Search results for: military athletes
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 879

Search results for: military athletes

249 Effect of Fortification of Expressed Human Breast Milk with Olive Oil and Skimmed Milk in Improving Weight Gain in Very Low Birth Weight Neonates and Shortening Their Length of Hospital Stay

Authors: Sumrina Kousar

Abstract:

Objective: The aim of this study was to observe the effect of fortification of expressed human breast milk with olive oil and skimmed milk in improving weight gain in very low birth weight neonates and shortening their length of hospital stay. Study Design and place: A randomized controlled trial was carried out at the Combined Military Hospital Lahore from March 2018 to March 2019. Methods: Neonates admitted with very low birth weight and gestational age of < 34 weeks were included in the study. Sixty babies were enrolled using non-probability consecutive sampling; a random number table was used to allocate them into a fortification group and a control group. The control group received expressed milk alone, while olive oil 1 ml twice daily and skimmed milk 1 gram in every third feed were added to expressed milk in the fortification group. Data was analyzed on SPSS 20. Proportions were compared by applying the chi-square test. An independent sample t-test was applied for comparing means. A p-value of ≤ 0.05 was considered significant. Results: The study comprised of 60 neonates, with 30 in each of the groups. Weight gain was 24.83±5.63 in the fortification group and 11.72±3.95 in the control group (p =< 0.001). Mean hospital stay was 20.5716.511 in the fortification group and 27.678.89 in the control group (p =< 0.043). Conclusion: Olive oil and skimmed milk fortification of breast milk was effective for weight gain and reducing the length of hospital stay in very low birth weight neonates.

Keywords: fortification, olive oil, skimmed milk, weight gain

Procedia PDF Downloads 143
248 Aerodynamic Modelling of Unmanned Aerial System through Computational Fluid Dynamics: Application to the UAS-S45 Balaam

Authors: Maxime A. J. Kuitche, Ruxandra M. Botez, Arthur Guillemin

Abstract:

As the Unmanned Aerial Systems have found diverse utilities in both military and civil aviation, the necessity to obtain an accurate aerodynamic model has shown an enormous growth of interest. Recent modeling techniques are procedures using optimization algorithms and statistics that require many flight tests and are therefore extremely demanding in terms of costs. This paper presents a procedure to estimate the aerodynamic behavior of an unmanned aerial system from a numerical approach using computational fluid dynamic analysis. The study was performed using an unstructured mesh obtained from a grid convergence analysis at a Mach number of 0.14, and at an angle of attack of 0°. The flow around the aircraft was described using a standard k-ω turbulence model. Thus, the Reynold Averaged Navier-Stokes (RANS) equations were solved using ANSYS FLUENT software. The method was applied on the UAS-S45 designed and manufactured by Hydra Technologies in Mexico. The lift, the drag, and the pitching moment coefficients were obtained at different angles of attack for several flight conditions defined in terms of altitudes and Mach numbers. The results obtained from the Computational Fluid Dynamics analysis were compared with the results obtained by using the DATCOM semi-empirical procedure. This comparison has indicated that our approach is highly accurate and that the aerodynamic model obtained could be useful to estimate the flight dynamics of the UAS-S45.

Keywords: aerodynamic modelling, CFD Analysis, ANSYS FLUENT, UAS-S45

Procedia PDF Downloads 352
247 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences

Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao

Abstract:

Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.

Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern

Procedia PDF Downloads 323
246 Rate of Force Development, Net Impulse and Modified Reactive Strength as Predictors of Volleyball Spike Jump Height among Young Elite Players

Authors: Javad Sarvestan, Zdenek Svoboda

Abstract:

Force-time (F-T) curvature characteristics are globally referenced as the main indicators of athletic jump performance. Nevertheless, to the best of authors’ knowledge, no investigation tried to deeply study the relationship between F-T curve variables and real-game jump performance among elite volleyball players. To this end, this study was designated to investigate the association between F-T curve variables, including movement timings, force, velocity, power, rate of force development (RFD), modified reactive strength index (RSImod), and net impulse with spike jump height during real-game circumstances. Twelve young elite volleyball players performed 3 countermovement jump (CMJ) and 3 spike jump in real-game circumstances with 1-minute rest intervals to prevent fatigue. Shapiro-Wilk statistical test illustrated the normality of data distribution, and Pearson’s product correlation test portrayed a significant correlation between CMJ height and peak RFD (0.85), average RFD (r=0.81), RSImod (r=0.88) and concentric net impulse (r=0.98), and also significant correlation between spike jump height and peak RFD (0.73), average RFD (r=0.80), RSImod (r=0.62) and concentric net impulse (r=0.71). Multiple regression analysis also reported that these factors have a strong contribution in predicting of CMJ (98%) and spike jump (77%) heights. Outcomes of this study confirm that the RFD, concentric net impulse, and RSImod values could precisely monitor and track the volleyball attackers’ explosive strength, muscular stretch-shortening cycle function efficiency, and ultimate spike jump height. To this effect, volleyball coaches and trainers are advised to have an in-depth focus on their athletes’ progression or the impacts of strength trainings by observing and chasing the F-T curve variables such as RFD, net impulse, and RSImod.

Keywords: net impulse, reactive strength index, rate of force development, stretch-shortening cycle

Procedia PDF Downloads 116
245 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 637
244 Growing Evaluation Process in Chamaedorea Linearis with Humus from Biosolids of the Wastewater Treatment Plant, Nueva Granada Military University Cajica

Authors: J. Gonzalez, P. Jimenez, C. Isaza

Abstract:

Palms have different characteristics that make them vulnerable; that is the case of the Chamaedorea linearis, with the presence of solitary stems of small diameter and medium leaves, culturally harvested, and in religious festivities used. Additionally, they present a weak apical meristem as the only emergency point, slow development and growth, and an affectation due to the high rate of deforestation in Colombia. Propagation of this species can improve the pressure on wild populations and help their survival in the environment. In this study was used in 177 plants biosolids humus from the Wastewater Treatment Plant (WWTP), located at the UMNG Campus Cajica (Cundinamarca, Colombia). The experiment used a control and two treatments with 10% and 20% of humus. During the process, the variables evaluated were number of leaves, percentage of chlorophyll, stem length, and estimated leaf area. The data set were taking during 14 weeks before the reproductive maturity, evidencing that the most representative development of the palms was in the treatment of 20%, plants in this treatment presented major number of leaves, larger stems, a high quantity of chlorophyll, and was a first treatment that present pinnate leaves them represent an important point in maturity process. The research gives an opportunity to improve times of growth in another species of palms and plants (Product result from INV ING 2986 UMNG).

Keywords: biosolids, humus, growth, palms, wastewater treatment plant, WWTP

Procedia PDF Downloads 99
243 Necro-Power, Paramilitarism, and Sovereignty: An Interpretation of Colombian Paramilitarism as Symptom of the Formation Process of the (Neo)Liberal Democratic State

Authors: Julian David Rios Acuna

Abstract:

This paper seeks to argue that the phenomenon of ‘paramilitarism’ in Colombia exhibits the role of violence as constitutive of the political process of state formation in the country. In order to do this, it takes as its point of departure a landmark moment in the long history of private armies known as the ‘paramilitary’ in Colombia. In 2001, paramilitary commanders, politicians, and members of the military and other branches of state power singed what is known as the ‘Pact of Ralito.’ In this pact, the paramilitary appropriated constitutional and legal language. The paper argues that this appropriation shows that the paramilitary and the state express the same claim to sovereign power and therefore have the same foundation. More precisely, paramilitary power shows itself to base its power on the same foundation as the legal order, namely, extreme forms of violence where death is generative of power. In this sense, the paper shows how, by sharing its foundation, Colombian paramilitarism exhibits that state power in Colombia can be characterized as necro-power as Achille Mbembe understands it. The paper argues that paramilitarism shows state power as necro-power by constituting itself as a symptom understood, following Zizek, as that which both shows and overthrows its own foundation. In this way, paramilitarism shows the foundation of the state, thereby reconfiguring this very state. This reconfiguration, explicitly based on necro-power, the paper concludes, transforms the state into a form more appropriate to the political demands of neo-liberalism. By exhibiting its foundation in necro-power through paramilitarism, the Colombian State turns from a liberal into a (neo)liberal democracy.

