Search results for: western approach
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15407

Search results for: western approach

12827 PID Sliding Mode Control with Sliding Surface Dynamics based Continuous Control Action for Robotic Systems

Authors: Wael M. Elawady, Mohamed F. Asar, Amany M. Sarhan

Abstract:

This paper adopts a continuous sliding mode control scheme for trajectory tracking control of robot manipulators with structured and unstructured uncertain dynamics and external disturbances. In this algorithm, the equivalent control in the conventional sliding mode control is replaced by a PID control action. Moreover, the discontinuous switching control signal is replaced by a continuous proportional-integral (PI) control term such that the implementation of the proposed control algorithm does not require the prior knowledge of the bounds of unknown uncertainties and external disturbances and completely eliminates the chattering phenomenon of the conventional sliding mode control approach. The closed-loop system with the adopted control algorithm has been proved to be globally stable by using Lyapunov stability theory. Numerical simulations using the dynamical model of robot manipulators with modeling uncertainties demonstrate the superiority and effectiveness of the proposed approach in high speed trajectory tracking problems.

Keywords: PID, robot, sliding mode control, uncertainties

Procedia PDF Downloads 509
12826 Physicochemical Characterization of Coastal Aerosols over the Mediterranean Comparison with Weather Research and Forecasting-Chem Simulations

Authors: Stephane Laussac, Jacques Piazzola, Gilles Tedeschi

Abstract:

Estimation of the impact of atmospheric aerosols on the climate evolution is an important scientific challenge. One of a major source of particles is constituted by the oceans through the generation of sea-spray aerosols. In coastal areas, marine aerosols can affect air quality through their ability to interact chemically and physically with other aerosol species and gases. The integration of accurate sea-spray emission terms in modeling studies is then required. However, it was found that sea-spray concentrations are not represented with the necessary accuracy in some situations, more particularly at short fetch. In this study, the WRF-Chem model was implemented on a North-Western Mediterranean coastal region. WRF-Chem is the Weather Research and Forecasting (WRF) model online-coupled with chemistry for investigation of regional-scale air quality which simulates the emission, transport, mixing, and chemical transformation of trace gases and aerosols simultaneously with the meteorology. One of the objectives was to test the ability of the WRF-Chem model to represent the fine details of the coastal geography to provide accurate predictions of sea spray evolution for different fetches and the anthropogenic aerosols. To assess the performance of the model, a comparison between the model predictions using a local emission inventory and the physicochemical analysis of aerosol concentrations measured for different wind direction on the island of Porquerolles located 10 km south of the French Riviera is proposed.

Keywords: sea-spray aerosols, coastal areas, sea-spray concentrations, short fetch, WRF-Chem model

Procedia PDF Downloads 197
12825 Predicting Machine-Down of Woodworking Industrial Machines

Authors: Matteo Calabrese, Martin Cimmino, Dimos Kapetis, Martina Manfrin, Donato Concilio, Giuseppe Toscano, Giovanni Ciandrini, Giancarlo Paccapeli, Gianluca Giarratana, Marco Siciliano, Andrea Forlani, Alberto Carrotta

Abstract:

In this paper we describe a machine learning methodology for Predictive Maintenance (PdM) applied on woodworking industrial machines. PdM is a prominent strategy consisting of all the operational techniques and actions required to ensure machine availability and to prevent a machine-down failure. One of the challenges with PdM approach is to design and develop of an embedded smart system to enable the health status of the machine. The proposed approach allows screening simultaneously multiple connected machines, thus providing real-time monitoring that can be adopted with maintenance management. This is achieved by applying temporal feature engineering techniques and training an ensemble of classification algorithms to predict Remaining Useful Lifetime of woodworking machines. The effectiveness of the methodology is demonstrated by testing an independent sample of additional woodworking machines without presenting machine down event.

