Search results for: Coulter counter
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 471

Search results for: Coulter counter

411 An Australian Central Bank Digital Currency: Developing a Framework for Calibrating National Security and Privacy Considerations

Authors: Nancy Michail, Niloufer Selvadurai, Doron Goldbarsht

Abstract:

This study analyses the development of a central bank digital currency (CBDC) in Australia and the framework being developed to ensure that national security and privacy considerations are appropriately addressed. Through the use of doctrinal methodology, the research closely and critically examines current legislation and regulation on privacy federal laws and the need to comply with anti-money laundering and counter-terrorism financing laws (AML/CTF). It is argued that the introduction of CBDCs may lead to potential tension between the application of AML/CTF laws and the upholding of individuals’ fundamental and legislated rights to privacy; therefore, it emphasises the need for clear delineation of ambits and support between different laws and regulations to ensure they operate within their intended purposes and suggests that the calibration of potential tensions between AML/CTF and privacy laws may be achieved through the innovative application of the proportionality principle.

Keywords: anti-money laundering and counter terrorism financing, central bank digital currency, privacy, proportionality principle

Procedia PDF Downloads 23
410 A Combined CFD Simulation of Plateau Borders including Films and Transitional Areas of Liquid Foams

Authors: Abdolhamid Anazadehsayed, Jamal Naser

Abstract:

An integrated computational fluid dynamics model is developed for a combined simulation of Plateau borders, films, and transitional areas between the film and the Plateau borders to reduce the simplifications and shortcomings of available models for foam drainage in micro-scale. Additionally, the counter-flow related to the Marangoni effect in the transitional area is investigated. The results of this combined model show the contribution of the films, the exterior Plateau borders, and Marangoni flow in the drainage process more accurately since the inter-influence of foam's elements is included in this study. The exterior Plateau borders flow rate can be four times larger than the interior ones. The exterior bubbles can be more prominent in the drainage process in cases where the number of the exterior Plateau borders increases due to the geometry of container. The ratio of the Marangoni counter-flow to the Plateau border flow increases drastically with an increase in the mobility of air-liquid interface. However, the exterior bubbles follow the same trend with much less intensity since typically, the flow is less dependent on the interface of air-liquid in the exterior bubbles. Moreover, the Marangoni counter-flow in a near-wall transition area is less important than an internal one. The influence of air-liquid interface mobility on the average velocity of interior foams is attained with more accuracy with more realistic boundary condition. Then it has been compared with other numerical and analytical results. The contribution of films in the drainage is significant for the mobile foams as the velocity of flow in the film has the same order of magnitude as the velocity in the Plateau border. Nevertheless, for foams with rigid interfaces, film's contribution in foam drainage is insignificant, particularly for the films near the wall of the container.

Keywords: foam, plateau border, film, Marangoni, CFD, bubble

Procedia PDF Downloads 317
409 Street Art Lenses: A Glimpse into the Street Artists’ Identity and Socio-Political Perspective in Brussels

Authors: José Francisco Urrutia Reyes, Judith Espinosa Real

Abstract:

This paper is meant to re-examine the role of street art in the contemporary world. By studying this form of art in Brussels, it can be explained how murals show the socio-political reality of a given community and influence on its interaction. Through the definitions of street art, murals and street artists, and analysing their role in Brussels, it is possible to understand how this counter culture movement serves as an engine of social development, as it interacts with its surroundings sending a clear message to a wider audience. Street art impacts on its environment because it interacts with the people who occupies the day-to-day public space. This has proven to be effective in the arouse of social consciousness, up to the point of being adopted by the government of Brussels to promote social movements such as the AIDS-HIV campaign along with the Plate-Forme Prévention Sida. It can be concluded that street art has evolved since its vandalic beginnings, to become a form of art that has not lost it counter official status, but now has a critical vision that can promote social awakening. Street art is now a global trend that uses visual inputs to create a positive impact.

Keywords: street art, Brussels, social impact, political perspective

Procedia PDF Downloads 325
408 Critical Analysis of Ideology of Non-Religious Spirituality (SBNR) Case Study of Sam Harris’ Theory

Authors: Muhammad Samiullah

Abstract:

Religion and spirit always goes side by side. In this era spirit and religion are studied separately with thought of an anti-religious phenomenon is there with its vast impacts. Non-religious mind and religious one have a lot of things that differs, they have spiritual struggles.so there is theme arises that is in the name of non-religious spirituality(SBNR). The thinking prevailing in west and now in east in reverse of the religious institutional thought and spirituality. Religious disputes created an image to the world that is nontolerant and companionate, rising a question of god existence and self-existence. Thus giving rise in Atheism, nihilism, free thinking. The thinking of spirituality also gone in another side with superstitions and spiritual meditation. Christian religious bodies and scholar criticized the stance with their religious aspect but there should be an Islamic counter narrative should be there. Here in this dissertation the phenomenon is addressed and analyzed in respect with some of the literature presented from 2014 till present year. The phenomenon was not analyzed before in broader sense. There are some introductory and static views presented in this regard. So there is a literature gap to be filled by this effort, the Muslim counter narrative is still not there though Christians do their part.

