Search results for: counter extremism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 524

Search results for: counter extremism

314 Design, Construction and Characterization of a 3He Proportional Counter for Detecting Thermal Neutron

Authors: M. Fares, S. Mameri, I. Abdlani, K. Negara

Abstract:

Neutron detectors in general, proportional counters gas filling based isotope 3He in particular are going to be essential for monitoring and control of certain nuclear facilities, monitoring of experimentation around neutron beams and channels nuclear research reactors, radiation protection instruments and other tools multifaceted exploration and testing of materials, etc. This work consists of a measurement campaign features two Proportional Counters 3He (3He: LND252/USA CP, CP prototype: 3He LND/DDM). This is to make a comparison study of a CP 3He LND252/USA reference one hand, and in the context of routine periodic monitoring of the characteristics of the detectors for controlling the operation especially for laboratory prototypes. In this paper, we have described the different characteristics of the detectors and the experimental protocols used. Tables of measures have been developed and the different curves were plotted. The experimental campaign at stake: 2 PC 3He were thus characterized: Their characteristics (sensitivity, energy pulse height distribution spectra, gas amplification etc.) Were identified: 01 PC 3He 1'' Type: prototype DEDIN/DDM, 01 PC 3He 1'' Type: LND252/USA.

Keywords: PC 3He, sensitivity, pulse height distribution spectra, gas amplification

Procedia PDF Downloads 412
313 From Cultural Policy to Social Practice: Literary Festivals as a Platform for Social Inclusion in Pakistan

Authors: S. Jabeen

Abstract:

Though Pakistan has a rich cultural history and a diverse population; its global image is tarnished with labels of Muslim ‘fundamentalism’ and ‘extremism.’ Cultural policy is a tool that can be used by the government of Pakistan to ameliorate this image, but instead, this fundamentalist reputation is reinforced in the 2005 draft of Pakistan’s cultural policy. With its stern focus on a homogenized cultural identity, this 2005 draft bases itself largely on forced participation from the largely Muslim public and leaves little or no benefits to them or cultural minorities in Pakistan. The effects of this homogenized ‘Muslim’ identity linger ten years later where the study and celebration of the cultural heritage of Pakistan in schools and educational festivals focus entirely on creating and maintaining a singular ‘Islamic’ cultural identity. The current lack of inclusion has many adverse effects that include the breeding of extremist mindsets through the usurpation of minority rights and lack of safe cultural public spaces. This paper argues that Pakistan can improve social inclusivity and boost its global image through cultural policy. The paper sets the grounds for research by surveying the effectiveness of different cultural policies across nations with differing socioeconomic status. Then, by sampling two public literary festivals in Pakistan as case studies, the National Youth Peace Festival hosted with a nationalistic agenda using public funds and the Lahore Literary Festival (LLF) that aims to boost the cultural literacy scene of Lahore using both private and public efforts, this paper looks at the success of the private, more inclusive LLF. A revision of cultural policy is suggested that combines public and private efforts to host cultural festivals for the sake of cultural celebration and human development, without a set nationalistic agenda. Consequently, this comparison which is grounded in the human capabilities approach, recommends revising the 2005 draft of the Cultural Policy to improve human capabilities in order to support cultural diversity and ultimately contribute to economic growth in Pakistan.

Keywords: cultural policy, festivals, human capabilities, Pakistan

Procedia PDF Downloads 108
312 Corruption, a Prelude to Problems of Governance in Pakistan

Authors: Umbreen Javaid

Abstract:

Pakistan’s experience with nascent, yet to be evolved democratic institutions inherited from the British Empire, has not been a pleasant one when evaluated in terms of good governance, development, and success of anti-corruption mechanisms. The country has remained entangled in a vicious circle of accumulating large budget deficits, dwindling economy, low foreign direct investment, political instability, and rising terrorism. It is thus not surprising that no account of the state aimed at analyzing the six-decade journey since her inception is replete with negative connotations like dysfunctional, failed, fragile or weak state. The limited pool of experience of handling democratic institutions and lack of political will be on the part of country’s political elite to transform the society on democratic footings have left Pakistan as a “limited access order” state. The widespread illiteracy becomes a double edge sword when a largely illiterate electorate elects representatives who mostly come from a semi-educated background with the limited understanding of democratic minutiae and little or no proclivity to resist monetary allures. The prevalence of culture of patronage with widespread poverty coupled with absence of a comprehensive system of investigating, prosecuting and adjudicating cases of corruption encourage the practice that has been eroding the state’s foundations since her inception owing to the unwillingness of the traditional elites who have been strongly resistant towards any attempts aimed at disseminating powers. An analytical study of the historical, political, cultural, economic and administrative hurdles that have been at work in impeding Pakistan’s transition to a democratic, accountable society would be instrumental in understanding the issue of widespread plague of corruption and state’s inefficiency to cope with it effectively. The issue of corruption in Pakistan becomes more important when seen in the context of her vulnerability to terrorism and religious extremism. In this regard, Pakistan needs to learn a lot from developed countries in order to evolve a comprehensive strategy for combating and preventing this pressing issue.

Keywords: Pakistan, corruption, anti-corruption, limited access order

Procedia PDF Downloads 277
311 An Evaluation of the Trends in Land Values around Institutions of Higher Learning in North Central Nigeria

Authors: Ben Nwokenkwo, Michael M. Eze, Felix Ike

Abstract:

The need to study trends in land values around institutions of higher learning cannot be overemphasized. Numerous studies in Nigeria have investigated the economic, and social influence of the sitting of institutions of higher learning at the micro, meso and macro levels. However, very few studies have evaluated the temporal extent at which such institution influences local land values. Since institutions greatly influence both the physical and environmental aspects of their immediate vicinity, attention must be taken to understand the influence of such changes on land values. This study examines the trend in land values using the Mann-Kendall analysis in order to determine if, between its beginning and end, a monotonic increase, decrease or stability exist in the land values across six institutions of higher learning for the period between 2004 and 2014. Specifically, The analysis was applied to the time series of the price(or value) of the land .The results of this study revealed that land values has either been increasing or remained stabled across all the institution sampled. The study finally recommends measures that can be put in place as counter magnets for land values estimation across institutions of higher learning.

Keywords: influence, land, trend, value

Procedia PDF Downloads 331
310 Measurement and Evaluation Patterns Practiced by Physical Education Teachers in North Badia in Jordan

Authors: Aman Kasawneh, Wasfi Khazalah, Abedalbasit Abedalhafiz

Abstract:

This study aimed to identify the patterns of measurement and evaluation practiced by physical education in the schools of North Badia in Jordan, as well as identifying the statistical differences according to gender, educational qualification, and the experience. The sample consisted of 118 physical education teachers 58 males and 60 females chosen randomly from the schools of North Badia in Jordan. The completed a questionnaire developed by the researchers after verifying its validity and reliability. The results indicated a clear weakness in the practice of measurement and evaluation patterns by physical education teachers. Also no significant differences were found between male and female teachers, however, significant differences were found between bachelor degree holders and their counter parts and between teachers with less than eight years of experience. The researchers recommended the necessity of preparing the P.E teachers regarding the patterns of measurement and evaluation within the sport field as one of the essentials for improving and developing physical education at schools.

Keywords: evaluation, measurement, evaluation, physical education teacher, Jordanian

Procedia PDF Downloads 422
309 Determination of Flow Arrangement for Optimum Performance in Heat Exchangers

Authors: Ahmed Salisu Atiku

Abstract:

This task involves the determination of the flow arrangement for optimum performance and the calculation of total heat transfer of two identical double pipe heat exchangers in series. The inner pipe contains the cold water stream at 27°C, whilst the outer pipe contains the two hot stream of water at 50°C and 90 °C which can be mixed in any way desired. The analysis was carried out using counter flow arrangement due to its good heat transfer ability. The best way of heating this cold stream was found out to be passing the 90°C hot stream through the two heat exchangers. The outlet temperature of the cold stream was found to be 39.6°C and overall heat transfer of 131.3 kW. Though starting with 50°C hot stream in the first heat exchanger followed by 90°C hot stream in the second heat exchanger gives an outlet temperature almost the same as 90°C hot stream alone, but the heat transfer is low. The reason for the low heat transfer was that only the heat transfer in the second heat exchanger is considered. Whilst the reason behind high outlet temperature was that the cold stream was already preheated by the first stream.

