords: 21st century skills, telecollaboration, language learning, network mediated communication

Procedia PDF Downloads 125
5023 Digital Recording System Identification Based on Audio File

Authors: Michel Kulhandjian, Dimitris A. Pados

Abstract:

The objective of this work is to develop a theoretical framework for reliable digital recording system identification from digital audio files alone, for forensic purposes. A digital recording system consists of a microphone and a digital sound processing card. We view the cascade as a system of unknown transfer function. We expect same manufacturer and model microphone-sound card combinations to have very similar/near identical transfer functions, bar any unique manufacturing defect. Input voice (or other) signals are modeled as non-stationary processes. The technical problem under consideration becomes blind deconvolution with non-stationary inputs as it manifests itself in the specific application of digital audio recording equipment classification.

Keywords: blind system identification, audio fingerprinting, blind deconvolution, blind dereverberation

Procedia PDF Downloads 304
5022 Research Progress on the Correlation between Tinnitus and Sleep Behaviors

Authors: Jiajia Peng

Abstract:

Tinnitus is one of the common symptoms of ear diseases and is characterized by an abnormal perception of sound without external stimulation. Tinnitus is agony and seriously affects the life of the general population by approximately 1%. Sleep disturbance is a common problem in patients with tinnitus. Lack of sleep will lead to the accumulation of metabolites in the brain and cannot be cleared in time. These substances enhance sympathetic nerve reactivity in the auditory system, resulting in tinnitus occurrence or aggravation. Then, tinnitus may aggravate sleep disturbance, thus forming a vicious circle. Through a systematic review of the relevant literature, we summarize the research on tinnitus and sleep. Although the results suggest that tinnitus is often accompanied by sleep disturbance, the impact of unfavorable sleep habits on tinnitus is not clear. In particular, the relationships between sleep behaviors and other chronic diseases have been revealed. To reduce the incidence rate of tinnitus, clinicians should pay attention to the relevance between different sleep behaviors and tinnitus.

Keywords: tinnitus, sleep, sleep factor, sleep behavior

Procedia PDF Downloads 165
5021 Power and Efficiency of Photovoltaic Module: Effect of Cell Temperature

Authors: R. Nasrin, M. Ferdows

Abstract:

Among the renewable energy sources, photovoltaic (PV) is a high potential, effective, and sustainable system. Irradiation intensity from 200 W/m2 to 1000 W/m2 has been considered to observe the performance of PV module. Generally, this module converts only about 15% - 20% of incident irradiation into electrical energy and the rest part is converted into heat energy. Finite element method has been used to solve the problem numerically. Simulation has been performed by considering the ambient temperature 30°C. Higher irradiation increase solar cell temperature and electrical power. The electrical efficiency of PV module decreases with the variation of solar radiation. The efficiency of PV module can be increased if cell temperature is reduced. Thus the effect of irradiation is significant to enhance the efficiency of PV module if the solar cell temperature is kept at a certain level.

Keywords: PV module, solar radiation, efficiency, cell temperature

Procedia PDF Downloads 363
5020 Malnutrition Among Adult Hospitalized Orthopedic Patients: Nursing Role And Nutrition Screening

Authors: Ehsan Ahmed Yahia

Abstract:

Introduction: The nursing role in nutrition screening and assessing hospitalized patients is important. Malnutrition is a common and costly problem, particularly among hospitalized patients, and can have an adverse effect on the healing process. The study's goal is to assess the prevalence of malnutrition among adult hospitalized orthopedic patients and to detect the barriers to the nutrition screening process. Aim of the study: This study aimed to (a) assess the prevalence of malnutrition in hospitalized orthopedic patients and (b) evaluate the relationship between malnutrition and selected clinical outcomes. Material and Methods: This prospective field study was conducted for three months between 03/2022 and 06/2022 in the selected orthopedic departments in a teaching hospital affiliated withCairo University, Egypt. with a total number of one hundred twenty (120) patients. Patients' assessment included checking for malnutrition using the Nutritional Risk Screening Questionnaire. Patients at risk for malnourishment were defined as NRS score ≥ 3. Clinical outcomes under consideration included 1) length of hospitalization, 2) mobilization after surgery and conservative treatment, and 3) rate of adverse events. Results: This study found that malnutrition is a significant problem among patients hospitalized in an orthopedic ward. The prevalence of malnutrition was the highest in patients with lumbar spine and pelvis fractures, followed by the proximal femur and proximal humerus fractures. Patients at risk for malnutrition had significantly prolonged hospitalization, delayed postoperative mobilization, and increased incidence of adverse events.27.8% of the study sample were at risk for malnutrition. The highest prevalence of malnourishment was found in Septic Surgery with 32%, followed by Traumatology with 19.6% and Arthroplasty with 15.3%. A higher prevalence of malnutrition was detected among patients with typical fractures, such as lumbar spine and pelvis (46.7%), proximal femur (34.4%), and proximal humeral (23.7%) fractures. Additionally, patients at risk for malnutrition showed prolonged hospitalization (14.7 ± 11.1 vs. 21.2 ± 11.7 days), delayed postoperative mobilization (2.3 ± 2.9 vs. 4.1 ± 4.9 days), and delayed to mobilize after conservative treatment (1.1 ± 2.7 vs. 1.8 ± 1.9 days). A significant statistical correlation of NRS with individual parameters (Spearman's rank correlation, p < 0.05) was observed. The rate of adverse incidents in patients at risk for malnutrition was significantly higher than that of patients with a regular nutritional status (37.2% vs. 21.1%, p < 0.001). Conclusions: Our results indicate that the prevalence of malnutrition in surgical patients is significant. The nutritional status of patients with typical fractures is especially at risk. Prolonged hospitalization, delayed postoperative mobilization, and delayed mobilization after conservative treatment is significantly associated with malnutrition. In addition, the incidence of adverse events in patients at risk for malnutrition is significantly higher.

Keywords: malnutrition, nutritional risk screening, surgery, nursing, orthopedic nurse

Procedia PDF Downloads 101
5019 Brief Solution-Focused Negotiation: Theory and Application

Authors: Sapir Handelman

Abstract:

Brief Solution Focused Negotiation is a powerful conflict resolution tool. It can be applied in almost all dimensions of our social life, from politics to family. The initiative invites disputing parties to negotiate practical solutions to their conflict. The negotiation is conducted in a framework of rules, structure, and timeline. The paper presents a model of Brief Solution Focused Negotiation that rests on three pillars: Transformation – turning opposing parties into a negotiating cooperative; Practicality – focusing on practical solutions to a negotiable problem; Discovery – discovering key game changers. This paper introduces these three building blocks. It demonstrates the potential contribution of each one of them to negotiation success. It shows that an effective combination of these three elements has the greatest potential to build, maintain and successfully conclude Brief Solution Focused Negotiation.

Keywords: conflict, negotiation, negotiating cooperative, game changer

Procedia PDF Downloads 85
5018 Development of Ultrasounf Probe Holder for Automatic Scanning Asymmetric Reflector

Authors: Nabilah Ibrahim, Hafiz Mohd Zaini, Wan Fatin Liyana Mutalib

Abstract:

Ultrasound equipment or machine is capable to scan in two dimensional (2D) areas. However there are some limitations occur during scanning an object. The problem will occur when scanning process that involving the asymmetric object. In this project, the ultrasound probe holder for asymmetric reflector scanning in 3D image is proposed to make easier for scanning the phantom or object that has asymmetric shape. Initially, the constructed asymmetric phantom that construct will be used in 2D scanning. Next, the asymmetric phantom will be interfaced by the movement of ultrasound probe holder using the Arduino software. After that, the performance of the ultrasound probe holder will be evaluated by using the various asymmetric reflector or phantom in constructing a 3D image

Keywords: ultrasound 3D images, axial and lateral resolution, asymmetric reflector, Arduino software

Procedia PDF Downloads 560
5017 A Novel PSO Based Decision Tree Classification

Authors: Ali Farzan

Abstract:

Classification of data objects or patterns is a major part in most of Decision making systems. One of the popular and commonly used classification methods is Decision Tree (DT). It is a hierarchical decision making system by which a binary tree is constructed and starting from root, at each node some of the classes is rejected until reaching the leaf nods. Each leaf node is a representative of one specific class. Finding the splitting criteria in each node for constructing or training the tree is a major problem. Particle Swarm Optimization (PSO) has been adopted as a metaheuristic searching method for finding the best splitting criteria. Result of evaluating the proposed method over benchmark datasets indicates the higher accuracy of the new PSO based decision tree.

