Search results for: large or massive rotator cuff tears
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7325

Search results for: large or massive rotator cuff tears

6995 Exploring the Sources of Innovation in Food Processing SMEs of Kerala

Authors: Bhumika Gupta, Jeayaram Subramanian, Hardik Vachhrajani, Avinash Shivdas

Abstract:

Indian food processing industry is one of the largest in the world in terms of production, consumption, exports and growth opportunities. SMEs play a crucial role within this. Large manufacturing firms largely dominate innovation studies in India. Innovation sources used by SMEs are often different from that of large firms. This paper focuses on exploring various sources of innovation adopted by food processing SMEs in Kerala, South India. Outcome suggests that SMEs use various sources like suppliers, competitors, employees, government/research institutions and customers to get new ideas.

Keywords: food processing, innovation, SMEs, sources of innovation

Procedia PDF Downloads 387
6994 Cosmic Dust as Dark Matter

Authors: Thomas Prevenslik

Abstract:

Weakly Interacting Massive Particle (WIMP) experiments suggesting dark matter does not exist are consistent with the argument that the long-standing galaxy rotation problem may be resolved without the need for dark matter if the redshift measurements giving the higher than expected galaxy velocities are corrected for the redshift in cosmic dust. Because of the ubiquity of cosmic dust, all velocity measurements in astronomy based on redshift are most likely overstated, e.g., an accelerating Universe expansion need not exist if data showing supernovae brighter than expected based on the redshift/distance relation is corrected for the redshift in dust. Extensions of redshift corrections for cosmic dust to other historical astronomical observations are briefly discussed.

Keywords: alternative theories, cosmic dust redshift, doppler effect, quantum mechanics, quantum electrodynamics

Procedia PDF Downloads 276
6993 Hyperspectral Image Classification Using Tree Search Algorithm

Authors: Shreya Pare, Parvin Akhter

Abstract:

Remotely sensing image classification becomes a very challenging task owing to the high dimensionality of hyperspectral images. The pixel-wise classification methods fail to take the spatial structure information of an image. Therefore, to improve the performance of classification, spatial information can be integrated into the classification process. In this paper, the multilevel thresholding algorithm based on a modified fuzzy entropy function is used to perform the segmentation of hyperspectral images. The fuzzy parameters of the MFE function have been optimized by using a new meta-heuristic algorithm based on the Tree-Search algorithm. The segmented image is classified by a large distribution machine (LDM) classifier. Experimental results are shown on a hyperspectral image dataset. The experimental outputs indicate that the proposed technique (MFE-TSA-LDM) achieves much higher classification accuracy for hyperspectral images when compared to state-of-art classification techniques. The proposed algorithm provides accurate segmentation and classification maps, thus becoming more suitable for image classification with large spatial structures.

Keywords: classification, hyperspectral images, large distribution margin, modified fuzzy entropy function, multilevel thresholding, tree search algorithm, hyperspectral image classification using tree search algorithm

Procedia PDF Downloads 139
6992 Language Maintenance and Literacy of Madurese in Probolinggo City

Authors: Maria Ulfa, Nur Awaliyah Putri

Abstract:

Madurese is known as Malayo-Sumbawan Austronesian language which is used by Madurese people in Madura Island, Indonesia. However, there was a massive migration of Madurese people due to Dutch colonization. The Madurese people were brought by force for cultivation system to the eastern salient north coast or called as Tapal Kuda that spread in region covers the regencies of Probolinggo, Lumajang, Jember, Situbondo, Bondowoso, and Banyuwangi, the eastern part of the Pasuruan Regency, as well as the city of Probolinggo. The city of Probolinggo has unique characteristic regarding the ethnic and language variation. Several ethnics can be found in this city, such as Madurese, Javanese, Tengger, Arabic, Mandhalungan, Osing, and Chinese. Hence, the hybrid culture happens in Probolinggo, they called the culture as Pendhalungan which is the combination of culture among Madurese and Javanese. Among those ethnics, Madurese is the strongest ethnic that still maintains their identity, such as their ethnic language. The massive growth of Madurese in Probolinggo city, East Java is interesting to be analyzed. The object of this study is to discover language ideology and literacy of Madurese to maintain their ethnic language in Probolinggo city, East Java. The researchers used the theory of language maintenance practice based on three types of practices social language, social literacy, and peripheral ritualized practices. The approach of this study was qualitative research with ethnography method. In order to collect the data, researchers used observation and interview techniques. The amount of informants were 20 families which consist of mother, father and children in 5 sub-districts in Probolinggo city and they were interviewed regarding language ideology and literacy of Madurese. In supporting the data, researchers employed the Madurese speakers outside family scope like in school, office, and market. The result of the study revealed that Madurese has been preserved heritably to young generations by ethnics of Madura in Probolinggo city. Primarily the language is being taught in the earlier age of their children as L1 and used as ethnic identity. The parents teach them with simple sentences that grammatically correct. This language literacy is applied to maintain ethnic language as their ethnicity marker since they inhabit in Javanese ethnic area. In fact, it is not the only ideology of Madurese ethnic but also the influence of economic situation like in trading communication. The usage of Madurese in the trading scope is very beneficial since people can bargain the goods cheaper and easier because most of the traders are from Madurese ethnic. In this situation, linguistic phenomena such as code mixing and code switching between Madurese and Javanese are emerged as the trading communication. From the result, it can be concluded that solidarity exists among Madurese people in many scopes.