Keywords: cold stream, flow arrangement, heat exchanger, hot stream

Procedia PDF Downloads 299
308 Wear Characteristics of Al Based Composites Fabricated with Nano Silicon Carbide Particles

Authors: Mohammad Reza Koushki Ardestani, Saeed Daneshmand, Mohammad Heydari Vini

Abstract:

In the present study, AA7075/SiO2 composites have been fabricated via liquid metallurgy process. Using the degassing process, the wet ability of the molten aluminum alloys increased which improved the bonding between aluminum matrix and reinforcement (SiO2) particles. AA7075 alloy and SiO2 particles were taken as the base matrix and reinforcements, respectively. Then, contents of 2.5 and 5 wt. % of SiO2 subdivisions were added into the AA7075 matrix. To improve wettability and distribution, reinforcement particles were pre-heated to a temperature of 550°C for each composite sample. A uniform distribution of SiO2 particles was observed through the matrix alloy in the microstructural study. A hardened EN32 steel disc as the counter face was used to evaluate the wear rate pin-on-disc, a wear testing machine containing. The results showed that the wear rate of the AA/SiO2 composites was lesser than that of the monolithic AA7075 samples. Finally, The SEM worn surfaces of samples were investigated.

Keywords: Al7075, SiO₂, wear, composites, stir casting

Procedia PDF Downloads 45
307 Implementing Two Rotatable Circular Polarized Glass Made Window to Reduce the Amount of Electricity Usage by Air Condition System

Authors: Imtiaz Sarwar

Abstract:

Air conditioning in homes may account for one-third of the electricity during period in summer when most of the energy is required in large cities. It is not consuming only electricity but also has a serious impact on environment including greenhouse effect. Circular polarizer filter can be used to selectively absorb or pass clockwise or counter-clock wise circularly polarized light. My research is about putting two circular polarized glasses parallel to each other and make a circular window with it. When we will place two circular polarized glasses exactly same way (0 degree to each other) then nothing will be noticed rather it will work as a regular window through which all light and heat can pass on. While we will keep rotating one of the circular polarized glasses, the angle between the glasses will keep increasing and the window will keep blocking more and more lights. It will completely block all the lights and a portion of related heat when one of the windows will reach 90 degree to another. On the other hand, we can just open the window when fresh air is necessary. It will reduce the necessity of using Air condition too much or consumer will use electric fan rather than air conditioning system. Thus, we can save a significant amount of electricity and we can go green.

Keywords: circular polarizer, window, air condition, light, energy

Procedia PDF Downloads 570
306 Analysis of the Interference from Risk-Determining Factors of Cooperative and Conventional Construction Contracts

Authors: E. Harrer, M. Mauerhofer, T. Werginz

Abstract:

As a result of intensive competition, the building sector is suffering from a high degree of rivalry. Furthermore, there can be observed an unbalanced distribution of project risks. Clients are aimed to shift their own risks into the sphere of the constructors or planners. The consequence of this is that the number of conflicts between the involved parties is inordinately high or even increasing; an alternative approach to counter on that developments are cooperative project forms in the construction sector. This research compares conventional contract models and models with partnering agreements to examine the influence on project risks by an early integration of the involved parties. The goal is to show up deviations in different project stages from the design phase to the project transfer phase. These deviations are evaluated by a survey of experts from the three spheres: clients, contractors and planners. By rating the influence of the participants on specific risk factors it is possible to identify factors which are relevant for a smooth project execution.