Keywords: decision tree, particle swarm optimization, splitting criteria, metaheuristic

Procedia PDF Downloads 407
5016 Changes in the Subjective Interpretation of Poverty Due to COVID-19: The Case of a Peripheral County of Hungary

Authors: Eszter Siposne Nandori

Abstract:

The paper describes how the subjective interpretation of poverty changed during the COVID-19 pandemic. The results of data collection at the end of 2020 are compared to the results of a similar survey from 2019. The methods of systematic data collection are used to collect data about the beliefs of the population about poverty. The analysis is carried out in Borsod-Abaúj-Zemplén County, one of the most backward areas in Hungary. The paper concludes that poverty is mainly linked to material values, and it did not change from 2019 to 2020. Some slight changes, however, highlight the effect of the pandemic: poverty is increasingly seen as a generational problem in 2020, and another important change is that isolation became more closely related to poverty.

Keywords: Hungary, interpretation of poverty, pandemic, systematic data collection, subjective poverty

Procedia PDF Downloads 129
5015 Assessment of Slope Stability by Continuum and Discontinuum Methods

Authors: Taleb Hosni Abderrahmane, Berga Abdelmadjid

Abstract:

The development of numerical analysis and its application to geomechanics problems have provided geotechnical engineers with extremely powerful tools. One of the most important problems in geotechnical engineering is the slope stability assessment. It is a very difficult task due to several aspects such the nature of the problem, experimental consideration, monitoring, controlling, and assessment. The main objective of this paper is to perform a comparative numerical study between the following methods: The Limit Equilibrium (LEM), Finite Element (FEM), Limit Analysis (LAM) and Distinct Element (DEM). The comparison is conducted in terms of the safety factors and the critical slip surfaces. Through the results, we see the feasibility to analyse slope stability by many methods.

Keywords: comparison, factor of safety, geomechanics, numerical methods, slope analysis, slip surfaces

Procedia PDF Downloads 533
5014 The Influence of Nutritional and Immunological Status on the Prognosis of Head and Neck Cancer

Authors: Ching-Yi Yiu, Hui-Chen Hsu

Abstract:

Objectives: Head and neck cancer (HNC) is a big global health problem in the world. Despite the development of diagnosis and treatment, the overall survival of HNC is still low. The well recognition of the interaction of the host immune system and cancer cells has led to realizing the processes of tumor initiation, progression and metastasis. Many systemic inflammatory responses have been shown to play a crucial role in cancer progression. The pre and post-treatment nutritional and immunological status of HNC patients is a reliable prognostic indicator of tumor outcomes and survivors. Methods: Between July 2020 to June 2022, We have enrolled 60 HNC patients, including 59 males and 1 female, in Chi Mei Medical Center, Liouying, Taiwan. The age distribution was from 37 to 81 years old (y/o), with a mean age of 57.6 y/o. We evaluated the pre-and post-treatment nutritional and immunological status of these HNC patients with body weight, body weight loss, body mass index (BMI), whole blood count including hemoglobin (Hb), lymphocyte, neutrophil and platelet counts, biochemistry including prealbumin, albumin, c-reactive protein (CRP), with the time period of before treatment, post-treatment 3 and 6 months. We calculated the neutrophil-to-lymphocyte ratio (NLR) and platelet-to-lymphocyte ratio (PLR) to assess how these biomarkers influence the outcomes of HNC patients. Results: We have carcinoma of the hypopharynx in 21 cases with 35%, carcinoma of the larynx in 9 cases, carcinoma of the tonsil and tongue every 6 cases, carcinoma soft palate and tongue base every 5 cases, carcinoma of buccal mucosa, retromolar trigone and mouth floor every 2 cases, carcinoma of the hard palate and low lip each 1 case. There were stage I 15 cases, stage II 13 cases, stage III 6 cases, stage IVA 10 cases, and stage IVB 16 cases. All patients have received surgery, chemoradiation therapy or combined therapy. We have wound infection in 6 cases, 2 cases of pharyngocutaneous fistula, flap necrosis in 2 cases, and mortality in 6 cases. In the wound infection group, the average BMI is 20.4 kg/m2; the average Hb is 12.9 g/dL, the average albumin is 3.5 g/dL, the average NLR is 6.78, and the average PLR is 243.5. In the PC fistula and flap necrosis group, the average BMI is 21.65 kg/m2; the average Hb is 11.7 g/dL, the average albumin is 3.15 g/dL, average NLR is 13.28, average PLR is 418.84. In the mortality group, the average BMI is 22.3 kg/m2; the average Hb is 13.58 g/dL, the average albumin is 3.77 g/dL, the average NLR is 6.06, and the average PLR is 275.5. Conclusion: HNC is a big challenging public health problem worldwide, especially in the high prevalence of betel nut consumption area Taiwan. Besides the definite risk factors of smoking, drinking and betel nut related, the other biomarkers may play significant prognosticators in the HNC outcomes. We concluded that the average BMI is less than 22 kg/m2, the average Hb is low than 12.0 g/dL, the average albumin is low than 3.3 g/dL, the average NLR is low than 3, and the average PLR is more than 170, the surgical complications and mortality will be increased, and the prognosis is poor in HNC patients.

Keywords: nutritional, immunological, neutrophil-to-lymphocyte ratio, paltelet-to-lymphocyte ratio.

Procedia PDF Downloads 80
5013 Developing an IT Management Policy: A Proposal

Authors: Robert Gilliland

Abstract:

In any organization, a potential issue can arise and become a problem when management deviates from the standard norms set in the system development process of an IT system and the policies that pertain to it. In these instances, cybersecurity is a big challenge that organizations have to face in safeguarding the data that they generate and use. When a new idea, task, or process begins, specific standards must be followed, along with the policies and procedures that ensure the safeguard of data in the information system within the company. A good IT Strategy and Policy should have individuals who are in charge of overseeing the design, development, implementation, and auditing of these policies. Auditors are people who check to make sure that the issue conforms with the plan that is in place. Management has the ability through the role of the manager to potentially abuse power is given and to direct specific ideas, events, projects, and outcomes that are contrary to the vision or goals of the company.

Keywords: strategic policy, policy management, new policy, strategic planning

Procedia PDF Downloads 136
5012 Numerical Approach for Solving the Hyper Singular Integral Equation in the Analysis of a Central Symmetrical Crack within an Infinite Strip

Authors: Ikram Slamani, Hicheme Ferdjani

Abstract:

This study focuses on analyzing a Griffith crack situated at the center of an infinite strip. The problem is reformulated as a hyper-singular integral equation and solved numerically using second-order Chebyshev polynomials. The primary objective is to calculate the stress intensity factor in mode 1, denoted as K1. The obtained results reveal the influence of the strip width and crack length on the stress intensity factor, assuming stress-free edges. Additionally, a comparison is made with relevant literature to validate the findings.

Keywords: center crack, Chebyshev polynomial, hyper singular integral equation, Griffith, infinite strip, stress intensity factor

Procedia PDF Downloads 145
5011 Protein Tertiary Structure Prediction by a Multiobjective Optimization and Neural Network Approach

Authors: Alexandre Barbosa de Almeida, Telma Woerle de Lima Soares

Abstract:

Protein structure prediction is a challenging task in the bioinformatics field. The biological function of all proteins majorly relies on the shape of their three-dimensional conformational structure, but less than 1% of all known proteins in the world have their structure solved. This work proposes a deep learning model to address this problem, attempting to predict some aspects of the protein conformations. Throughout a process of multiobjective dominance, a recurrent neural network was trained to abstract the particular bias of each individual multiobjective algorithm, generating a heuristic that could be useful to predict some of the relevant aspects of the three-dimensional conformation process formation, known as protein folding.