Keywords: SBNR, non-spirituality, superstitions, Sam Harris

Procedia PDF Downloads 62
407 Teaching in the Post Truth Era: A Narrative Analysis of Modern Anti-Scientific Discourses in the Classroom

Authors: Jason T. Hilton

Abstract:

The ‘post-truth era’ is marked by a shift toward a period in which objective facts are less influential in shaping public opinion than appeals to emotion and personal belief. Applying narrative analysis techniques to current public discourses in education that run counter to scientific findings, it becomes possible to identify weakness in modern pedagogy and suggest ways to counter false narratives in the classroom. Results of this study indicate that a failure to engage with popular narratives lessens teachers’ ability to be convincing in the classroom, even when presenting information supported by scientific evidence. This study seeks to empower teachers by illustrating the influence of story within the post-truth era and the ways in which narrative and rhetorical elements take hold in social media contexts. Equipped with this knowledge, teachers can create a shift in pedagogy, away from transmission of knowledge toward the crafting of powerful narratives, built upon evidence, and connected to the lives of modern learners.

Keywords: 21st century learner, critical pedagogy, culture, narrative, post-truth era, social media

Procedia PDF Downloads 235
406 Guided Information Campaigns for Counter-Terrorism: Behavioral Approach to Interventions Regarding Polarized Societal Network

Authors: Joshua Midha

Abstract:

The basis for information campaigns and behavioral interventions has long reigned as a tactic. From the Soviet-era propaganda machines to the opinion hijacks in Iran, these measures are now commonplace and are used for dissemination and disassembly. However, the use of these tools for strategic diffusion, specifically in a counter-terrorism setting, has only been explored on the surface. This paper aims to introduce a larger conceptual portion of guided information campaigns into preexisting terror cells and situations. It provides an alternative, low-risk intervention platform for future military strategy. This paper highlights a theoretical framework to lay out the foundationary details and explanations for behavioral interventions and moves into using a case study to highlight the possibility of implementation. It details strategies, resources, circumstances, and risk factors for intervention. It also sets an expanding foundation for offensive PsyOps and argues for tactical diffusion of information to battle extremist sentiment. The two larger frameworks touch on the internal spread of information within terror cells and external political sway, thus charting a larger holistic purpose of strategic operations.

Keywords: terrorism, behavioral intervention, propaganda, SNA, extremism

Procedia PDF Downloads 70
405 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 459
404 A Novel Approach to Asynchronous State Machine Modeling on Multisim for Avoiding Function Hazards

Authors: Parisi L., Hamili D., Azlan N.

Abstract:

The aim of this study was to design and simulate a particular type of Asynchronous State Machine (ASM), namely a ‘traffic light controller’ (TLC), operated at a frequency of 0.5 Hz. The design task involved two main stages: firstly, designing a 4-bit binary counter using J-K flip flops as the timing signal and subsequently, attaining the digital logic by deploying ASM design process. The TLC was designed such that it showed a sequence of three different colours, i.e. red, yellow and green, corresponding to set thresholds by deploying the least number of AND, OR and NOT gates possible. The software Multisim was deployed to design such circuit and simulate it for circuit troubleshooting in order for it to display the output sequence of the three different colours on the traffic light in the correct order. A clock signal, an asynchronous 4-bit binary counter that was designed through the use of J-K flip flops along with an ASM were used to complete this sequence, which was programmed to be repeated indefinitely. Eventually, the circuit was debugged and optimized, thus displaying the correct waveforms of the three outputs through the logic analyzer. However, hazards occurred when the frequency was increased to 10 MHz. This was attributed to delays in the feedback being too high.

Keywords: asynchronous state machine, traffic light controller, circuit design, digital electronics

Procedia PDF Downloads 401
403 ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad

Authors: Spyridon Plakoudas

Abstract:

After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best.

Keywords: ISIS, cyber-jihad, Syrian Civil War, cyber-terrorism, insurgency and counter-insurgency

Procedia PDF Downloads 100
402 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism

Authors: Nila Febri Wilujeng, Helda Risman

Abstract:

Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.

Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange

Procedia PDF Downloads 173
401 Effect of Chlorophyll Concentration Variations from Extract of Papaya Leaves on Dye-Sensitized Solar Cell

Authors: Eka Maulana, Sholeh Hadi Pramono, Dody Fanditya, M. Julius

Abstract:

In this paper, extract of papaya leaves are used as a natural dye and combined by variations of solvent concentration applied on DSSC (Dye-Sensitized Solar Cell). Indonesian geographic located on the equator line occasions the magnitude of the potential to develop organic solar cells made from extracts of chlorophyll as a substitute for inorganic materials or synthetic dye on DSSC material. Dye serves as absorbing photons which are then converted into electrical energy. A conductive coated glass layer called TCO (Transparent Conductive Oxide) is used as a substrate of electrode. TiO2 nanoparticles as binding dye molecules, redox couple iodide/ tri-iodide as the electrolyte and carbon as the counter electrode in the DSSC are used. TiO2 nanoparticles, organic dyes, electrolytes and counter electrode are arranged and combined with the layered structure of the photo-catalyst absorption layer. Dye absorption measurements using a spectrophotometer at 200-800 nm light spectrum produces a total amount of chlorophyll 80.076 mg/l. The test cell at 7 watt LED light with 5000 lux luminescence were obtained Voc and Isc of 235.5 mV and 14 μA, respectively.