Keywords: building projects, contract models, partnering, project risks

Procedia PDF Downloads 245
305 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 267
304 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 64
303 Magnetohydrodynamic Flows in a Conduit with Multiple Channels under a Magnetic Field Applied Perpendicular to the Plane of Flow

Authors: Yang Luo, Chang Nyung Kim

Abstract:

This study numerically analyzes a steady-state, three-dimensional liquid-metal magnetohydrodynamic flows in a conduit with multiple channels under a uniform magnetic field. The geometry of the conduit is of a four-parallel-channels system including one inflow channel and three outflow channels. The liquid-metal flows in the inflow channel, then turns 1800 in the transition segment, finally flows into three different outflow channels simultaneously. This kind of channel system can induce counter flow and co-flow, which is rarely investigated before. The axial velocity in the side layer near the first partitioning wall, which is located between the inflow channel and the first outflow channel, is the highest. ‘M-shaped’ velocity profiles are obtained in the side layers of the inflow and outflow channels. The interdependency of the current, fluid velocity, pressure, electric potential is examined in order to describe the electromagnetic characteristics of the liquid-metal flows.

Keywords: liquid-metal, multiple channels, magnetic field, magnetohydrodynamic

Procedia PDF Downloads 256
302 Integrated Cyber Security Risk Management-Insurance and Investment Cost Analysis

Authors: Thomas Y. S. Lee

Abstract:

An insurer offers cyber insurance coverage to several firms with risk-averse decision-makers. The cyber insurance premium offered depends on the cyber security implemented at the firm. Each firm faces attacks by multiple types of hackers and decides on the level of investment for cyber security countermeasures. We address the software monoculture issue by considering that there is common, popular software used by all firms, and it is a source of correlated risk. Two types of cyber security interdependence breaching processes due to the software monoculture risk were analyzed. We derive the probability distribution for the number of breaches and develop the cyber insurance pricing model. We also introduce the concept of cyber security defense level. Furthermore, we proposed to determine the optimal cyber insurance price given a targeted defense level. Finally, we demonstrate the use of our model through several numerical examples.

Keywords: cyber insurance, hacker, breaching probability, cyber security, correlated risks, software monoculture risk, defense level, integrated risk management.

Procedia PDF Downloads 0
301 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 107
300 Design of Wireless Readout System for Resonant Gas Sensors

Authors: S. Mohamed Rabeek, Mi Kyoung Park, M. Annamalai Arasu

Abstract:

This paper presents a design of a wireless read out system for tracking the frequency shift of the polymer coated piezoelectric micro electromechanical resonator due to gas absorption. The measure of this frequency shift indicates the percentage of a particular gas the sensor is exposed to. It is measured using an oscillator and an FPGA based frequency counter by employing the resonator as a frequency determining element in the oscillator. This system consists of a Gas Sensing Wireless Readout (GSWR) and an USB Wireless Transceiver (UWT). GSWR consists of an oscillator based on a trans-impedance sustaining amplifier, an FPGA based frequency readout, a sub 1GHz wireless transceiver and a micro controller. UWT can be plugged into the computer via USB port and function as a wireless module to transfer gas sensor data from GSWR to the computer through its USB port. GUI program running on the computer periodically polls for sensor data through UWT - GSWR wireless link, the response from GSWR is logged in a file for post processing as well as displayed on screen.

Keywords: gas sensor, GSWR, micromechanical system, UWT, volatile emissions

Procedia PDF Downloads 457
299 Decolonialism: Addressing Colonial Legacies and Challenging Dominant Narratives

Authors: Patricia Amorim Da Silva

Abstract:

This paper explores the ongoing process of decolonialism, focusing on addressing the lasting consequences of colonialism. Centred on identity within marginalized communities, the study challenges Eurocentric frameworks and advocates for diverse perspectives. Emphasizing critical self-awareness among researchers regarding biases in their work, decolonialism influences feminist theory and global counter-publics. At its core is the concept of epistemicide, the intentional suppression of knowledge in unequal cultural interactions. Colonial imposition has devalued local knowledge, contributing to cultural loss and undermining autonomy. The paper underscores the importance of reclaiming indigenous knowledge to revitalize local cultures and languages, particularly pertinent to the Brazilian context. This contribution to the discourse on decolonialism underscores the imperative to challenge prevailing narratives and empower historically subordinated communities. The study aspires to advance feminist theory and decolonial studies, fostering a more equitable and inclusive global society.