Keywords: predictive maintenance, machine learning, connected machines, artificial intelligence

Procedia PDF Downloads 227
12824 A Case Study of Physical and Psychological Forces in the Nigerian Criminal and Military Interrogations

Authors: Onimisi Ekuh Abdullahi, Lasbat Omoshalewa Akinsemoyin

Abstract:

In Nigeria, over two decades now, there has been a steady increase in the insecurity of human lives and physical properties. In the South-South Nigeria, there is an acute insecurity of militants destroying oil pipe-lines and kidnapping cases; in the Middle-Belt zone, insecurity centers on kidnapping and in a few states crises between Herdsmen and Farmers range like wildfire; in the South-Western zone, kidnapping is vile, in the North-East zone the issue of Boko Haram has become World-wide concern, and in North-west zone, cattle rustlers and religious crisis are of great concern. At the initial stage, the Nigerian Police Force was called upon to quell the crisis. It soon became obvious that the dimension of the crisis was beyond police force. The Nigerian Armed Forces were called to maintain peace and order because the magnitude of the crisis was threatening the national unity and cohesion. The main objective of this paper, was to examine the investigative techniques of criminal by the military in Nigeria. Specifically to examine the physical and psychological force; the abusive techniques and tactics; and suggest modern psychological techniques of interrogating criminals accepted to Human Right Activists and the rule of law. The process is to create room behaviour and practices that carefully monitored the trust and reliability of admissions produced by Psychological manipulative process in Nigeria.

Keywords: military, Nigerian criminal, physical, psychological force

Procedia PDF Downloads 161
12823 From Problem Space to Executional Architecture: The Development of a Simulator to Examine the Effect of Autonomy on Mainline Rail Capacity

Authors: Emily J. Morey, Kevin Galvin, Thomas Riley, R. Eddie Wilson

Abstract:

The key challenges faced by integrating autonomous rail operations into the existing mainline railway environment have been identified through the understanding and framing of the problem space and stakeholder analysis. This was achieved through the completion of the first four steps of Soft Systems Methodology, where the problem space has been expressed via conceptual models. Having identified these challenges, we investigated one of them, namely capacity, via the use of models and simulation. This paper examines the approach used to move from the conceptual models to a simulation which can determine whether the integration of autonomous trains can plausibly increase capacity. Within this approach, we developed an architecture and converted logical models into physical resource models and associated design features which were used to build a simulator. From this simulator, we are able to analyse mixtures of legacy-autonomous operations and produce fundamental diagrams and trajectory plots to describe the dynamic behaviour of mixed mainline railway operations.

Keywords: autonomy, executable architecture, modelling and simulation, railway capacity

Procedia PDF Downloads 85
12822 Recovering Cultural Heritage: Historical Insights into Ethiopia’s Unique Approach and Present Challenges

Authors: Mengistie Zewdu

Abstract:

Ethiopia is an un-colonized African state with rich cultural and natural heritage resources. Due to different reasons, Ethiopia has various cultural heritage resources residing in different countries. Started in the second half of the 19th century, different Ethiopian regimes have been working to recover the country’s cultural heritage treasures. Thus, the purpose of this article is to explore the endeavours that have been exerted to recover the cultural heritage of Ethiopia to their original place. As this article reveals, differed from other African countries’ endeavour for the restitution of their looted cultural treasures, Ethiopia’s approach to recover its cultural heritage is somewhat unique. This paper also argues that, although Ethiopia has been working for a century and a half to restitute its cultural heritages, the endeavours of Ethiopian governments to recover Ethiopia’s priceless cultural heritage have still been minimal. The efforts to recover Ethiopian cultural heritage have shown progress with increasing magnitude. However, large-scale endeavors are still needed to bring back the priceless cultural heritage resources to their country of origin.

Keywords: Ethiopia, cultural heritage, plundered heritage, recovering cultural heritage, endeavor to recover cultural heritage

Procedia PDF Downloads 85
12821 Significance of Transient Data and Its Applications in Turbine Generators

Authors: Chandra Gupt Porwal, Preeti C. Porwal

Abstract:

Transient data reveals much about the machine's condition that steady-state data cannot. New technologies make this information much more available for evaluating the mechanical integrity of a machine train. Recent surveys at various stations indicate that simplicity is preferred over completeness in machine audits throughout the power generation industry. This is most clearly shown by the number of rotating machinery predictive maintenance programs in which only steady-state vibration amplitude is trended while important transient vibration data is not even acquired. Efforts have been made to explain what transient data is, its importance, the types of plots used for its display, and its effective utilization for analysis. In order to demonstrate the value of measuring transient data and its practical application in rotating machinery for resolving complex and persistent issues with turbine generators, the author presents a few case studies that highlight the presence of rotor instabilities due to the shaft moving towards the bearing centre in a 100 MM LMZ unit located in the Northern Capital Region (NCR), heavy misalignment noticed—especially after 2993 rpm—caused by loose coupling bolts, which prevented the machine from being synchronized for more than four months in a 250 MW KWU unit in the Western Region (WR), and heavy preload noticed at Intermediate pressure turbine (IPT) bearing near HP- IP coupling, caused by high points on coupling faces at a 500 MW KWU unit in the Northern region (NR), experienced at Indian power plants.