Keywords: DSSC (Dye-Sensitized Solar Cell), natural dye, chlorophyll, absorption

Procedia PDF Downloads 461
400 Humanitarian Storytelling through Photographs with and for Resettled Refugees in Wellington

Authors: Ehsan K. Hazaveh

Abstract:

This research project explores creative methods of storytelling through photography to portray a vulnerable and marginalised community: former refugees living in Wellington, New Zealand. The project explores photographic representational techniques that can not only empower and give voice to those communities but also challenge dominant stereotypes about refugees and support humanitarian actions. The aims of this study are to develop insights surrounding issues associated with the photographic representation of refugees and to explore the collaborative construction of possible counter-narratives that might lead to the formulation of a practice framework for representing refugees using photography. In other words, the goal of this study is to explore representational and narrative strategies that frame refugees as active community members and as individuals with specific histories and expertise. These counter-narratives will bring the diversity of refugees to the surface by offering personal stories, contextualising their experience, raising awareness about the plight and human rights of the refugee community in New Zealand, evoking empathy and, therefore, facilitating the process of social change. The study has designed a photographic narrative framework by determining effective methods of photo storytelling, framing, and aesthetic techniques, focusing on different ways of taking, selecting, editing and curating photographs. Photo elicitation interviews have been used to ‘explore’, ‘produce’ and ‘co-curate’ the counter-narrative along with participants. Photo elicitation is a qualitative research method that employs images to evoke data in order to find out how other people experience their world - the researcher shows photographs to the participant and asks open-ended questions to get them to talk about their life experiences and the world around them. The qualitative data have been collected and produced through interactions with four former refugees living in Wellington, New Zealand. In this way, this project offers a unique account of their conditions and basic knowledge about their living experience and their stories. The participants of this study have engaged with PhotoVoice, a photo elicitation methodology that employs photography and storytelling, to share activities, emotions, hopes, and aspects of their lived experiences. PhotoVoice was designed to empower members of marginalised populations. It involves a series of meeting sessions, in which participants share photographs they have taken and discuss stories about the photographs to identify, represent, and enhance the issues important to their lives and communities. Finally, the data provide a basis for systematically producing visual counter-narratives that highlight the experiences of former- refugees. By employing these methods, refugees can represent their world as well as interpret it. The process of developing this research framing has enabled the development of powerful counter-narratives that challenge prevailing stereotypical depictions which in turn have the potential to shape improved humanitarian outcomes, shifts in public attitudes and political perspectives in New Zealand.

Keywords: media, photography, refugees, photo-elicitation, storytelling

Procedia PDF Downloads 111
399 Effects of Hydrogen Bonding and Vinylcarbazole Derivatives on 3-Cyanovinylcarbazole Mediated Photo-Cross-Linking Induced Cytosine Deamination

Authors: Siddhant Sethi, Yasuharu Takashima, Shigetaka Nakamura, Kenzo Fujimoto

Abstract:

Site-directed mutagenesis is a renowned technique to introduce specific mutations in the genome. To achieve site-directed mutagenesis, many chemical and enzymatic approaches have been reported in the past like disulphite induced genome editing, CRISPR-Cas9, TALEN etc. The chemical methods are invasive whereas the enzymatic approaches are time-consuming and expensive. Most of these techniques are unusable in the cellular application due to their toxicity and other limitations. Photo-chemical cytosine deamination, introduced in 2010, is one of the major technique for enzyme-free single-point mutation of cytosine to uracil in DNA and RNA, wherein, 3-cyanovinylcarbazole nucleoside (CNVK) containing oligodeoxyribonucleotide (ODN) having CNVK at -1 position to that of target cytosine is reversibly crosslinked to target DNA strand using 366 nm and then incubated at 90ºC to accommodate deamination. This technique is superior to enzymatic methods of site-directed mutagenesis but has a disadvantage that it requires the use of high temperature for the deamination step which restricts its applicability in the in vivo applications. This study has been focused on improving the technique by reducing the temperature required for deamination. Firstly, the photo-cross-linker, CNVK has been modified by replacing cyano group attached to vinyl group with methyl ester (OMeVK), amide (NH2VK), and carboxylic acid (OHVK) to observe the acceleration in the deamination of target cytosine cross-linked to vinylcarbazole derivative. Among the derivatives, OHVK has shown 2 times acceleration in deamination reaction as compared to CNVK, while the other two derivatives have shown deceleration towards deamination reaction. The trend of rate of deamination reaction follows the same order as that of hydrophilicity of the vinylcarbazole derivatives. OHVK being most hydrophilic has shown highest acceleration while OMeVK is least hydrophilic has proven to be least active for deamination. Secondly, in the related study, the counter-base of the target cytosine, guanine has been replaced by inosine, 2-aminopurine, nebularine, and 5-nitroindole having distinct hydrogen bonding patterns with target cytosine. Among the ODNs with these counter bases, ODN with inosine has shown 12 fold acceleration towards deamination of cytosine cross-linked to CNVK at physiological conditions as compared to guanosine. Whereas, when 2-aminopurine, nebularine, and 5-nitroindole were used, no deamination reaction took place. It can be concluded that inosine has potential to be used as the counter base of target cytosine for the CNVK mediated photo-cross-linking induced deamination of cytosine. The increase in rate of deamination reaction has been attributed to pattern and number of hydrogen bonding between the cytosine and counter base. One of the important factor is presence of hydrogen bond between exo-cyclic amino group of cytosine and the counter base. These results will be useful for development of more efficient technique for site-directed mutagenesis for C → U transformations in the DNA/RNA which might be used in the living system for treatment of various genetic disorders and genome engineering for making designer and non-native proteins.