Keywords: Ab initio heuristic modeling, multiobjective optimization, protein structure prediction, recurrent neural network

Procedia PDF Downloads 206
5010 Existence and Concentration of Solutions for a Class of Elliptic Partial Differential Equations Involving p-Biharmonic Operator

Authors: Debajyoti Choudhuri, Ratan Kumar Giri, Shesadev Pradhan

Abstract:

The perturbed nonlinear Schrodinger equation involving the p-biharmonic and the p-Laplacian operators involving a real valued parameter and a continuous real valued potential function defined over the N- dimensional Euclidean space has been considered. By the variational technique, an existence result pertaining to a nontrivial solution to this non-linear partial differential equation has been proposed. Further, by the Concentration lemma, the concentration of solutions to the same problem defined on the set consisting of those elements where the potential function vanishes as the real parameter approaches to infinity has been addressed.

Keywords: p-Laplacian, p-biharmonic, elliptic PDEs, Concentration lemma, Sobolev space

Procedia PDF Downloads 237
5009 An Improved Cuckoo Search Algorithm for Voltage Stability Enhancement in Power Transmission Networks

Authors: Reza Sirjani, Nobosse Tafem Bolan

Abstract:

Many optimization techniques available in the literature have been developed in order to solve the problem of voltage stability enhancement in power systems. However, there are a number of drawbacks in the use of previous techniques aimed at determining the optimal location and size of reactive compensators in a network. In this paper, an Improved Cuckoo Search algorithm is applied as an appropriate optimization algorithm to determine the optimum location and size of a Static Var Compensator (SVC) in a transmission network. The main objectives are voltage stability improvement and total cost minimization. The results of the presented technique are then compared with other available optimization techniques.

Keywords: cuckoo search algorithm, optimization, power system, var compensators, voltage stability

Procedia PDF Downloads 553
5008 Contrasting The Water Consumption Estimation Methods

Authors: Etienne Alain Feukeu, L. W. Snyman

Abstract:

Water scarcity is becoming a real issue nowadays. Most countries in the world are facing it in their own way based on their own geographical coordinate and condition. Many countries are facing a challenge of a growing water demand as a result of not only an increased population, economic growth, but also as a pressure of the population dynamic and urbanization. In view to mitigate some of this related problem, an accurate method of water estimation and future prediction, forecast is essential to guarantee not only the sufficient quantity, but also a good water distribution and management system. Beside the fact that several works have been undertaken to address this concern, there is still a considerable disparity between different methods and standard used for water prediction and estimation. Hence this work contrast and compare two well-defined and established methods from two countries (USA and South Africa) to demonstrate the inconsistency when different method and standards are used interchangeably.

Keywords: water scarcity, water estimation, water prediction, water forecast.

Procedia PDF Downloads 202
5007 A Novel Spectral Index for Automatic Shadow Detection in Urban Mapping Based on WorldView-2 Satellite Imagery

Authors: Kaveh Shahi, Helmi Z. M. Shafri, Ebrahim Taherzadeh

Abstract:

In remote sensing, shadow causes problems in many applications such as change detection and classification. It is caused by objects which are elevated, thus can directly affect the accuracy of information. For these reasons, it is very important to detect shadows particularly in urban high spatial resolution imagery which created a significant problem. This paper focuses on automatic shadow detection based on a new spectral index for multispectral imagery known as Shadow Detection Index (SDI). The new spectral index was tested on different areas of World-View 2 images and the results demonstrated that the new spectral index has a massive potential to extract shadows effectively and automatically.

Keywords: spectral index, shadow detection, remote sensing images, World-View 2

Procedia PDF Downloads 540
5006 The Effectiveness of Conflict Management of Factories' Employee in Thailand

Authors: Pacharaporn Lekyan

Abstract:

The purpose of this study is to explore the conflict management affecting the workplace and analyze the ability of the prediction of leadership of the headman and the methods to handle the conflict in an organization. The quantitative research and developed the questionnaire in order to collect information from the respondents from 200 samples from leader or manager who worked in frozen food factories in Thailand. The result analysis shows about the problem of the relationship between conflict management factors, leadership, and the confliction in organization. The emotion of the leader in the organization is not the only factor that can affect conflict management but also the emotion of surrounding people which this factor can happen all the time and shows that four out of five factors of interpersonal conflict management have affected on emotion intelligence and also shows that the behaviors of leadership have an influence on conflict management.