Keywords: language literacy, language maintenance, Madurese, Probolinggo City

Procedia PDF Downloads 209
6991 Steepest Descent Method with New Step Sizes

Authors: Bib Paruhum Silalahi, Djihad Wungguli, Sugi Guritman

Abstract:

Steepest descent method is a simple gradient method for optimization. This method has a slow convergence in heading to the optimal solution, which occurs because of the zigzag form of the steps. Barzilai and Borwein modified this algorithm so that it performs well for problems with large dimensions. Barzilai and Borwein method results have sparked a lot of research on the method of steepest descent, including alternate minimization gradient method and Yuan method. Inspired by previous works, we modified the step size of the steepest descent method. We then compare the modification results against the Barzilai and Borwein method, alternate minimization gradient method and Yuan method for quadratic function cases in terms of the iterations number and the running time. The average results indicate that the steepest descent method with the new step sizes provide good results for small dimensions and able to compete with the results of Barzilai and Borwein method and the alternate minimization gradient method for large dimensions. The new step sizes have faster convergence compared to the other methods, especially for cases with large dimensions.

Keywords: steepest descent, line search, iteration, running time, unconstrained optimization, convergence

Procedia PDF Downloads 520
6990 Design Recommendation for H-shapes Steel Beam with Unreinforced Circular Web Opening

Authors: Facundo L. Vasconsellos, Erwin

Abstract:

In building construction, the use of web opening as a passage for service pipes is very common with the main purpose of space saving. The strength of the beam may be reduced by this opening, and thus, the configuration of the web opening should be well-designed. A design guide to aid the design of the beam with web opening is available, but it was established based on studies on the beam subjected to gravity-type loading. In simple words, there are no clear design guidelines for the design of beams with web openings subjected to seismic-type loading, which is required in Taiwan. Without any clear guidelines, engineers tend to design the web opening based on their experience, and in most cases, the design is too conservative. A massive amount of reinforcement is sometimes required even though the opening is introduced to the web in low-stress regions. The cost of the reinforcement is usually high. In view of the current situation, there exists a need to investigate the seismic behavior of beams subjected to seismic-type loading so that practical solutions can be provided to aid the engineer in designing the beams with web openings. The current study focuses on investigating the seismic behavior of beams with unreinforced web openings subjected to seismic-type loading. As the preliminary study, the scope of the study is limited to the beam that is only subjected to uniformly distributed gravity load before being subjected to seismic-type loading. The main objective of this study is to confirm that there exists a chance for introducing a web opening without any reinforcement on a beam subjected to seismic-type loading. Three beams, one without and two with circular web openings, were tested to observe how web openings will affect the beam performance under seismic load. The test result shows that for the beam section and length tested in this study, the presence of the web opening located relatively close to the beam plastic hinge region did not affect the overall performance of the beam. No distinct difference in hysteretic behavior can be observed between the beams with and without web opening. The chance of introducing unreinforced web openings on beams designed as highly ductile members exists. Following the test, numerical simulation was also conducted to investigate the hysteretic behavior of various dimensions of beams with one large unreinforced circular web opening. As a result, a design recommendation is proposed to aid the engineer in judging whether the opening reinforcement is required or not. Without reinforcement, considerable cost savings can be achieved.

Keywords: circular web opening, seismic design, steel beam design, unreinforced web opening

Procedia PDF Downloads 26
6989 Of Digital Games and Dignity: Rationalizing E-Sports Amidst Stereotypes Associated with Gamers

Authors: Sarthak Mohapatra, Ajith Babu, Shyam Prasad Ghosh

Abstract:

The community of gamers has been at the crux of stigmatization and marginalization by the larger society, resulting in dignity erosion. India presents a unique context where e-sports have recently seen large-scale investments, a massive userbase, and appreciable demand for gaming as a career option. Yet the apprehension towards gaming is salient among parents and non-gamers who engage in the de-dignification of gamers, by advocating the discourse of violence promotion via video games. Even the government is relentless in banning games due to data privacy issues. Thus, the current study explores the experiences of gamers and how they navigate these de-dignifying circumstances. The study follows an exploratory qualitative approach where in-depth interviews are used as data collection tools guided by a semi-structured questionnaire. A total of 25 individuals were interviewed comprising casual gamers, professional gamers, and individuals who are indirectly impacted by gaming including parents, relatives, and friends of gamers. Thematic analysis via three-level coding is used to arrive at broad themes (categories) and their sub-themes. The results indicate that the de-dignification of gamers results from attaching stereotypes of introversion, aggression, low intelligence, and low aspirations to them. It is interesting to note that the intensity of de-dignification varies and is more salient in violent shooting games which are perceived to require low cognitive resources to master. The moral disengagement of gamers while playing violent video games becomes the basis for de-dignification. Findings reveal that circumventing de-dignification required gamers to engage in several tactics that included playing behind closed doors, consciously hiding the gamer identity, rationalizing behavior by idolizing professionals, bragging about achievements within the game, and so on. Theoretically, it contributes to dignity and social identity literature by focusing on stereotyping and stigmatization. From a policy perspective, improving legitimacy toward gaming is expected to improve the social standing of gamers and professionals. For practitioners, it is important that proper channels of promotion and communication are used to educate the non-gamers so that the stereotypes blur away.