Keywords: transient data, steady-state-data, intermediate -pressure-turbine, high-points

Procedia PDF Downloads 71
12820 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services

Authors: A. Al Drees, A. Alahmari, R. Almuwayshir

Abstract:

The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.

Keywords: e-banking, account aggregation, security, enterprise development

Procedia PDF Downloads 334
12819 Toxicity Identification and Evaluation for the Effluent from Seawater Desalination Facility in Korea Using D. magna and V. fischeri

Authors: Sung Jong Lee, Hong Joo Ha, Chun Sang Hong

Abstract:

In recent years, the interests on the impacts of industrial wastewater on aquatic ecosystem have increased with concern about ecosystem protection and human health. Whole effluent toxicity tests are used to monitor toxicity by unknown toxic chemicals as well as conventional pollutants from industrial effluent discharges. This study describes the application of TIE (toxicity identification evaluation) procedures to an acutely toxic effluent from a Seawater desalination facility in industrial complex which was toxic to Daphnia magna. In TIE phase I (characterization step), the toxic effects by heavy metals, organic compounds, oxidants, volatile organic compounds, suspended solids and ammonia were screened and revealed that the source of toxicity is far from these toxicants group. Chemical analysis (TIE phase II) on TDS showed that the concentration of chloride ion (24,215 ~ 29,562 mg/L) was substantially higher than that predicted from EC50 for D. magna. In confirmation step (TIE phase III), chloride ion was demonstrated to be main toxicant in this effluent by the spiking approach, species sensitivity approach, and deletion approach. Calcium, potassium, magnesium, sodium, fluorine, sulfate ion concentration was not shown toxicity from D. magna. Finally, we concluded that chloride was the most contributing toxicant in the waste water treatment plant. Further research activities are needed for technical support of toxicity identification and evaluation on the various types of wastewater treatment plant discharge in Korea. Acknowledgement: This research was supported by a grant (16IFIP-B089911-03) from Plant Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: TIE, D. magna, V. fischeri, seawater desalination facility

Procedia PDF Downloads 261
12818 Modified Naive Bayes-Based Prediction Modeling for Crop Yield Prediction

Authors: Kefaya Qaddoum

Abstract:

Most of greenhouse growers desire a determined amount of yields in order to accurately meet market requirements. The purpose of this paper is to model a simple but often satisfactory supervised classification method. The original naive Bayes have a serious weakness, which is producing redundant predictors. In this paper, utilized regularization technique was used to obtain a computationally efficient classifier based on naive Bayes. The suggested construction, utilized L1-penalty, is capable of clearing redundant predictors, where a modification of the LARS algorithm is devised to solve this problem, making this method applicable to a wide range of data. In the experimental section, a study conducted to examine the effect of redundant and irrelevant predictors, and test the method on WSG data set for tomato yields, where there are many more predictors than data, and the urge need to predict weekly yield is the goal of this approach. Finally, the modified approach is compared with several naive Bayes variants and other classification algorithms (SVM and kNN), and is shown to be fairly good.

Keywords: tomato yield prediction, naive Bayes, redundancy, WSG

Procedia PDF Downloads 238
12817 A Conceptual Model of Social Entrepreneurial Intention Based on the Social Cognitive Career Theory

Authors: Anh T. P. Tran, Harald Von Korflesch

Abstract:

Entrepreneurial intention play a major role in entrepreneurship academia and practice. The spectrum ranges from the first model of the so-called Entrepreneurial Event, then the Theory of Planned Behavior, the Theory of Planned Behavior Entrepreneurial Model, and the Social Cognitive Career Theory to some typical empirical studies with more or less diverse results. However, little is known so far about the intentions of entrepreneurs in the social areas of venture creation. It is surprising that, since social entrepreneurship is an emerging field with growing importance. Currently, all around the world, there is a big challenge with a lot of urgent soaring social and environmental problems such as poor households, people with disabilities, HIV/AIDS infected people, the lonely elderly, or neglected children, some of them even actual in the Western countries. In addition, the already existing literature on entrepreneurial intentions demonstrates a high level of theoretical diversity in general, especially the missing link to the social dimension of entrepreneurship. Seeking to fill the mentioned gaps in the social entrepreneurial intentions literature, this paper proposes a conceptual model of social entrepreneurial intentions based on the Social Cognitive Career Theory with two main factors influencing entrepreneurial intentions namely self-efficacy and outcome expectation. Moreover, motives, goals and plans do not arise from empty nothingness, but are shaped by interacting with the environment. Hence, personalities (i.e., agreeableness, conscientiousness, extraversion, neuroticism, openness) as well as contextual factors (e.g., role models, education, and perceived support) are also considered as the antecedents of social entrepreneurship intentions.