Keywords: decolonialism, colonial legacies, identity, Eurocentrism, epistemicide

Procedia PDF Downloads 30
298 Readout Development of a LGAD-based Hybrid Detector for Microdosimetry (HDM)

Authors: Pierobon Enrico, Missiaggia Marta, Castelluzzo Michele, Tommasino Francesco, Ricci Leonardo, Scifoni Emanuele, Vincezo Monaco, Boscardin Maurizio, La Tessa Chiara

Abstract:

Clinical outcomes collected over the past three decades have suggested that ion therapy has the potential to be a treatment modality superior to conventional radiation for several types of cancer, including recurrences, as well as for other diseases. Although the results have been encouraging, numerous treatment uncertainties remain a major obstacle to the full exploitation of particle radiotherapy. To overcome therapy uncertainties optimizing treatment outcome, the best possible radiation quality description is of paramount importance linking radiation physical dose to biological effects. Microdosimetry was developed as a tool to improve the description of radiation quality. By recording the energy deposition at the micrometric scale (the typical size of a cell nucleus), this approach takes into account the non-deterministic nature of atomic and nuclear processes and creates a direct link between the dose deposited by radiation and the biological effect induced. Microdosimeters measure the spectrum of lineal energy y, defined as the energy deposition in the detector divided by most probable track length travelled by radiation. The latter is provided by the so-called “Mean Chord Length” (MCL) approximation, and it is related to the detector geometry. To improve the characterization of the radiation field quality, we define a new quantity replacing the MCL with the actual particle track length inside the microdosimeter. In order to measure this new quantity, we propose a two-stage detector consisting of a commercial Tissue Equivalent Proportional Counter (TEPC) and 4 layers of Low Gain Avalanche Detectors (LGADs) strips. The TEPC detector records the energy deposition in a region equivalent to 2 um of tissue, while the LGADs are very suitable for particle tracking because of the thickness thinnable down to tens of micrometers and fast response to ionizing radiation. The concept of HDM has been investigated and validated with Monte Carlo simulations. Currently, a dedicated readout is under development. This two stages detector will require two different systems to join complementary information for each event: energy deposition in the TEPC and respective track length recorded by LGADs tracker. This challenge is being addressed by implementing SoC (System on Chip) technology, relying on Field Programmable Gated Arrays (FPGAs) based on the Zynq architecture. TEPC readout consists of three different signal amplification legs and is carried out thanks to 3 ADCs mounted on a FPGA board. LGADs activated strip signal is processed thanks to dedicated chips, and finally, the activated strip is stored relying again on FPGA-based solutions. In this work, we will provide a detailed description of HDM geometry and the SoC solutions that we are implementing for the readout.

Keywords: particle tracking, ion therapy, low gain avalanche diode, tissue equivalent proportional counter, microdosimetry

Procedia PDF Downloads 136
297 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 377
296 Flutter Control Analysis of an Aircraft Wing Using Carbon Nanotubes Reinforced Polymer

Authors: Timothee Gidenne, Xia Pinqi

Abstract:

In this paper, an investigation of the use of carbon nanotubes (CNTs) reinforced polymer as an actuator for an active flutter suppression to counter the flutter phenomena is conducted. The goal of this analysis is to establish a link between the behavior of the control surface and the actuators to demonstrate the veracity of using such a suppression system for the aeronautical field. A preliminary binary flutter model using simplified unsteady aerodynamics is developed to study the behavior of the wing while reaching the flutter speed and when the control system suppresses the flutter phenomena. The Timoshenko beam theory for bilayer materials is used to match the response of the control surface with the CNTs reinforced polymer (CNRP) actuators. According to Timoshenko theory, results show a good and realistic response for such a purpose. Even if the results are still preliminary, they show evidence of the potential use of CNRP for control surface actuation for the small-scale and lightweight system.