Keywords: dignity, social identity, stereotyping, video games

Procedia PDF Downloads 70
6988 The Marriage of a Sui Juris Girl: Permission of Wali (Guardian) or Consent of Ward in the Context of Personal Law in Pakistan

Authors: Muhammad Farooq

Abstract:

The present article explores the woman's consent as a paramount element in contracting a Muslim marriage. Also, whether permission of the wali (guardian) is a condition per se for a valid nikah (marriage deed) in the eye of law and Sharia. The researcher attempts to treat it through the related issues, inter alia; the marriage guardian, the women's legal capacity to give consent whether she is a virgin or nonvirgin and how that consent is to be given or may be understood. Does her laugh, tears or salience needs a legal interpretation as well as other female manifestations of emotion explained by the Muslim jurists? The silence of Muslim Family Law Ordinance 1961 (hereafter; MFLO 1961) in this regard and the likely reasons behind such silence is also inquired in brief. Germane to the theme, the various cases in which the true notion of woman's consent is interpreted by courts in Pakistan are also examined. In order to address the issue in hand, it is proposed to provide a brief overview of a few contemporary writers' opinions in which the real place of woman's consent in Muslim marriage is highlighted. Key to the idea of young Muslim woman's marriage, the doctrine of kafa'a (equality or suitability) between the man and woman is argued here to be grounded in the patriarchal and social norms. It is, therefore, concluded that such concept was the result of analogical reasoning and has less importance in the present time. As such it is not a valid factor in current scenarios to validate or invalidate marital bonds. A standard qualitative convention is used for this research. Among primary and secondary sources; for examples, Qur'an, Sunnah, Books, Scholarly articles, texts of law and case law is used to point out the researcher's view. In summation, the article is concluded with a bold statement that a young woman being a party to the contract, is absolutely entitled to 'full and free' consent for the Muslim marriage contract. It is the woman, an indispensable partaker and her consent (not the guardian' permission) that does validate or invalidate the said agreement in the eye of contemporary personal law and in Sharia.

Keywords: consent of woman, ejab (declaration), Nikah (marriage agreement), qabol (acceptance), sui juris (of age; independent), wali (guardian), wilayah (guardianship)

Procedia PDF Downloads 118
6987 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 36
6986 Ethicality of Algorithmic Pricing and Consumers’ Resistance

Authors: Zainab Atia, Hongwei He, Panagiotis Sarantopoulos

Abstract:

Over the past few years, firms have witnessed a massive increase in sophisticated algorithmic deployment, which has become quite pervasive in today’s modern society. With the wide availability of data for retailers, the ability to track consumers using algorithmic pricing has become an integral option in online platforms. As more companies are transforming their businesses and relying more on massive technological advancement, pricing algorithmic systems have brought attention and given rise to its wide adoption, with many accompanying benefits and challenges to be found within its usage. With the overall aim of increasing profits by organizations, algorithmic pricing is becoming a sound option by enabling suppliers to cut costs, allowing better services, improving efficiency and product availability, and enhancing overall consumer experiences. The adoption of algorithms in retail has been pioneered and widely used in literature across varied fields, including marketing, computer science, engineering, economics, and public policy. However, what is more, alarming today is the comprehensive understanding and focus of this technology and its associated ethical influence on consumers’ perceptions and behaviours. Indeed, due to algorithmic ethical concerns, consumers are found to be reluctant in some instances to share their personal data with retailers, which reduces their retention and leads to negative consumer outcomes in some instances. This, in its turn, raises the question of whether firms can still manifest the acceptance of such technologies by consumers while minimizing the ethical transgressions accompanied by their deployment. As recent modest research within the area of marketing and consumer behavior, the current research advances the literature on algorithmic pricing, pricing ethics, consumers’ perceptions, and price fairness literature. With its empirical focus, this paper aims to contribute to the literature by applying the distinction of the two common types of algorithmic pricing, dynamic and personalized, while measuring their relative effect on consumers’ behavioural outcomes. From a managerial perspective, this research offers significant implications that pertain to providing a better human-machine interactive environment (whether online or offline) to improve both businesses’ overall performance and consumers’ wellbeing. Therefore, by allowing more transparent pricing systems, businesses can harness their generated ethical strategies, which fosters consumers’ loyalty and extend their post-purchase behaviour. Thus, by defining the correct balance of pricing and right measures, whether using dynamic or personalized (or both), managers can hence approach consumers more ethically while taking their expectations and responses at a critical stance.