Keywords: entrepreneurial intention, social cognitive career theory, social entrepreneurial intention, social entrepreneurship

Procedia PDF Downloads 478
12816 Effective Retirement Planning: Exploring Financial Planning Behavior in Malaysia

Authors: Stanley Yap Peng Lok, Chong Wei Ying, Leow Hon Wei, Fatemeh Kimiyaghalam

Abstract:

Purpose: This paper examines how people treat on the importance of financial planning for their retirement. There is lack of standard instrument that enable us to access the retirement planning behavior. This paper studies the reliability and validity of a proposed scale for accessing this behavior. Design/methodology/approach: The Retirement Planning Behavior scale (RPB) is developed from the results of reviewing different papers on this topic. A total of 900 Malaysians from the age of 18 and above are used as the sample. Findings: Our results show, firstly, the RPB meets all criteria from the instrument reliability and validity which based on the theory of planned behavior. Second, our findings propose two components for this RPB scale; attitude toward planning for retirement and intention towards retirement planning behavior. Practical implication: An effective retirement planning achieves financial independence after the retirement. Our findings have important implications for the scope and significance of the retirement planning behavior measurement, especially for retirees. Originality/value: This study proposes a new approach to cater consumers’ needs for retirement planning. Therefore, consumers are able to achieve financial independence in their retirement age.

Keywords: retirement planning behavior (RPB) scale, reliability, validity, retirement planning, financial independence

Procedia PDF Downloads 411
12815 Designing a Model to Increase the Flow of Circular Economy Startups Using a Systemic and Multi-Generational Approach

Authors: Luís Marques, João Rocha, Andreia Fernandes, Maria Moura, Cláudia Caseiro, Filipa Figueiredo, João Nunes

Abstract:

The implementation of circularity strategies other than recycling, such as reducing the amount of raw material, as well as reusing or sharing existing products, remains marginal. The European Commission announced that the transition towards a more circular economy could lead to the net creation of about 700,000 jobs in Europe by 2030, through additional labour demand from recycling plants, repair services and other circular activities. Efforts to create new circular business models in accordance with completely circular processes, as opposed to linear ones, have increased considerably in recent years. In order to create a societal Circular Economy transition model, it is necessary to include innovative solutions, where startups play a key role. Early-stage startups based on new business models according to circular processes often face difficulties in creating enough impact. The StartUp Zero Program designs a model and approach to increase the flow of startups in the Circular Economy field, focusing on a systemic decision analysis and multi-generational approach, considering Multi-Criteria Decision Analysis to support a decision-making tool, which is also supported by the use of a combination of an Analytical Hierarchy Process and Multi-Attribute Value Theory methods. We define principles, criteria and indicators for evaluating startup prerogatives, quantifying the evaluation process in a unique result. Additionally, this entrepreneurship program spanning 16 months involved more than 2400 young people, from ages 14 to 23, in more than 200 interaction activities.

Keywords: circular economy, entrepreneurship, startups;, multi-criteria decision analysis

Procedia PDF Downloads 108
12814 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 251
12813 Capturing the Stress States in Video Conferences by Photoplethysmographic Pulse Detection

Authors: Jarek Krajewski, David Daxberger

Abstract:

We propose a stress detection method based on an RGB camera using heart rate detection, also known as Photoplethysmography Imaging (PPGI). This technique focuses on the measurement of the small changes in skin colour caused by blood perfusion. A stationary lab setting with simulated video conferences is chosen using constant light conditions and a sampling rate of 30 fps. The ground truth measurement of heart rate is conducted with a common PPG system. The proposed approach for pulse peak detection is based on a machine learning-based approach, applying brute force feature extraction for the prediction of heart rate pulses. The statistical analysis showed good agreement (correlation r = .79, p<0.05) between the reference heart rate system and the proposed method. Based on these findings, the proposed method could provide a reliable, low-cost, and contactless way of measuring HR parameters in daily-life environments.