Keywords: actuators, aeroelastic, aeroservoelasticity, carbon nanotubes, flutter, flutter suppression

Procedia PDF Downloads 97
295 Energy Saving and Performance Evaluation of an Air Handling Unit Integrated with a Membrane Energy Exchanger for Cold Climates

Authors: Peng Liu, Maria Justo Alonso, Hans Martin Mathisen

Abstract:

A theoretical model is developed to evaluate the performance and energy saving potential of an air handling unit integrated with a membrane energy exchanger in cold climates. The recovered sensible and latent heat, fan preheating use for frost prevention and heating energy consumed by heating coil after the ventilator is compared for the air handling unit combined heat and energy exchanger respectively. A concept of coefficient of performance of air handling unit is presented and applied to assess the energy use of air handling unit (AHU) in cold climates. The analytic results indicate downsizing of the preheating coil before exchanger and heating coils after exchanger are expected since the required power to preheat and condition the air is reduced compared to heat exchanger when the MEE is integrated with AHU. Simultaneously, a superior ratio of energy recovered (RER) is obtained from AHU build-in a counter-flow MEE. The AHU with sensible-only heat exchanger has noticeably low RER, around 1 at low outdoor air temperature where the maximum energy rate is desired to condition the severe cold and dry air.

Keywords: membrane energy exchanger, cold climate, energy efficient building, HVAC

Procedia PDF Downloads 296
294 Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent

Authors: K. Nirmalkumar

Abstract:

An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted.

Keywords: corrosion, calcium nitrite, concrete, fly ash

Procedia PDF Downloads 242
293 Learning Management System Technologies for Teaching Computer Science at a Distance Education Institution

Authors: Leila Goosen, Dalize van Heerden

Abstract:

The performance outcomes of first year Computer Science and Information Technology students across the world are of great concern, whether they are being taught in a face-to-face environment or via distance education. In the face-to-face environment, it is, however, somewhat easier to teach and support students than it is in a distance education environment. The face-to-face academic can more easily gauge the level of understanding and participation of students and implement interventions to address issues, which may arise. With the inroads that Web 2.0 and Web 3.0 technologies are making, the world of online teaching and learning are rapidly expanding, bringing about technologies, which allows for similar interactions between online academics and their students as available to their face-to-face counter parts. At the University of South Africa (UNISA), the Learning Management System (LMS) is called myUNISA and it is deployed on a SAKAI platform. In this paper, we will take a look at some of the myUNISA technologies implemented in the teaching of a first year programming course, how they are implemented and, in some cases, we will indicate how this affects the performance outcomes of students.

Keywords: computer science, Distance Education Technologies, Learning Management System, face-to-face environment

Procedia PDF Downloads 469
292 Incorporation of Hibah as a Catalyst for Channelling Profits and Compensations in Islamic Transactions

Authors: Ameen Alshugaa, Farrukh Habib

Abstract:

Shariah (the Islamic law) sanctions a plethora of profit-sharing arrangements for financial transactions. However, when it comes to the practice of Islamic banking, it is felt by the scholars and practitioners that many of these arrangements often fail to compensate different parties of a financial transaction compared to conventional banking, due to the Riba (interest / usury) element. This issue is caused by the parties inability to codify these compensations in any contract so as to avoid Riba. Here, hibah (gift) may be regarded as one of the solutions. In essence, hibah is a unilateral charity contract where a party voluntarily gives away something to another party without any counter value. This paper attempts to analyse theoretical and practical aspects of hibah from the perspective of Islamic law, enunciating its legality and detailing its allowance in Islamic banking. It also discusses several practices evaluating the role of hibah in resolving issues related to Riba. In particular, these practices demonstrate the validity of hibah as a way to distribute revenues and compensate parties in Islamic financial transactions, while achieving competitive advantage over conventional banking, and avoiding the element of Riba.