Keywords: algorithmic pricing, dynamic pricing, personalized pricing, price ethicality

Procedia PDF Downloads 62
6985 Arabic Text Classification: Review Study

Authors: M. Hijazi, A. Zeki, A. Ismail

Abstract:

An enormous amount of valuable human knowledge is preserved in documents. The rapid growth in the number of machine-readable documents for public or private access requires the use of automatic text classification. Text classification can be defined as assigning or structuring documents into a defined set of classes known in advance. Arabic text classification methods have emerged as a natural result of the existence of a massive amount of varied textual information written in the Arabic language on the web. This paper presents a review on the published researches of Arabic Text Classification using classical data representation, Bag of words (BoW), and using conceptual data representation based on semantic resources such as Arabic WordNet and Wikipedia.

Keywords: Arabic text classification, Arabic WordNet, bag of words, conceptual representation, semantic relations

Procedia PDF Downloads 399
6984 Factors Influencing Milk Yield, Quality, and Revenue of Dairy Farms in Southern Vietnam

Authors: Ngoc-Hieu Vu

Abstract:

Dairy production in Vietnam is a relatively new agricultural activity and milk production increased remarkably in recent years. Smallholders are still the main drivers for this development, especially in the southern part of the country. However, information on the farming practices is very limited. Therefore, this study aimed to determine factors influencing milk yield and quality (milk fat, total solids, solids-not-fat, total number of bacteria, and somatic cell count) and revenue of dairy farms in Southern Vietnam. The collection of data was at the farm level; individual animal records were unavailable. The 539 studied farms were located in the provinces Lam Dong (N=111 farms), Binh Duong (N=69 farms), Long An (N=174 farms), and Ho Chi Minh city (N=185 farms). The dataset included 9221 monthly test-day records of the farms from January 2013 to May 2015. Seasons were defined as rainy and dry. Farms sizes were classified as small (< 10 milking cows), medium (10 to 19 milking cows) and large (≥ 20 milking cows). The model for each trait contained year-season and farm region-farm size as subclass fixed effects, and individual farm and residual as random effects. Results showed that year-season, region, and farm size were determining sources of variation affecting all studied traits. Milk yield was higher in dry than in rainy seasons (P < 0.05), while it tended to increase from years 2013 to 2015. Large farms had higher yields (445.6 kg/cow) than small (396.7 kg/cow) and medium (428.0 kg/cow) farms (P < 0.05). Small farms, in contrast, were superior to large farms in terms of milk fat, total solids, solids-not-fat, total number of bacteria, and somatic cell count than large farms (P < 0.05). Revenue per cow was higher in large compared with medium and small farms. In conclusion, large farms achieved higher milk yields and revenues per cow, while small farms were superior in milk quality. Overall, milk yields were low and better training, financial support and marketing opportunities for farmers are needed to improve dairy production and increase farm revenues in Southern Vietnam.

Keywords: farm size, milk yield and quality, season, Southern Vietnam

Procedia PDF Downloads 334
6983 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 347
6982 Understanding Patterns of Hard Coral Demographics in Kenyan Reefs to Inform Restoration

Authors: Swaleh Aboud, Mishal Gudka, David Obura

Abstract:

Background: Coral reefs are becoming increasingly vulnerable due to several threats ranging from climate change to overfishing. This has resulted in increased management and conservation efforts to protect reefs from degradation and facilitate recovery. Recruitmentof new individuals are isimportant in the recovery process and critical for the persistence of coral reef ecosystems. Local coral community structure can be influenced by successful recruit settlement, survival, and growth Understanding coral recruitment patterns can help quantify reef resilience and connectivity, establish baselines and track changes and evaluate the effectiveness of reef restoration and conservation efforts. This study will examine the abundance and spatial pattern of coral recruits and how this relates to adult community structure, including the distribution of thermal resistance and sensitive genera and their distribution in different management regimes. Methods: Coral recruit and demography surveys were conducted from 2020 to 2022, covering 35 sites in 19coral reef locations along the Kenyan coast. These included marine parks, reserves, community conservation areas (CMAs), and open access areas from the north (Marereni) to the south (Kisite) coast of Kenya and across different reef habitats. The data was collected through the underwater visual census (UVC) technique. We counted adult corals (>10 cm diameter)of23 selected genera using belt transects (25 by 1 m) and sampling of 1 m2 quadrat (at an interval of 5m) for all coloniesless than 10 cm diameter. The benthic cover was collected using photo quadrats. The surveys were only done during the northeast monsoon season. The data wereanalyzed using the R program to see the distribution patterns and the Kruskal Wallis test to see whether there was a significant difference. Spearman correlation was also applied to assess the relationship between the distribution of coral genera in recruits and adults. Results: A total of 44 different coral genera were recorded for recruits, ranging from 3at Marereni to 30at Watamu Marine Reserve. Recruit densities ranged from 1.2±1.5recruit m-2 (mean±SD) at Likoni to 10.3± 8.4 recruit m-2 at Kisite Marine Park. The overall densityof recruitssignificantly differed between reef locations, with Kisite Marine Park and Reserve and Likonihaving significantly large differences from all the other locations, while Vuma, Watamu, Malindi, and Kilifi had significantly lower differences from all the other locations. The recruit generadensity along the Kenya coastwas divided into two clusters, one of which only included sites inKisite Marine Park. Adult colonies were dominated by Porites massive, Acropora, Platygyra, and Favites, whereas recruits were dominated by Porites branching, Porites massive, Galaxea, and Acropora. However, correlation analysis revealed a statistically significant positive correlation (r=0.81, p<0.05) between recruit and adult coral densities across the 23 coral genera. Marereni, which had the lowest densityof recruits, has only thermallyresistant coral genera, while Kisite Marine Park, with the highest recruit densities, has over 90% thermal sensitive coral genera. A weak positive correlation was found between recruit density and coralline algae, dead standing corals, and turf algae, whereas a weak negative correlation was found between recruit density and bare substrate and macroalgae. Between management regimes, marine reserves were found to have more recruits than no-take zones (marine parks and CMAs) and open access areas, although the difference was not significant. Conclusion: There was a statistically significant difference in the density of recruits between different reef locations along the Kenyan coast. Although the dominating genera of adults and recruits were different, there was a strong positive correlation between their coral communities, which could indicate self-recruitment processes or consistent distance seedings (of the same recruit genera). Sites such as Kisite Marine Park, with high recruit densities but dominated by thermally sensitive genera, will, on the other hand, be adversely affected by future thermal stress. This could imply that reducing the threats to coral reefs such as overfishingcould allow for their natural regeneration and recovery.