Keywords: C to U transformation, DNA editing, genome engineering, ultra-fast photo-cross-linking

Procedia PDF Downloads 209
398 Prevalence and Correlates of Anemia in Adolescents in Riyadh City, Kingdom of Saudi Arabia

Authors: Aljohara M. Alquaiz, Tawfik A. M. Khoja, Abdullah Alsharif, Ambreen Kazi, Ashry Gad Mohamed, Hamad Al Mane, Abdullah Aldiris, Shaffi Ahamed Shaikh

Abstract:

Objective: To determine the prevalence and correlates of anemia in male and female adolescents in Riyadh, Kingdom of Saudi Arabia. Design: A cross-sectional community based study setting: Five primary health care centers in Riyadh. Subjects: We invited 203 male and 292 female adolescents aged 13-18 years for interview, anthropometric measurements and complete blood count. Blood hemoglobin was measured with coulter cellular analysis system using light scatter method. Results: Using the WHO cut-off of Hb < 12gms/dl, 16.7%(34) males and 34%(100) females were suffering from anemia. The mean Hb (±SD) in males and females was 13.5(±1.4) and 12.3(±1.2) mg/dl, respectively. Mean(±SD) MCV, MCH, MCHC and RDW in male and female adolescents were 77.8(±6.2) vs76.4(±10.3)fL, 26.1(±2.7) vs25.5(±2.6)pg, 32.7(±2.4) vs32.2(±2.6)g/dL, 13.9(±1.4) vs13.6(±1.3)%, respectively. Multivariate logistic regression revealed that positive family history of iron deficiency anemia(IDA)(OR 4.7,95%CI 1.7–12.2), infrequent intake (OR 3.7,95%CI 1.3–10.0) and never intake of fresh juices(OR 3.5,95%CI 1.4–9.5), 13 to 14 years age (OR 3.1,95%CI 1.2–9.3) were significantly associated with anemia in male adolescents; whereas in females: family history of IDA (OR 3.4, 95%CI 1.5–7.6), being over-weight(OR 3.0,95%CI 1.4–6.1), no intake of fresh juice (OR 2.6,95%CI 1.4–5.1), living in an apartment (OR 2.0, 95%CI 1.1-3.8) or living in small house (OR 2.5, 95%CI 1.2-5.3) were significantly associated with anemia. Conclusion: Anemia is more prevalent among Saudi female adolescents as compared to males. Important factors like positive family history of IDA, overweight, lack of fresh juice intake and low socioeconomic status are significantly associated with anemia in adolescents.

Keywords: adolescents, anemia, correlates, obesity

Procedia PDF Downloads 315
397 A Low-Cost Dye Solar Cells Based on Ordinary Glass as Substrates

Authors: Sangmo Jon, Ganghyok Kim, Kwanghyok Jong, Ilnam Jo, Hyangsun Kim, Kukhyon Pae, GyeChol Sin

Abstract:

The back contact dye solar cells (BCDSCs), in which the transparent conductive oxide (TCO) is omitted, have the potential to use intact low-cost general substrates such as glass, metal foil, and papers. Herein, we introduce a facile manufacturing method of a Ti back contact electrode for the BCDSCs. We found that the polylinkers such as poly(butyl titanate) have a strong binding property to make Ti particles connect with one another. A porous Ti film, which consists of Ti particles of ≤10㎛ size connected by a small amount of polylinkers, has an excellent low sheet resistance of 10 ohm sq⁻¹ for an efficient electron collection for DSCs. This Ti back contact electrode can be prepared by using a facile printing method under normal ambient conditions. Conjugating the new back contact electrode technology with the traditional monolithic structure using the carbon counter electrode, we fabricated all TCO-less DSCs. These four-layer structured DSCs consist of a dye-adsorbed nanocrystalline TiO₂ film on a glass substrate, a porous Ti back contact layer, a ZrO₂ spacer layer, and a carbon counter electrode in a layered structure. Under AM 1.5G and 100mWcm⁻² simulated sunlight illumination, the four-layer structured DSCs with N719 dyes and I⁻/I₃⁻ redox electrolytes achieved PCEs up to 5.21%.