Keywords: necro-power, necropolitics, paramilitarism in Colombia, state formation, state power, sovereign power

Procedia PDF Downloads 114
242 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 105
241 Applying Serious Game Design Frameworks to Existing Games for Integration of Custom Learning Objectives

Authors: Jonathan D. Moore, Mark G. Reith, David S. Long

Abstract:

Serious games (SGs) have been shown to be an effective teaching tool in many contexts. Because of the success of SGs, several design frameworks have been created to expedite the process of making original serious games to teach specific learning objectives (LOs). Even with these frameworks, the time required to create a custom SG from conception to implementation can range from months to years. Furthermore, it is even more difficult to design a game framework that allows an instructor to create customized game variants supporting multiple LOs within the same field. This paper proposes a refactoring methodology to apply the theoretical principles from well-established design frameworks to a pre-existing serious game. The expected result is a generalized game that can be quickly customized to teach LOs not originally targeted by the game. This methodology begins by describing the general components in a game, then uses a combination of two SG design frameworks to extract the teaching elements present in the game. The identified teaching elements are then used as the theoretical basis to determine the range of LOs that can be taught by the game. This paper evaluates the proposed methodology by presenting a case study of refactoring the serious game Battlespace Next (BSN) to teach joint military capabilities. The range of LOs that can be taught by the generalized BSN are identified, and examples of creating custom LOs are given. Survey results from users of the generalized game are also provided. Lastly, the expected impact of this work is discussed and a road map for future work and evaluation is presented.

Keywords: serious games, learning objectives, game design, learning theory, game framework

Procedia PDF Downloads 82
240 Investigation of Stellram Indexable Milling Cutter XDLT09-D41 Tool Wear for Machining of Ti6Al4V

Authors: Saad Nawaz, Yu Gang, Miao Haibin

Abstract:

Titanium alloys are attractive materials for aerospace industry due to their exceptional strength to weight ratio that is maintained at elevated temperatures and their good corrosion resistance. Major applications of titanium alloys were military aerospace industry, but since last decade the trend has now shifted towards commercial industry. On the other hand, titanium alloys are notorious for being poor thermal conductor that leads to them being difficult materials for machining. In this experimental study, Stellram Indexable milling cutter XDLT09-D41 is used for rough down milling of Ti6Al4V for small depth of cut under different combinations of parameters and application of high-pressure coolant. The machining performance was evaluated in terms of tool wear, tool life, and thermal crack. The tool wear was mostly observed at the tool tip and at bottom part of tool thermal deformations were observed which propagated with respect to time. Flank wear due to scratching of the cutting chips and diffusion wear because of high thermal stresses were observed specially at the bottom of the cutting tool. It was found that maximum tool life was obtained at the speed of 40m/min, feed rate of 358mm/min and depth of cut of 0.8mm. In the end, it was concluded that machining of Ti6Al4V is a thermally dominant process which leads to high thermal stresses in machining zone that results in increasing tool wear rate and deformation propagation.