Keywords: coral recruits, coral adult size-class, cora demography, resilience

Procedia PDF Downloads 95
6981 Aerodynamic Analysis of Multiple Winglets for Aircrafts

Authors: S. Pooja Pragati, B. Sudarsan, S. Raj Kumar

Abstract:

This paper provides a practical design of a new concept of massive Induced Drag reductions of stream vise staggered multiple winglets. It is designed to provide an optimum performance of a winglet from conventional designs. In preparing for a mechanical design, aspects such as shape, dimensions are analyzed to yield a huge amount of reduction in fuel consumption and increased performance. Owing to its simplicity of application and effectiveness we believe that it will enable us to consider its enhanced version for the grid effect of the staggered multiple winglets on the deflected mass flow of the wing system. The objective of the analysis were to compare the aerodynamic characteristics of two winglet configuration and to investigate the performance of two winglets shape simulated at selected cant angle of 0,45,60 degree.

Keywords: multiple winglets, induced drag, aerodynamics analysis, low speed aircrafts

Procedia PDF Downloads 454
6980 Revolutionizing Traditional Farming Using Big Data/Cloud Computing: A Review on Vertical Farming

Authors: Milind Chaudhari, Suhail Balasinor

Abstract:

Due to massive deforestation and an ever-increasing population, the organic content of the soil is depleting at a much faster rate. Due to this, there is a big chance that the entire food production in the world will drop by 40% in the next two decades. Vertical farming can help in aiding food production by leveraging big data and cloud computing to ensure plants are grown naturally by providing the optimum nutrients sunlight by analyzing millions of data points. This paper outlines the most important parameters in vertical farming and how a combination of big data and AI helps in calculating and analyzing these millions of data points. Finally, the paper outlines how different organizations are controlling the indoor environment by leveraging big data in enhancing food quantity and quality.

Keywords: big data, IoT, vertical farming, indoor farming

Procedia PDF Downloads 146
6979 Production and Distribution Network Planning Optimization: A Case Study of Large Cement Company

Authors: Lokendra Kumar Devangan, Ajay Mishra

Abstract:

This paper describes the implementation of a large-scale SAS/OR model with significant pre-processing, scenario analysis, and post-processing work done using SAS. A large cement manufacturer with ten geographically distributed manufacturing plants for two variants of cement, around 400 warehouses serving as transshipment points, and several thousand distributor locations generating demand needed to optimize this multi-echelon, multi-modal transport supply chain separately for planning and allocation purposes. For monthly planning as well as daily allocation, the demand is deterministic. Rail and road networks connect any two points in this supply chain, creating tens of thousands of such connections. Constraints include the plant’s production capacity, transportation capacity, and rail wagon batch size constraints. Each demand point has a minimum and maximum for shipments received. Price varies at demand locations due to local factors. A large mixed integer programming model built using proc OPTMODEL decides production at plants, demand fulfilled at each location, and the shipment route to demand locations to maximize the profit contribution. Using base SAS, we did significant pre-processing of data and created inputs for the optimization. Using outputs generated by OPTMODEL and other processing completed using base SAS, we generated several reports that went into their enterprise system and created tables for easy consumption of the optimization results by operations.

Keywords: production planning, mixed integer optimization, network model, network optimization

Procedia PDF Downloads 36
6978 Management of Tibial Bone Defects Following Grade Three Injury in Adults

Authors: Rajendra Kumar Kanojia

Abstract:

Background; Massive bone gaps are common following road side accidents and injury to the tibia, specially open grade three fractures. It has been seen that the diaphyseal fractures in the tibia are prone to non-union, there are certain reasons known very well, like less soft tissues around the lower third tibia, less vascularity, less options of fixation of the fractures after trauma and prolonged surgical time, operation theatre time and special surgical means. Aim of study; To know the suitability of the ilizarov ring fixators in staged treatment of the fracture of the both bones leg, including tibia, we wish to see the role of ilizarov in management of open grade three fractures which have been operated and debrided, for getting the length use of ilizaorv ring in a tertiary canter is the aim of the study.