Keywords: dye solar cells, TCO-less, back contact, printing, porous Ti film

Procedia PDF Downloads 47
396 Low-Cost Aviation Solutions to Strengthen Counter-Poaching Efforts in Kenya

Authors: Kuldeep Rawat, Michael O'Shea, Maureen McGough

Abstract:

The paper will discuss a National Institute of Justice (NIJ) funded project to provide cost-effective aviation technologies and research to support counter-poaching operations related to endangered, protected, and/or regulated wildlife. The goal of this project is to provide cost-effective aviation technology and research support to Kenya Wildlife Service (KWS) in their counter-poaching efforts. In pursuit of this goal, Elizabeth City State University (ECSU) is assisting the National Institute of Justice (NIJ) in enhancing the Kenya Wildlife Service’s aviation technology and related capacity to meet its counter-poaching mission. Poaching, at its core, is systemic as poachers go to the most extreme lengths to kill high target species such as elephant and rhino. These high target wildlife species live in underdeveloped or impoverished nations, where poachers find fewer barriers to their operations. In Kenya, with fifty-nine (59) parks and reserves, spread over an area of 225,830 square miles (584,897 square kilometers) adequate surveillance on the ground is next to impossible. Cost-effective aviation surveillance technologies, based on a comprehensive needs assessment and operational evaluation, are needed to curb poaching and effectively prevent wildlife trafficking. As one of the premier law enforcement Air Wings in East Africa, KWS plays a crucial role in Kenya, not only in counter-poaching and wildlife conservation efforts, but in aerial surveillance, counterterrorism and national security efforts as well. While the Air Wing has done, a remarkable job conducting aerial patrols with limited resources, additional aircraft and upgraded technology should significantly advance the Air Wing’s ability to achieve its wildlife protection mission. The project includes: (i) Needs Assessment of the KWS Air Wing, to include the identification of resources, current and prospective capacity, operational challenges and priority goals for expansion, (ii) Acquisition of Low-Cost Aviation Technology to meet priority needs, and (iii) Operational Evaluation of technology performance, with a focus on implementation and effectiveness. The Needs Assessment reflects the priorities identified through two site visits to the KWS Air Wing in Nairobi, Kenya, as well as field visits to multiple national parks receiving aerial support and interviewing/surveying KWS Air wing pilots and leadership. Needs Assessment identified some immediate technology needs that includes, GPS with upgrades, including weather application, Night flying capabilities, to include runway lights and night vision technology, Cameras and surveillance equipment, Flight tracking system and/or Emergency Position Indicating Radio Beacon, Lightweight ballistic-resistant body armor, and medical equipment, to include a customized stretcher and standard medical evacuation equipment. Results of this assessment, along with significant input from the KWS Air Wing, will guide the second phase of this project: technology acquisition. Acquired technology will then be evaluated in the field, with a focus on implementation and effectiveness. Results will ultimately be translated for any rural or tribal law enforcement agencies with comparable aerial surveillance missions and operational environments, and jurisdictional challenges, seeking to implement low-cost aviation technology. Results from Needs Assessment phase, including survey results and our ongoing technology acquisition and baseline operational evaluation will be discussed in the paper.

Keywords: aerial surveillance mission, aviation technology, counter-poaching, wildlife protection

Procedia PDF Downloads 251
395 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 100
394 Tribological Behavior of PTFE Composites Used for Guide Rings of Hydraulic Actuating Cylinders under Oil-Lubricated Condition

Authors: Trabelsi Mohamed, Kharrat Mohamed, Dammak Maher

Abstract:

Guide rings play an important role in the performance and durability of hydraulic actuating cylinders. In service, guide rings surfaces are subjected to friction and wear against steel counterface. A good mastery of these phenomena is required for the improvement of the energy safeguard and the durability of the actuating cylinder. Polytetrafluoroethylene (PTFE) polymer is extensively used in guide rings thanks to its low coefficient of friction, its good resistance to solvents as well as its high temperature stability. In this study, friction and wear behavior of two PTFE composites filled with bronze and bronze plus MoS2 were evaluated under oil-lubricated condition, aiming as guide rings for hydraulic actuating cylinder. Wear tests of the PTFE composite specimen sliding against steel ball were conducted using reciprocating linear tribometer. The wear mechanisms of the composites under the same sliding condition were discussed, based on Scanning Electron Microscopy examination of the worn composite surface and the optical micrographs of the steel counter surface. As for the results, comparative friction behaviors of the PTFE composites and lower friction coefficients were recorded under oil lubricated condition. The wear behavior was considerably improved to compare with this in dry sliding, while the oil adsorbed layer limited the transfer of the PTFE to the steel counter face during the sliding test.