Keywords: hibah (gift), Islamic Finance, Islamic Law of Contract, profit distribution, Shariah

Procedia PDF Downloads 270
291 New Trends in Pakistani Cinema: Muslim Women, Cinematic Struggle and the Global World

Authors: Sana Zia

Abstract:

One of the most important questions for research on Muslim women's representation is the relationship between Islam and women’s situation in Islamic countries. In this context, certain questions can be raised like is it possible to analyze women’s situation in Islamic countries like Pakistan? Or what is the relationship between Islam and patriarchy? So this paper will examine all these questions by analysing Muslim women's representation in Pakistani Cinema. It is also significant to note that despite political and religious constraints in Muslim countries, in particular, Pakistan, women have not only been part of the film industry for long, but they also have chosen films as their feminist tool to question and expose the effects of patriarchy, religious fundamentalism, and gender-specific socio-cultural oppression. The religious-cultural ethos that could include gender-specific restrictions and limitations on their creative expression as Muslim women in an Islamic society. A new wave of Pakistani cinema is pivoting around strong Muslim female characters and opened up a new thought about Islamic women.Their contributions and success through this medium emphasized the need to investigate the significance and effectiveness of contemporary cinema as a tool of resistance and cross-cultural communication in a Muslim society. So this research can also provide a better understanding about Islam that needs to be modernized and reclaimed from the clutches of fundamentalism and extremism. This paper thus investigates the interrelation of women's representation and Pakistani cinema by analysing two films ‘Bol: To speak up’ and ‘Dukhter: Daughter’. The feminist analysis of these films not only helps to understand the new trends and dimensions in representation of Muslim women in Pakistani cinema, but this also helps to raise awareness globally regarding the depiction of Muslim women. So to foreground the above mentioned discussion, the films under study helps to evaluate their significance, the role they play towards activism, resistance, and global awareness in terms of what could be termed as a Muslim woman. The paper thus provides a valuable insight that how and why Islam is being used as a mechanism to merge social, political and economic factors to define the rights and conditions of Pakistani Muslim women and highlight the cinematic struggle of the film maker’s which by using films as an awareness tool are going to highlight the problems and issues of Muslim women in the global world.

Keywords: Muslim women, Pakistani cinema, patriarchy, religious fundamentalism

Procedia PDF Downloads 239
290 Quantum Entangled States and Image Processing

Authors: Sanjay Singh, Sushil Kumar, Rashmi Jain

Abstract:

Quantum registering is another pattern in computational hypothesis and a quantum mechanical framework has a few helpful properties like Entanglement. We plan to store data concerning the structure and substance of a basic picture in a quantum framework. Consider a variety of n qubits which we propose to use as our memory stockpiling. In recent years classical processing is switched to quantum image processing. Quantum image processing is an elegant approach to overcome the problems of its classical counter parts. Image storage, retrieval and its processing on quantum machines is an emerging area. Although quantum machines do not exist in physical reality but theoretical algorithms developed based on quantum entangled states gives new insights to process the classical images in quantum domain. Here in the present work, we give the brief overview, such that how entangled states can be useful for quantum image storage and retrieval. We discuss the properties of tripartite Greenberger-Horne-Zeilinger and W states and their usefulness to store the shapes which may consist three vertices. We also propose the techniques to store shapes having more than three vertices.

Keywords: Greenberger-Horne-Zeilinger, image storage and retrieval, quantum entanglement, W states

Procedia PDF Downloads 275
289 Rapid Method for Low Level 90Sr Determination in Seawater by Liquid Extraction Technique

Authors: S. Visetpotjanakit, N. Nakkaew

Abstract:

Determination of low level 90Sr in seawater has been widely developed for the purpose of environmental monitoring and radiological research because 90Sr is one of the most hazardous radionuclides released from atmospheric during the testing of nuclear weapons, waste discharge from the generation nuclear energy and nuclear accident occurring at power plants. A liquid extraction technique using bis-2-etylhexyl-phosphoric acid to separate and purify yttrium followed by Cherenkov counting using a liquid scintillation counter to determine 90Y in secular equilibrium to 90Sr was developed to monitor 90Sr in the Asia Pacific Ocean. The analytical performance was validated for the accuracy, precision, and trueness criteria. Sr-90 determination in seawater using various low concentrations in a range of 0.01 – 1 Bq/L of 30 liters spiked seawater samples and 0.5 liters of IAEA-RML-2015-01 proficiency test sample was performed for statistical evaluation. The results had a relative bias in the range from 3.41% to 12.28%, which is below accepted relative bias of ± 25% and passed the criteria confirming that our analytical approach for determination of low levels of 90Sr in seawater was acceptable. Moreover, the approach is economical, non-laborious and fast.