Keywords: conflict management, emotional intelligence, leadership, factories' employee

Procedia PDF Downloads 366
5005 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 409
5004 Stress Field Induced By an Interfacial Edge Dislocation in a Multi-Layered Medium

Authors: Aditya Khanna, Andrei Kotousov

Abstract:

A novel method is presented for obtaining the stress field induced by an edge dislocation in a multilayered composite. To demonstrate the applications of the obtained solution, we consider the problem of an interfacial crack in a periodically layered bimaterial medium. The crack is modeled as a continuous distribution of edge dislocations and the Distributed Dislocation Technique (DDT) is utilized to obtain numerical results for the energy release rate (ERR). The numerical results correspond well with previously published results and the comparison serves as a validation of the obtained dislocation solution.

Keywords: distributed dislocation technique, edge dislocation, elastic field, interfacial crack, multi-layered composite

Procedia PDF Downloads 446
5003 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name

Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing

Abstract:

Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.

Keywords: NDN, order-preserving encryption, fuzzy search, privacy

Procedia PDF Downloads 487
5002 Influence of Intermediate Principal Stress on Solution of Planar Stability Problems

Authors: M. Jahanandish, M. B. Zeydabadinejad

Abstract:

In this paper, von Mises and Drucker-Prager yield criteria, as typical ones that consider the effect of intermediate principal stress σ2, have been selected and employed for investigating the influence of σ2 on the solution of a typical stability problem. The bearing capacity factors have been calculated under plane strain condition (strip footing) and axisymmetric condition (circular footing) using the method of stress characteristics together with the criteria mentioned. Different levels of σ2 relative to the other two principal stresses have been considered. While a higher σ2 entry in yield criterion gives a higher bearing capacity; its entry in equilibrium equations (axisymmetric) causes substantial reduction.

Keywords: intermediate principal stress, plane strain, axisymmetric, yield criteria

Procedia PDF Downloads 462
5001 Cross-Cultural Evangelism a Necessity in Contemporary Times: A Case Study of Mission of Diocese on the Niger Anglican Communion to Togo

Authors: Nnatuanya Chinedu Emmanuel

Abstract:

The focus of this research is to point out the importance of mission across nations, tribes, and languages. This is because the message of the gospel is global in nature and as a result, Christians of nations, irrespective of color and denomination, must strive to ensure that this message of transformation is extended to all, notwithstanding their region, locality and color. It is in response to this that this work investigates the evangelization activity of the Diocese on the Niger in Togo, their impacts and activities. The framework of qualitative research was adopted while findings indicate that much work has been done in the areas of human and societal development; notwithstanding, the problem of funding, language barrier, and manpower become a threat to the mission work.

Keywords: cross–cultural Evangelism, diocese on the Niger, Anglican communion, Togo

Procedia PDF Downloads 92
5000 Anti-Money Laundering and Countering of Terrorist Financing: The Role of Domestic Financial Institutions to Prevent Money Laundering

Authors: Dinesh Sivaguru, Kamal Thilakasiri

Abstract:

Preventing money laundering and terrorist financing is a major national and international problem today. Several attempts have been made to prevent money laundering by national and international dimension. These are often counteracted by the multi dynamic nature of the crimes. However, launders are often to use remittance systems to clean their ill-gotten money. This study presents the role of domestic financial institutions and the effective practices and actions should implement within domestic financial institutions to control and prevent financial crimes. This thesis highlights the progress that is required to prevent money laundering and terrorist financing, further it is an original contribution to the knowledge in an under researched field in Sri Lanka.

Keywords: money laundering, terrorists financing, financial institutions, regulatory bodies

Procedia PDF Downloads 236