Keywords: PTFE, composite, bronze, MoS2, friction, wear, oil-lubrication

Procedia PDF Downloads 267
393 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 262
392 From Transference Love to Self Alienation in the Therapeutic Relationship: A Case Study

Authors: Efi Koutantou

Abstract:

The foundation of successful therapy is the bond between the psychotherapist and the patient, Psychoanalysis would argue. The present study explores lived experiences of a psychotherapeutic relationship in different moments, initial and final with special reference to the transference love developed through the process. The fight between moments of ‘leaving a self’ behind and following ‘lines of flight’ in the process of creating a new subjectivity and ‘becoming-other’ will be explored. Moments between de-territorialisation – surpassing given constraints such as gender, family and religion, kinship bonds - freeing the space in favor of re-territorialisation – creation of oneself creation of oneself will also be analyzed. The generation of new possibilities of being, new ways of self-actualization for this patient will be discussed. The second part of this study will explore the extent to which this ‘transference love’ results for this specific patient to become ‘the discourse of the other’; it is a desideratum whether the patient finally becomes a subject of his/her own through his/her own self-exploration of new possibilities of existence or becomes alienated within the thought of the therapist. The way in which the patient uses or is (ab)used by the transference love in order to experience and undergo alienation from an ‘authority’ which may or may not sacrifice his/her own thought in favor of satisfying the therapist will be investigated. Finally, from an observer’s perspective and from the analysis of the results of this therapeutic relationship, the counter-transference will also be analyzed, in terms of an attempt of the analyst to relive and satisfy his/her own desires through the life of the analysand. The accession and fall of an idealized self will be analyzed, the turn of the transference love into ‘hate’ will conclude this case study through a lived experience in the therapeutic procedure; a relationship which can be called to be a mixture of a real relationship and remnants from a past object relationship.

Keywords: alienation, authority, counter-transference, hate, transference love

Procedia PDF Downloads 187
391 Vortex Generation to Model the Airflow Downstream of a Piezoelectric Fan Array

Authors: Alastair Hales, Xi Jiang, Siming Zhang

Abstract:

Numerical methods are used to generate vortices in a domain. Through considered design, two counter-rotating vortices may interact and effectively drive one another downstream. This phenomenon is comparable to the vortex interaction that occurs in a region immediately downstream from two counter-oscillating piezoelectric (PE) fan blades. PE fans are small blades clamped at one end and driven to oscillate at their first natural frequency by an extremely low powered actuator. In operation, the high oscillation amplitude and frequency generate sufficient blade tip speed through the surrounding air to create downstream air flow. PE fans are considered an ideal solution for low power hot spot cooling in a range of small electronic devices, but a single blade does not typically induce enough air flow to be considered a direct alternative to conventional air movers, such as axial fans. The development of face-to-face PE fan arrays containing multiple blades oscillating in counter-phase to one another is essential for expanding the range of potential PE fan applications regarding the cooling of power electronics. Even in an unoptimised state, these arrays are capable of moving air volumes comparable to axial fans with less than 50% of the power demand. Replicating the airflow generated by face-to-face PE fan arrays without including the actual blades in the model reduces the process’s computational demands and enhances the rate of innovation and development in the field. Vortices are generated at a defined inlet using a time-dependent velocity profile function, which pulsates the inlet air velocity magnitude. This induces vortex generation in the considered domain, and these vortices are shown to separate and propagate downstream in a regular manner. The generation and propagation of a single vortex are compared to an equivalent vortex generated from a PE fan blade in a previous experimental investigation. Vortex separation is found to be accurately replicated in the present numerical model. Additionally, the downstream trajectory of the vortices’ centres vary by just 10.5%, and size and strength of the vortices differ by a maximum of 10.6%. Through non-dimensionalisation, the numerical method is shown to be valid for PE fan blades with differing parameters to the specific case investigated. The thorough validation methods presented verify that the numerical model may be used to replicate vortex formation from an oscillating PE fans blade. An investigation is carried out to evaluate the effects of varying the distance between two PE fan blade, pitch. At small pitch, the vorticity in the domain is maximised, along with turbulence in the near vicinity of the inlet zones. It is proposed that face-to-face PE fan arrays, oscillating in counter-phase, should have a minimal pitch to optimally cool nearby heat sources. On the other hand, downstream airflow is maximised at a larger pitch, where the vortices can fully form and effectively drive one another downstream. As such, this should be implemented when bulk airflow generation is the desired result.

Keywords: piezoelectric fans, low energy cooling, vortex formation, computational fluid dynamics

Procedia PDF Downloads 148
390 Understanding the Popularity of Historical Conservation in China: The Depoliticized Narratives as a Counter-Insurgency Strategy in Guangzhou

Authors: Luxi Chen

Abstract:

The land finance in China in recent years has propelled urban renewals in the name of historical conservation and led to massive gentrification and compulsory relocation. Such inequalities cause insurgence. Drawing on public planning information, ethnographic field notes, and online interview data about Guangzhou's Enninglu Area, this paper aims to present how such insurgence has been contained and put down gradually through depoliticization narratives represented by "improving living conditions," "conserving historical culture," and "public participation”. This paper's findings include that 1) Besides economic growth, maintaining social stability in alignment with the central government are equally important to local government, reveals the latter efforts to mediate the growth coalition, residents, media, and academics so as to reconstruct the interface between state and society; 2) To empower the insurgence, the media and academics use public interests for propaganda, that diverts attention away from its political dimension; 3) In response, the government introduces improved regulations and planning, turning social inequalities into technical inadequacy so as to become the defender of public interests, which justifies the incoming renewal and prevents public questioning. By comparing regime changes among governments, developers, residents, media, and academics caused by renewal policies, this paper presents the depoliticized narrative as a counter-insurgence strategy to contain social conflicts and to boost inner-city renewal.