Keywords: proficiency test, radiation monitoring, seawater, strontium determination

Procedia PDF Downloads 127
288 Functional to Business Process Orientation in Business Schools

Authors: Sunitha Thappa

Abstract:

Business environment is a set of complex interdependent dimensions that corporates have to always be vigil in identifying the influential waves. Over the year business environment has evolved into a basket of uncertainties. Every organization strives to counter this dynamic nature of business environment by recurrently evaluating the primary and support activities of its value chain. This has led to companies redesigning their business models, reinvent business processes and operating procedure on unremitting basis. A few specific issues that are placed before the present day managers are breaking down the functional interpretation of any challenge that organizations confronts, reduction in organizational hierarchy and tackling the components of the value chain to retain their competitive advantage. It is how effectively managers detect the changes and swiftly reorient themselves to these changes that define their success or failure. Given the complexity of decision making in this dynamic environment, two important question placed before the B-schools of today. Firstly, are they grooming and nurturing managerial talent proficient enough to thrive in this multifaceted business environment? Secondly, are the management graduates walking through their portals, able to view challenges from a cross-functional perspective with emphasis to customer and process rather than hierarchy and functions. This paper focuses on the need for a process oriented approach to management education.

Keywords: management education, pedagogy, functional, process

Procedia PDF Downloads 303
287 Design, Control and Autonomous Trajectory Tracking of an Octorotor Rotorcraft

Authors: Seyed Jamal Haddadi, M. Reza Mehranpour, Roya Sadat Mortazavi, Zahra Sadat Mortazavi

Abstract:

Principal aim of this research is trajectory tracking, attitude and position control scheme in real flight mode by an Octorotor helicopter. For more stability, in this Unmanned Aerial Vehicle (UAV), number of motors is increased to eight motors which end of each arm installed two coaxial counter rotating motors. Dynamic model of this Octorotor includes of motion equation for translation and rotation. Utilized controller is proportional-integral-derivative (PID) control loop. The proposed controller is designed such that to be able to attenuate an effect of external wind disturbance and guarantee stability in this condition. The trajectory is determined by a Global Positioning System (GPS). Also an ARM CortexM4 is used as microprocessor. Electronic board of this UAV designed as able to records all of the sensors data, similar to an aircraft black box in external memory. Finally after auto landing of Octorotor, flight data is shown in MATLAB software and Experimental results of the proposed controller show the effectiveness of our approach on the Autonomous Quadrotor in real conditions.

Keywords: octorotor, design, PID controller, autonomous, trajectory tracking

Procedia PDF Downloads 270
286 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 263
285 The Effectiveness of National Fiscal Rules in the Asia-Pacific Countries

Authors: Chiung-Ju Huang, Yuan-Hong Ho

Abstract:

This study utilizes the International Monetary Fund (IMF) Fiscal Rules Dataset focusing on four specific fiscal rules such as expenditure rule, revenue rule, budget balance rule, and debt rule and five main characteristics of each fiscal rule those are monitoring, enforcement, coverage, legal basis, and escape clause to construct the Fiscal Rule Index for nine countries in the Asia-Pacific region from 1996 to 2015. After constructing the fiscal rule index for each country, we utilize the Panel Generalized Method of Moments (Panel GMM) by using the constructed fiscal rule index to examine the effectiveness of fiscal rules in reducing procyclicality. Empirical results show that national fiscal rules have a significantly negative impact on procyclicality of government expenditure. Additionally, stricter fiscal rules combined with high government effectiveness are effective in reducing procyclicality of government expenditure. Results of this study indicate that for nine Asia-Pacific countries, policymakers’ use of fiscal rules and government effectiveness to reducing procyclicality of fiscal policy are effective.

Keywords: counter-cyclical policy, fiscal rules, government efficiency, procyclical policy

Procedia PDF Downloads 236