Keywords: heart rate, PPGI, machine learning, brute force feature extraction

Procedia PDF Downloads 125
12812 Participants’ Perception and a Student Protest of Peking University in 2014

Authors: Ruanzhenghao Shi

Abstract:

Student movements have persisted in mainland China, especially in elite universities since the Tiananmen Prodemocracy Movement, contrary to the lack of studies on them. However, the participants' repertoire, mobilization and mode of interaction with authorities are vastly different from their predecessors in the 1980s as well as their western counterparts. In most of the cases, agents, cognizant of the high cost of action and their vulnerability to the authorities, consciously curtailed certain repertoire and themes of resistance. Thus these movements, without appreciable organized force, were self-interested, fragmentally mobilized, lowly integrated and limited within the campus. This study documents the 2014 protest against Yanching Academy program at Peking University, a top-tier Chinese university that played the leading role in the 1989 protest. The 2014 case is different from abovementioned trend of submissive resistance in the last twenty years, insofar as it is a value-oriented and emotion-driven collective action with the resurgence of some repertoire. The participants perceived the university's contemporary ineffectiveness and clumsiness in control and administration, higher Party authorities' indifference to less-political themes, and an increasing number of potential advocates, including students, intellectuals and social media. It shows that resisters' perception of their relative strength to their opponents - in this case, the university and its system for controlling students - under specific circumstances, not merely political opportunities or institutional changes, stimulates the participants and thus contributes to the mobilization and organization of a collective action, even under severe social control.

Keywords: collective action, China, university students, resistance

Procedia PDF Downloads 154
12811 Interpreting Possibilities: Teaching Without Borders

Authors: Mira Kadric

Abstract:

The proposed paper deals with a new developed approach for interpreting teaching, combining traditional didactics with a new element. The fundamental principle of the approach is taken from the theatre pedagogy (Augusto Boal`s Theatre of the Oppressed) and includes the discussion on social power relations. From the point of view of education sociology this implies strengthening students’ individual potential for self-determination on a number of levels, especially in view of the present increase in social responsibility. This knowledge constitutes a starting point and basis for the process of self-determined action. This takes place in the context of a creative didactic policy which identifies didactic goals, provides clear sequences of content, specifies interdisciplinary methods and examines their practical adequacy and ultimately serves not only individual translators and interpreters, but all parties involved. The goal of the presented didactic model is to promote independent work and problem-solving strategies; this helps to develop creative potential and self-confident behaviour. It also conveys realistic knowledge of professional reality and thus also of the real socio-political and professional parameters involved. As well as providing a discussion of fundamental questions relevant to Translation and Interpreting Studies, this also serves to improve this interdisciplinary didactic approach which simulates interpreting reality and illustrates processes and strategies which (can) take place in real life. This idea is illustrated in more detail with methods taken from the Theatre of the Oppressed created by Augusto Boal. This includes examples from (dialogue) interpreting teaching based on documentation from recordings made in a seminar in the summer term 2014.

Keywords: augusto boal, didactic model, interpreting teaching, theatre of the oppressed

Procedia PDF Downloads 434
12810 CFD Study of Subcooled Boiling Flow at Elevated Pressure Using a Mechanistic Wall Heat Partitioning Model

Authors: Machimontorn Promtong, Sherman C. P. Cheung, Guan H. Yeoh, Sara Vahaji, Jiyuan Tu

Abstract:

The wide range of industrial applications involved with boiling flows promotes the necessity of establishing fundamental knowledge in boiling flow phenomena. For this purpose, a number of experimental and numerical researches have been performed to elucidate the underlying physics of this flow. In this paper, the improved wall boiling models, implemented on ANSYS CFX 14.5, were introduced to study subcooled boiling flow at elevated pressure. At the heated wall boundary, the Fractal model, Force balance approach and Mechanistic frequency model are given for predicting the nucleation site density, bubble departure diameter, and bubble departure frequency. The presented wall heat flux partitioning closures were modified to consider the influence of bubble sliding along the wall before the lift-off, which usually happens in the flow boiling. The simulation was performed based on the Two-fluid model, where the standard k-ω SST model was selected for turbulence modelling. Existing experimental data at around 5 bars were chosen to evaluate the accuracy of the presented mechanistic approach. The void fraction and Interfacial Area Concentration (IAC) are in good agreement with the experimental data. However, the predicted bubble velocity and Sauter Mean Diameter (SMD) are over-predicted. This over-prediction may be caused by consideration of only dispersed and spherical bubbles in the simulations. In the future work, the important physical mechanisms of bubbles, such as merging and shrinking during sliding on the heated wall will be incorporated into this mechanistic model to enhance its capability for a wider range of flow prediction.