Keywords: inner city renewal, depoliticization, historical conservation, public participation

Procedia PDF Downloads 196
389 Experimental Study on Performance of a Planar Membrane Humidifier for a Proton Exchange Membrane Fuel Cell Stack

Authors: Chen-Yu Chen, Wei-Mon Yan, Chi-Nan Lai, Jian-Hao Su

Abstract:

The proton exchange membrane fuel cell (PEMFC) becomes more important as an alternative energy source recently. Maintaining proper water content in the membrane is one of the key requirements for optimizing the PEMFC performance. The planar membrane humidifier has the advantages of simple structure, low cost, low-pressure drop, light weight, reliable performance and good gas separability. Thus, it is a common external humidifier for PEMFCs. In this work, a planar membrane humidifier for kW-scale PEMFCs is developed successfully. The heat and mass transfer of humidifier is discussed, and its performance is analyzed in term of dew point approach temperature (DPAT), water vapor transfer rate (WVTR) and water recovery ratio (WRR). The DPAT of the humidifier with the counter flow approach reaches about 6°C under inlet dry air of 50°C and 60% RH and inlet humid air of 70°C and 100% RH. The rate of pressure loss of the humidifier is 5.0×10² Pa/min at the torque of 7 N-m, which reaches the standard of commercial planar membrane humidifiers. From the tests, it is found that increasing the air flow rate increases the WVTR. However, the DPAT and the WRR are not improved by increasing the WVTR as the air flow rate is higher than the optimal value. In addition, increasing the inlet temperature or the humidity of dry air decreases the WVTR and the WRR. Nevertheless, the DPAT is improved at elevated inlet temperatures or humidities of dry air. Furthermore, the performance of the humidifier with the counter flow approach is better than that with the parallel flow approach. The DPAT difference between the two flow approaches reaches up to 8 °C.

Keywords: heat and mass transfer, humidifier performance, PEM fuel cell, planar membrane humidifier

Procedia PDF Downloads 281
388 Eosinopenia: Marker for Early Diagnosis of Enteric Fever

Authors: Swati Kapoor, Rajeev Upreti, Monica Mahajan, Abhaya Indrayan, Dinesh Srivastava

Abstract:

Enteric Fever is caused by gram negative bacilli Salmonella typhi and paratyphi. It is associated with high morbidity and mortality worldwide. Timely initiation of treatment is a crucial step for prevention of any complications. Cultures of body fluids are diagnostic, but not always conclusive or practically feasible in most centers. Moreover, the results of cultures delay the treatment initiation. Serological tests lack diagnostic value. The blood counts can offer a promising option in diagnosis. A retrospective study to find out the relevance of leucopenia and eosinopenia was conducted on 203 culture proven enteric fever patients and 159 culture proven non-enteric fever patients in a tertiary care hospital in New Delhi. The patient details were retrieved from the electronic medical records section of the hospital. Absolute eosinopenia was considered as absolute eosinophil count (AEC) of less than 40/mm³ (normal level: 40-400/mm³) using LH-750 Beckman Coulter Automated machine. Leucopoenia was defined as total leucocyte count (TLC) of less than 4 X 10⁹/l. Blood cultures were done using BacT/ALERT FA plus automated blood culture system before first antibiotic dose was given. Case and control groups were compared using Pearson Chi square test. It was observed that absolute eosinophil count (AEC) of 0-19/mm³ was a significant finding (p < 0.001) in enteric fever patients, whereas leucopenia was not a significant finding (p=0.096). Using Receiving Operating Characteristic (ROC) curves, it was observed that patients with both AEC < 14/mm³ and TCL < 8 x 10⁹/l had 95.6% chance of being diagnosed as enteric fever and only 4.4% chance of being diagnosed as non-enteric fever. This result was highly significant with p < 0.001. This is a very useful association of AEC and TLC found in enteric fever patients of this study which can be used for the early initiation of treatment in clinically suspected enteric fever patients.

Keywords: absolute eosinopenia, absolute eosinophil count, enteric fever, leucopenia, total leucocyte count

Procedia PDF Downloads 148
387 Quality Control of 99mTc-Labeled Radiopharmaceuticals Using the Chromatography Strips

Authors: Yasuyuki Takahashi, Akemi Yoshida, Hirotaka Shimada

Abstract:

99mTc-2-methoxy-isobutyl-isonitrile (MIBI) and 99mTcmercaptoacetylgylcylglycyl-glycine (MAG3 ) are heat to 368-372K and are labeled with 99mTc-pertechnetate. Quality control (QC) of 99mTc-labeled radiopharmaceuticals is performed at hospitals, using liquid chromatography, which is difficult to perform in general hospitals. We used chromatography strips to simplify QC and investigated the effects of the test procedures on quality control. In this study is 99mTc- MAG3. Solvent using chloroform + acetone + tetrahydrofuran, and the gamma counter was ARC-380CL. The changed conditions are as follows; heating temperature, resting time after labeled, and expiration year for use: which were 293, 313, 333, 353 and 372K; 15 min (293K and 372K) and 1 hour (293K); and 2011, 2012, 2013, 2014 and 2015 respectively were tested. Measurement time using the gamma counter was one minute. A nuclear medical clinician decided the quality of the preparation in judging the usability of the retest agent. Two people conducted the test procedure twice, in order to compare reproducibility. The percentage of radiochemical purity (% RCP) was approximately 50% under insufficient heat treatment, which improved as the temperature and heating time increased. Moreover, the % RCP improved with time even under low temperatures. Furthermore, there was no deterioration with time after the expiration date. The objective of these tests was to determine soluble 99mTc impurities, including 99mTc-pertechnetate and the hydrolyzed-reduced 99mTc. Therefore, we assumed that insufficient heating and heating to operational errors in the labeling. It is concluded that quality control is a necessary procedure in nuclear medicine to ensure safe scanning. It is suggested that labeling is necessary to identify specifications.

Keywords: quality control, tc-99m labeled radio-pharmaceutical, chromatography strip, nuclear medicine

Procedia PDF Downloads 291
386 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 150
385 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 270
384 The Cut, the Blood and Her Stained Femininity- an Analysis of Female Genital Mutilation

Authors: Indu Poornima

Abstract:

This paper aims at understanding the Socio-historical, political and economic dimensions of Female Genital Mutilation in Africa. After throwing light on the definition of FGM and scrutinizing the misconceptions associated with it, the paper progresses to analyze the following questions. a) How do communities performing FGM rationalize their act? b) Are the victims (women) themselves the strongest proponents of FGM ? and c) Are legislations against FGM by international organizations counter-productive?

Keywords: female genital mutilation, Africa, rationalizing the act, international legislations

Procedia PDF Downloads 185
383 Rural Development as a Strategy to Deter Migration in India - Re-Examining the Ideology of Cluster Development

Authors: Nandini Mohan, Thiruvengadam R. B.

Abstract:

Mahatma Gandhi advocated that the true indicator of modern India lay in the development of its villages. This has been proven with the recent outbreak of the Coronavirus pandemic and the surfacing predicament of our urban centers. Developed on the Industrialization model, the current state of the metropolis is of rampant overcrowding, high rates of unemployment, inadequate infrastructure, and resources to cater to the growing population. A majority of each city’s strength composes of the migrant population, demonstrated through the migrant crisis, a direct repercussion of COVID-19. This paper explores the ideology of how rural development can act as a tactic to counter the high rates of rural-urban migration. It establishes the need for a rural push, as India is predominantly an agrarian economy, with a vast disparity between the urban and rural centers due to its urban bias. It seeks to define development in holistic terms. It studies the models of ‘cluster’ as conceptualized by V.K.R.V. Rao, and detailed by Architect Charles Correa in his book, The New Landscape. The paper reexamines the theory of cluster development through existing models proposed by the government of India. Namely, PURA (Provision of Urban Amenities in Rural Areas), DRI (Deendayal Research Institute), and Rurban under Shyama Prasad Mukharjee Rurban Mission. It analyses the models, their strengths, weaknesses, and reasons for their failure and success to derive parameters for the ideation of an archetype model. A model of rural development that talks of the simultaneous development of existing adjacent villages, by the introduction of set unique functions, that may turn into self-sustaining clusters or agglomerations in the future, which could serve as the next step for Indian village development based on the cluster ideology.

Keywords: counter migration, models of rural development, cluster development theory, India

Procedia PDF Downloads 56
382 Developing an Intelligent Table Tennis Ball Machine with Human Play Simulation for Technical Training

Authors: Chen-Chi An, Jun-Yi He, Cheng-Han Hsieh, Chen-Ching Ting

Abstract:

This research has successfully developed an intelligent table tennis ball machine with human play simulate all situations of human play to take the service. It is well known; an excellent ball machine can help the table tennis coach to provide more efficient teaching, also give players the good technical training and entertainment. An excellent ball machine should be able to service all balls based on human play simulation due to the conventional competitions are today all taken place for people. In this work, two counter-rotating wheels are used to service the balls, where changing the absolute rotating speeds of the two wheels and the differences of rotating speeds between the two wheels can adjust the struck forces and the rotating speeds of the ball. The relationships between the absolute rotating speed of the two wheels and the struck forces of the ball as well as the differences rotating speeds between the two wheels and the rotating speeds of the ball are experimentally determined for technical development. The outlet speed, the ejected distance, and the rotating speed of the ball were measured by changing the absolute rotating speeds of the two wheels in terms of a series of differences in rotating speed between the two wheels for calibration of the ball machine; where the outlet speed and the ejected distance of the ball were further converted to the struck forces of the ball. In process, the balls serviced by the intelligent ball machine were based on the received calibration curves with help of the computer. Experiments technically used photosensitive devices to detect the outlet and rotating speed of the ball. Finally, this research developed some teaching programs for technical training using three ball machines and received more efficient training.

Keywords: table tennis, ball machine, human play simulation, counter-rotating wheels

Procedia PDF Downloads 399