Keywords: open fracture, staged management, ilizarov, bone grafting, lengthening

Procedia PDF Downloads 284
6977 Analysis of 3 dB Directional Coupler Based On Silicon-On-Insulator (SOI) Large Cross-Section Rib Waveguide

Authors: Nurdiani Zamhari, Abang Annuar Ehsan

Abstract:

The 3 dB directional coupler is designed by using silicon-on-insulator (SOI) large cross-section and simulate by Beam Propagation Method at the communication wavelength of 1.55 µm and 1.48 µm. The geometry is shaped with rib height (H) of 6 µm and varied in step factor (r) which is 0.5, 0.6, 0.7 and 0.8. The wave guide spacing is also fixed to 5 µm and the slab width is symmetrical. In general, the 3 dB coupling lengths for four different cross-sections are several millimetre long. The 1.48 of wavelength give the longer coupling length if compare to 1.55 at the same step factor (r). Besides, the low loss propagation is achieved with less than 2 % of propagation loss.

Keywords: 3 dB directional couplers, silicon-on-insulator, symmetrical rib waveguide, OptiBPM 9

Procedia PDF Downloads 489
6976 Numerical Modeling of Large Scale Dam Break Flows

Authors: Amanbek Jainakov, Abdikerim Kurbanaliev

Abstract:

The work presents the results of mathematical modeling of large-scale flows in areas with a complex topographic relief. The Reynolds-averaged Navier—Stokes equations constitute the basis of the three-dimensional unsteady modeling. The well-known Volume of Fluid method implemented in the solver interFoam of the open package OpenFOAM 2.3 is used to track the free-boundary location. The mathematical model adequacy is checked by comparing with experimental data. The efficiency of the applied technology is illustrated by the example of modeling the breakthrough of the dams of the Andijan (Uzbekistan) and Papan (near the Osh town, Kyrgyzstan) reservoir.

Keywords: three-dimensional modeling, free boundary, the volume-of-fluid method, dam break, flood, OpenFOAM

Procedia PDF Downloads 376
6975 A Novel Spectral Index for Automatic Shadow Detection in Urban Mapping Based on WorldView-2 Satellite Imagery

Authors: Kaveh Shahi, Helmi Z. M. Shafri, Ebrahim Taherzadeh

Abstract:

In remote sensing, shadow causes problems in many applications such as change detection and classification. It is caused by objects which are elevated, thus can directly affect the accuracy of information. For these reasons, it is very important to detect shadows particularly in urban high spatial resolution imagery which created a significant problem. This paper focuses on automatic shadow detection based on a new spectral index for multispectral imagery known as Shadow Detection Index (SDI). The new spectral index was tested on different areas of World-View 2 images and the results demonstrated that the new spectral index has a massive potential to extract shadows effectively and automatically.

Keywords: spectral index, shadow detection, remote sensing images, World-View 2

Procedia PDF Downloads 501
6974 Zonal and Sequential Extraction Design for Large Flat Space to Achieve Perpetual Tenability

Authors: Mingjun Xu, Man Pun Wan

Abstract:

This study proposed an effective smoke control strategy for the large flat space with a low ceiling to achieve the requirement of perpetual tenability. For the large flat space with a low ceiling, the depth of the smoke reservoir is very shallow, and it is difficult to perpetually constrain the smoke within a limited space. A series of numerical tests were conducted to determine the smoke strategy. A zonal design i.e., the fire zone and two adjacent zones was proposed and validated to be effective in controlling smoke. Once a fire happens in a compartment space, the Engineered Smoke Control (ESC) system will be activated in three zones i.e., the fire zone, in which the fire happened, and two adjacent zones. The smoke can be perpetually constrained within the three smoke zones. To further improve the extraction efficiency, sequential activation of the ESC system within the 3 zones turned out to be more efficient than simultaneous activation. Additionally, the proposed zonal and sequential extraction design can reduce the mechanical extraction flow rate by up to 40.7 % as compared to the conventional method, which is much more economical than that of the conventional method.

Keywords: performance-based design, perpetual tenability, smoke control, fire plume

Procedia PDF Downloads 44
6973 Shear Buckling of a Large Pultruded Composite I-Section under Asymmetric Loading

Authors: Jin Y. Park, Jeong Wan Lee

Abstract:

An experimental and analytical research on shear buckling of a comparably large polymer composite I-section is presented. It is known that shear buckling load of a large span composite beam is difficult to determine experimentally. In order to sensitively detect shear buckling of the tested I-section, twenty strain rosettes and eight displacement sensors were applied and attached on the web and flange surfaces. The tested specimen was a pultruded composite beam made of vinylester resin, E-glass, carbon fibers and micro-fillers. Various coupon tests were performed before the shear buckling test to obtain fundamental material properties of the I-section. An asymmetric four-point bending loading scheme was utilized for the shear test. The loading scheme resulted a high shear and almost zeros moment condition at the center of the web panel. The shear buckling load was successfully determined after analyzing the obtained test data from strain rosettes and displacement sensors. An analytical approach was also performed to verify the experimental results and to support the discussed experimental program.