Keywords: subcooled boiling flow, computational fluid dynamics (CFD), mechanistic approach, two-fluid model

Procedia PDF Downloads 320
12809 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 144
12808 The Determinants of Behavioral Intention to Use toward T-Cash Services Provider in Jakarta and Surburban Area

Authors: Stephen Coandadiputra, Chrestella Carissa

Abstract:

Technology is created to simplify human’s life. One of current technology which being called as the second wave internet generation is the internet of things. Internet of things lets thousands of devices connected each other. In today's marketing world, IOT has brought customer into the next level which helping the customer to shorten every transaction they are conducting from traditional approach to sophisticated approach. However, the implementation of technology has always obstacles. The objective of this paper is to explore the determinants of customer to accepts such technology like the internet of things within their transaction. According to TAM (Technology Acceptance Model), researcher constructs the acceptance of internet of things based on perceived usefulness, perceived ease of use and trust and social factor and the two customer characteristics: perceived enjoyment and perceived behavioral control. This research uses exploratory research design which being facilitated by spreading questionnaire to 145 T-cash users in Jakarta and in its suburban region. At least, 190 samples were observed and questioned accordingly. All the collected data will be analyzed using Lisrel.

Keywords: behavioral intention to use, internet of things, near field communication, technology acceptance model

Procedia PDF Downloads 337
12807 Development of a Methodology for Surgery Planning and Control: A Management Approach to Handle the Conflict of High Utilization and Low Overtime

Authors: Timo Miebach, Kirsten Hoeper, Carolin Felix

Abstract:

In times of competitive pressures and demographic change, hospitals have to reconsider their strategies as a company. Due to the fact, that operations are one of the main income and one of the primary cost drivers otherwise, a process-oriented approach and an efficient use of resources seems to be the right way for getting a consistent market position. Thus, the efficient operation room occupancy planning is an important cause variable for the success and continued the existence of these institutions. A high utilization of resources is essential. This means a very high, but nevertheless sensible capacity-oriented utilization of working systems that can be realized by avoiding downtimes and a thoughtful occupancy planning. This engineering approach should help hospitals to reach her break-even point. Firstly, the aim is to establish a strategy point, which can be used for the generation of a planned throughput time. Secondly, the operation planning and control should be facilitated and implemented accurately by the generation of time modules. More than 100,000 data records of the Hannover Medical School were analyzed. The data records contain information about the type of conducted operation, the duration of the individual process steps, and all other organizational-specific data such as an operating room. Based on the aforementioned data base, a generally valid model was developed by an analysis to define a strategy point which takes the conflict of capacity utilization and low overtime into account. Furthermore, time modules were generated in this work, which allows a simplified and flexible operation planning and control for the operation manager. By the time modules, it is possible to reduce a high average value of the idle times of the operation rooms. Furthermore, the potential is used to minimize the idle time spread.

Keywords: capacity, operating room, surgery planning and control, utilization

Procedia PDF Downloads 254
12806 Pyrolysis of the Reed (Phragmites australis) and Evaluation of Pyrolysis Products

Authors: Ahmet Helvaci, Selcuk Dogan

Abstract:

Reed in especially almost all the lakes in Western Anatolia grows naturally. Due to the abundance of reed, pyrolysis of reed is very economical and practical application. In this study, it is aimed to determine the optimum conditions for the pyrolysis of the reed which is a cheap and abundant raw material and to evaluate pyrolysis products. For this purpose, reed was used obtained from Eber Lake located in the borders of Bolvadin county of Afyonkarahisar. Optimum pyrolysis conditions have been determined by examining the effects of changes in pyrolysis temperature and pyrolysis time. The evaluation of the obtained liquid and solid pyrolysis products has been investigated. Especially evaluability of solid carbon black production of tires has been investigated. Tire samples were prepared with carbon black samples obtained as a result of the pyrolysis process at different temperatures. Then, performance tests were made and compared with reference carbon blacks, used in the market and standards. At the same time, surface area measurement analysis of carbon black samples was made and compared again with reference carbon blacks. In addition, the fuel values of liquid products were also determined by calorimeter. It has been determined that the best surface area (about 370 m²/g) for carbon black samples, for tire production is 40 minutes at 500ᵒC. It was also found that the best result for evaluation studies in tire production was carbon black samples obtained at 450ᵒC pyrolysis temperature. In addition, it was seen that the calorimetry results of the liquid product obtained during 60 minutes of pyrolysis were quite good (around 5500 kcal/kg).