Keywords: strain sensor, displacement sensor, shear buckling, polymer composite I-section, asymmetric loading

Procedia PDF Downloads 427
6972 Conductivity-Depth Inversion of Large Loop Transient Electromagnetic Sounding Data over Layered Earth Models

Authors: Ravi Ande, Mousumi Hazari

Abstract:

One of the common geophysical techniques for mapping subsurface geo-electrical structures, extensive hydro-geological research, and engineering and environmental geophysics applications is the use of time domain electromagnetic (TDEM)/transient electromagnetic (TEM) soundings. A large transmitter loop for energising the ground and a small receiver loop or magnetometer for recording the transient voltage or magnetic field in the air or on the surface of the earth, with the receiver at the center of the loop or at any random point inside or outside the source loop, make up a large loop TEM system. In general, one can acquire data using one of the configurations with a large loop source, namely, with the receiver at the center point of the loop (central loop method), at an arbitrary in-loop point (in-loop method), coincident with the transmitter loop (coincidence-loop method), and at an arbitrary offset loop point (offset-loop method), respectively. Because of the mathematical simplicity associated with the expressions of EM fields, as compared to the in-loop and offset-loop systems, the central loop system (for ground surveys) and coincident loop system (for ground as well as airborne surveys) have been developed and used extensively for the exploration of mineral and geothermal resources, for mapping contaminated groundwater caused by hazardous waste and thickness of permafrost layer. Because a proper analytical expression for the TEM response over the layered earth model for the large loop TEM system does not exist, the forward problem used in this inversion scheme is first formulated in the frequency domain and then it is transformed in the time domain using Fourier cosine or sine transforms. Using the EMLCLLER algorithm, the forward computation is initially carried out in the frequency domain. As a result, the EMLCLLER modified the forward calculation scheme in NLSTCI to compute frequency domain answers before converting them to the time domain using Fourier Cosine and/or Sine transforms.

Keywords: time domain electromagnetic (TDEM), TEM system, geoelectrical sounding structure, Fourier cosine

Procedia PDF Downloads 67
6971 Failing Regeneration, Displacement, and Continued Consequences on Future Urban Planning Processes in Distressed Neighborhoods in Tehran

Authors: Razieh Rezabeigi Sani, Alireza Farahani, Mahdi Haghi

Abstract:

Displacement, local discontent, and forced exclusion have become prominent parts of urban regeneration activities in the Global North and South. This paper discusses the processes of massive displacement and neighborhood alteration as the consequences of a large-scale political/ideological placemaking project in central Tehran that transformed people's daily lives in surrounding neighborhoods. The conversion of Imam Hussein Square and connecting 17-Shahrivar Street to a pedestrian plaza in 2016 resulted in adjacent neighborhoods' physical, social, and economic degradation. The project has downgraded the economic and social characteristics of urban life in surrounding neighborhoods, commercialized residential land uses, displaced local people and businesses, and created unprecedented housing modes. This research has been conducted in two stages; first, after the project's implementation between 2017-2018, and second, when the street was reopened after local protests in 2021. In the first phase, 50+ on-site interviews were organized with planners, managers, and dwellers about the decision-making processes, design, and project implementation. We find that the project was based on the immediate political objectives and top-down power exertion of the local government in creating exclusive spaces (for religious ceremonies) without considering locals' knowledge, preferences, lifestyles, and everyday interactions. In the continued research in 2021, we utilized data gathered in facilitation activities and several meetings and interviews with local inhabitants and businesses to explore, design, and implement initiatives for bottom-up planning in these neighborhoods. The top-down and product-oriented (rather than process-oriented) planning, dependency on municipal financing rather than local partnerships, and lack of public participation proved to have continued effects on local participation. The paper concludes that urban regeneration projects must be based on the participation of different private/public actors, sustainable financial resources, and overall social and spatial analysis of the peripheral area before interventions.

Keywords: displacement, urban regeneration, distressed neighborhoods, ideological placemaking, Tehran

Procedia PDF Downloads 77
6970 Illegal Anthropogenic Activity Drives Large Mammal Population Declines in an African Protected Area

Authors: Oluseun A. Akinsorotan, Louise K. Gentle, Md. Mofakkarul Islam, Richard W. Yarnell

Abstract:

High levels of anthropogenic activity such as habitat destruction, poaching and encroachment into natural habitat have resulted in significant global wildlife declines. In order to protect wildlife, many protected areas such as national parks have been created. However, it is argued that many protected areas are only protected in name and are often exposed to continued, and often illegal, anthropogenic pressure. In West African protected areas, declines of large mammals have been documented between 1962 and 2008. This study aimed to produce occupancy estimates of the remaining large mammal fauna in the third largest National Park in Nigeria, Old Oyo, and to compare the estimates with historic estimates while also attempting to quantify levels of illegal anthropogenic activity using a multi-disciplinary approach. Large mammal populations and levels of illegal anthropogenic activity were assessed using empirical field data (camera trapping and transect surveys) in combination with data from questionnaires completed by local villagers and park rangers. Four of the historically recorded species in the park, lion (Panthera leo), hunting dog (Lycaon pictus), elephant (Loxodonta africana) and buffalo (Syncerus caffer) were not detected during field studies nor were they reported by respondents. In addition, occupancy estimates of hunters and illegal grazers were higher than the majority of large mammal species inside the park. This finding was reinforced by responses from the villagers and rangers who’s perception was that large mammal densities in the park were declining, and that a large proportion of the local people were entering the park to hunt wild animals and graze their domestic livestock. Our findings also suggest that widespread poverty and a lack of alternative livelihood opportunities, culture of consuming bushmeat, lack of education and awareness of the value of protected areas, and weak law enforcement are some of the reasons for the illegal activity. Law enforcement authorities were often constrained by insufficient on-site personnel and a lack of modern equipment and infrastructure to deter illegal activities. We conclude that there is a need to address the issue of illegal hunting and livestock grazing, via provision of alternative livelihoods, in combination with community outreach programmes that aim to improve conservation education and awareness and develop the capacity of the conservation authorities in order to achieve conservation goals. Our findings have implications for the conservation management of all protected areas that are available for exploitation by local communities.

Keywords: camera trapping, conservation, extirpation, illegal grazing, large mammals, national park, occupancy estimates, poaching

Procedia PDF Downloads 271
6969 Challenge of Baseline Hydrology Estimation at Large-Scale Watersheds

Authors: Can Liu, Graham Markowitz, John Balay, Ben Pratt

Abstract:

Baseline or natural hydrology is commonly employed for hydrologic modeling and quantification of hydrologic alteration due to manmade activities. It can inform planning and policy related efforts for various state and federal water resource agencies to restore natural streamflow flow regimes. A common challenge faced by hydrologists is how to replicate unaltered streamflow conditions, particularly in large watershed settings prone to development and regulation. Three different methods were employed to estimate baseline streamflow conditions for 6 major subbasins the Susquehanna River Basin; those being: 1) incorporation of consumptive water use and reservoir operations back into regulated gaged records; 2) using a map correlation method and flow duration (exceedance probability) regression equations; 3) extending the pre-regulation streamflow records based on the relationship between concurrent streamflows at unregulated and regulated gage locations. Parallel analyses were perform among the three methods and limitations associated with each are presented. Results from these analyses indicate that generating baseline streamflow records at large-scale watersheds remain challenging, even with long-term continuous stream gage records available.

Keywords: baseline hydrology, streamflow gage, subbasin, regression

Procedia PDF Downloads 295
6968 Execution of Joinery in Large Scale Projects: Middle East Region as a Case Study

Authors: Arsany Philip Fawzy

Abstract:

This study is going to address the hurdles of project management in the joinery field. It is widely divided into two sections; the first one will shed light on how to execute large-scale projects with a specific focus on the middle east region. It will also raise major obstacles that may face the joinery team from the site clearance and the coordination between the joinery team and the construction team. The second section is going to technically analyze the commercial side of the joinery and how to control the main cost of the project to avoid financial problems. It will also suggest empirical solutions to monitor the cost impact (e.g., Variation of contract quantity and claims).

Keywords: clearance, quality, cost, variation, claim

Procedia PDF Downloads 72
6967 Proxisch: An Optimization Approach of Large-Scale Unstable Proxy Servers Scheduling

Authors: Xiaoming Jiang, Jinqiao Shi, Qingfeng Tan, Wentao Zhang, Xuebin Wang, Muqian Chen

Abstract:

Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy servers which are crawled from the Internet. In order to improve efficiency of web crawler, the following two issues should be considered primarily: (1) Tasks may fail owing to the instability of free proxy servers; (2) A proxy server will be blocked if it visits a single website frequently. In this paper, we propose Proxisch, an optimization approach of large-scale unstable proxy servers scheduling, which allow anyone with extremely low cost to run a web crawler efficiently. Proxisch is designed to work efficiently by making maximum use of reliable proxy servers. To solve second problem, it establishes a frequency control mechanism which can ensure the visiting frequency of any chosen proxy server below the website’s limit. The results show that our approach performs better than the other scheduling algorithms.

Keywords: proxy server, priority queue, optimization algorithm, distributed web crawling

Procedia PDF Downloads 188
6966 Challenges to Change and Innovation in Educational System

Authors: Felicia Kikelomo Oluwalola

Abstract:

The study was designed to identify the challenges to change and innovation in educational system in Nigeria. Educational institutions, like all other organizations, require constant monitoring, to identify areas for potential improvement. However, educational reforms are often not well-implemented. This results in massive wastage of finances, human resources, and lost potential. Educational institutions are organised on many levels, from the individual classroom under the management of a single teacher, to groups of classrooms supervised by a Head Teacher or Executive Teacher, to a whole-school structure, under the guidance of the principal. Therefore, there is need for changes and innovation in our educational system since we are in the era of computer age. In doing so, this paper examined the psychology of change, concept of change and innovation with suggested view points. Educational administrators and individuals should be ready to have the challenge of monitoring changes in technologies. Educational planners/policy makers should be encouraged to involve in change process.

Keywords: challenges, change, education, innovation

Procedia PDF Downloads 582