Keywords: evaluation of products, optimization, pyrolysis, reed

Procedia PDF Downloads 193
12805 The Modification of the Mixed Flow Pump with Respect to Stability of the Head Curve

Authors: Roman Klas, František Pochylý, Pavel Rudolf

Abstract:

This paper is focused on the CFD simulation of the radiaxial pump (i.e. mixed flow pump) with the aim to detect the reasons of Y-Q characteristic instability. The main reasons of pressure pulsations were detected by means of the analysis of velocity and pressure fields within the pump combined with the theoretical approach. Consequently, the modifications of spiral case and pump suction area were made based on the knowledge of flow conditions and the shape of dissipation function. The primary design of pump geometry was created as the base model serving for the comparison of individual modification influences. The basic experimental data are available for this geometry. This approach replaced the more complicated and with respect to convergence of all computational tasks more difficult calculation for the compressible liquid flow. The modification of primary pump consisted in inserting the three fins types. Subsequently, the evaluation of pressure pulsations, specific energy curves and visualization of velocity fields were chosen as the criterion for successful design.

Keywords: CFD, radiaxial pump, spiral case, stability

Procedia PDF Downloads 397
12804 Meaningfulness of Right to Life in Holy Quran

Authors: Masoud Raei, Mohammadmahdi Sadeghi

Abstract:

The right to life as the most essential right in human rights issues and in the first group has devoted a special place to itself. Attention to this right and its domain and its reflection in civil rights is one of the most important axis of the rights to life issues. Issues discussed concerning this matter in public law with regard to its status in human rights are the determination of government’s duty toward identification; application and guarantee of this right. The constitutions of countries have chosen different approaches towards the identification of this right and also its limits and boundaries, determining the territory of governments for citizens. The reason for such a difference is the question arising in this regard. It is claimed that without the determination of meaningfulness of the right to life, it is not possible to provide a clear response to this question. The goal of this paper is to justify its theoretical framework from the view of meaningfulness of right to life relying on Quranic verses with a conceptual approach towards the right to life so that the relationship between government and citizens with regard to right to life is determined. Through a comparative study, it is possible to attain significant differences between the teachings of the Holy Quran and human rights documents. The method of this paper is a descriptive-analytic approach relying on interpretation books on Holy Quran.

Keywords: meaningfulness, objectivism, separatism, right to life

Procedia PDF Downloads 308
12803 Modeling Food Popularity Dependencies Using Social Media Data

Authors: DEVASHISH KHULBE, MANU PATHAK

Abstract:

The rise in popularity of major social media platforms have enabled people to share photos and textual information about their daily life. One of the popular topics about which information is shared is food. Since a lot of media about food are attributed to particular locations and restaurants, information like spatio-temporal popularity of various cuisines can be analyzed. Tracking the popularity of food types and retail locations across space and time can also be useful for business owners and restaurant investors. In this work, we present an approach using off-the shelf machine learning techniques to identify trends and popularity of cuisine types in an area using geo-tagged data from social media, Google images and Yelp. After adjusting for time, we use the Kernel Density Estimation to get hot spots across the location and model the dependencies among food cuisines popularity using Bayesian Networks. We consider the Manhattan borough of New York City as the location for our analyses but the approach can be used for any area with social media data and information about retail businesses.

Keywords: Web Mining, Geographic Information Systems, Business popularity, Spatial Data Analyses

Procedia PDF Downloads 118
12802 Motives and Barriers of Using Airbnb: Findings from Mixed Method Approach

Authors: Ghada Mohammed, Mohamed Abdel Salam, Passent Tantawi

Abstract:

The study aimed to investigate the impact of motives and barriers for Egyptian users to use Airbnb as a platform of peer-to-peer accommodation instead of hotels on overall attitude towards Airbnb. A sequential mixed-methods approach was adopted to this study and it proposed a comprehensive research model adapted from both literature and results of qualitative phase and then tested via an online questionnaire. The findings revealed that, motives, price, home benefits, privacy, and online reviews significantly explained overall attitude towards Airbnb, while the main barriers were respectively: perceived risk and distrust in which they can predict the overall attitude. While from the subjective norms, only social influence can predict behavioral intention to use Airbnb. The study may serve as a practical reference for practitioners as well as researchers when developing programs and strategies to manage Airbnb consumers' needs and decision process. Some of the main conclusions drawn from this study are that variety was one of the major things that users like about Airbnb and the most important motives are the functional ones like price rather than the experiential ones like authenticity.

Keywords: airbnb, barriers, disruptive innovation, motives, sharing economy

Procedia PDF Downloads 148
12801 Multi-Disciplinary Optimisation Methodology for Aircraft Load Prediction

Authors: Sudhir Kumar Tiwari

Abstract:

The paper demonstrates a methodology that can be used at an early design stage of any conventional aircraft. This research activity assesses the feasibility derivation of methodology for aircraft loads estimation during the various phases of design for a transport category aircraft by utilizing potential of using commercial finite element analysis software, which may drive significant time saving. Early Design phase have limited data and quick changing configuration results in handling of large number of load cases. It is useful to idealize the aircraft as a connection of beams, which can be very accurately modelled using finite element analysis (beam elements). This research explores the correct approach towards idealizing an aircraft using beam elements. FEM Techniques like inertia relief were studied for implementation during course of work. The correct boundary condition technique envisaged for generation of shear force, bending moment and torque diagrams for the aircraft. The possible applications of this approach are the aircraft design process, which have been investigated.

Keywords: multi-disciplinary optimization, aircraft load, finite element analysis, stick model

Procedia PDF Downloads 356
12800 The Mediterranean Migration Crisis: The North East Hotspot Policy

Authors: Loizos A. Hadjivasiliou, May Chehab

Abstract:

Confronted with the human tragedy unfolding in the Mediterranean during the 2011-2016 period, the European Union introduced for the first time the “hotspot approach”, the establishment of facilities for initial reception, identification registration, and fingerprinting of asylum seekers and migrants arriving in the EU by sea, at the frontline Member States. However, the lack of a comprehensive collective policy on migration management and border security left the Mediterranean Member States, mainly Italy, Greece, and Cyprus, struggling to overcome these challenges. The current study sheds light on the implementation of the hotspot approach as the frontispiece of the European response to the migration challenges, which, limited to the operational and financial support of the hosting member states, leads to heterogeneous burden-sharing. Within this framework, it highlights the fact that the implementation of the hotspots as a panacea carries the risk of transforming the Mediterranean member states into giant hotspots with unpredictable consequences for the future of the Schengen area.

Keywords: asylum, burden sharing, hotspots, migration management policy, Schengen area

Procedia PDF Downloads 179
12799 High-Capacity Image Steganography using Wavelet-based Fusion on Deep Convolutional Neural Networks

Authors: Amal Khalifa, Nicolas Vana Santos

Abstract:

Steganography has been known for centuries as an efficient approach for covert communication. Due to its popularity and ease of access, image steganography has attracted researchers to find secure techniques for hiding information within an innocent looking cover image. In this research, we propose a novel deep-learning approach to digital image steganography. The proposed method, DeepWaveletFusion, uses convolutional neural networks (CNN) to hide a secret image into a cover image of the same size. Two CNNs are trained back-to-back to merge the Discrete Wavelet Transform (DWT) of both colored images and eventually be able to blindly extract the hidden image. Based on two different image similarity metrics, a weighted gain function is used to guide the learning process and maximize the quality of the retrieved secret image and yet maintaining acceptable imperceptibility. Experimental results verified the high recoverability of DeepWaveletFusion which outperformed similar deep-learning-based methods.

Keywords: deep learning, steganography, image, discrete wavelet transform, fusion

Procedia PDF Downloads 94
12798 SVM-Based Modeling of Mass Transfer Potential of Multiple Plunging Jets

Authors: Surinder Deswal, Mahesh Pal

Abstract:

The paper investigates the potential of support vector machines based regression approach to model the mass transfer capacity of multiple plunging jets, both vertical (θ = 90°) and inclined (θ = 60°). The data set used in this study consists of four input parameters with a total of eighty eight cases. For testing, tenfold cross validation was used. Correlation coefficient values of 0.971 and 0.981 (root mean square error values of 0.0025 and 0.0020) were achieved by using polynomial and radial basis kernel functions based support vector regression respectively. Results suggest an improved performance by radial basis function in comparison to polynomial kernel based support vector machines. The estimated overall mass transfer coefficient, by both the kernel functions, is in good agreement with actual experimental values (within a scatter of ±15 %); thereby suggesting the utility of support vector machines based regression approach.

Keywords: mass transfer, multiple plunging jets, support vector machines, ecological sciences

Procedia PDF Downloads 465