Keywords: tool wear, cutting speed, flank wear , tool life

Procedia PDF Downloads 295
239 Helicopter Exhaust Gases Cooler in Terms of Computational Fluid Dynamics (CFD) Analysis

Authors: Mateusz Paszko, Ksenia Siadkowska

Abstract:

Due to the low-altitude and relatively low-speed flight, helicopters are easy targets for actual combat assets e.g. infrared-guided missiles. Current techniques aim to increase the combat effectiveness of the military helicopters. Protection of the helicopter in flight from early detection, tracking and finally destruction can be realized in many ways. One of them is cooling hot exhaust gasses, emitting from the engines to the atmosphere in special heat exchangers. Nowadays, this process is realized in ejective coolers, where strong heat and momentum exchange between hot exhaust gases and cold air ejected from atmosphere takes place. Flow effects of air, exhaust gases; mixture of those two and the heat transfer between cold air and hot exhaust gases are given by differential equations of: Mass transportation–flow continuity, ejection of cold air through expanding exhaust gasses, conservation of momentum, energy and physical relationship equations. Calculation of those processes in ejective cooler by means of classic mathematical analysis is extremely hard or even impossible. Because of this, it is necessary to apply the numeric approach with modern, numeric computer programs. The paper discussed the general usability of the Computational Fluid Dynamics (CFD) in a process of projecting the ejective exhaust gases cooler cooperating with helicopter turbine engine. In this work, the CFD calculations have been performed for ejective-based cooler cooperating with the PA W3 helicopter’s engines.

Keywords: aviation, CFD analysis, ejective-cooler, helicopter techniques

Procedia PDF Downloads 300
238 The Role of Identity Politics in the 2023 General Election in Nigeria: An Overview

Authors: Adekunle Saheed Ajisebiyawo

Abstract:

This paper examines the influence of identity politics on the development of electoral democracy in Nigeria. The paper was anchored on a theory of African democracy adopted the qualitative methodology and deployed data from secondary sources to evaluate the 2023 presidential election, and found that ethnicity, religion, and regional sentiments played a major role in the election. The practical implications of this paper are that while Nigeria’s democracy is tending towards consolidation, if the unexpected does not happen, e.g., military takeover, religious and ethnic identities can mar the country’s development as competent candidates that have good policies will be voted out based on religious and ethnic sentiments. Thus, there is a need to de-emphasize religion and ethnicity in the Nigerian polity. Candidates and parties that campaign based on racial or religious narratives should be barred from contesting elective positions. The paper concluded that identity politics is inimical to Nigeria’s democratization process as well as efforts aimed at uniting and integrating the country; it, therefore, recommended that to establish a sound electoral democracy and a strong united country, the menace of ethnic, religious, and regional cleavages should be addressed. To achieve this, efforts should be intensified towards providing a set of principles for nation-building which should be included in the constitution. In addition, the paper urges the media to support the formation of an inclusive government, cutting across tribes and religions in the country to reduce the negative impact of ethnicity and religion in the country.

Keywords: cleavages, democracy, ethnicity, election, identity politics, religion

Procedia PDF Downloads 29
237 The Role of Development in Settling Migration Crisis: The Preventive Approach of the European Union in Relations with Sub-Saharan African States

Authors: Artsiom Zinchanka

Abstract:

The world faces now one of the largest migration crisis and the European Union meets challenges in accepting the flow of migrants that could not be handled finally at this step. This crisis is complicated with many factors, such as military conflict in the Middle East; absence of the appropriate conditions in the refugees’ camps; but also with the complicity of the migration flow consisting of the Sub-Saharan migrants. This type of migrants leave their homelands for many reasons including poverty, not appropriate level of social and economic conditions, absence of infrastructure and access to the education and medical care. In practice, when the restrictive approach directed to limit the flow of illicit migration and to send illicit migrants back to their homelands is not always working, the approach directed to the root causes of the migration crisis can be more effective in settling the crisis. The Cotonou Agreement and the following treaties concluded between the European Union, and Sub-Saharan states show that the European Union considers the development of human rights and appropriate social and economic conditions in the Sub-Saharan states as one of the most important factors addressing the migration crisis. The preventive approach as the efforts of the European Union to develop appropriate social and economic conditions in Sub-Saharan states is considered in this article, as well as its evolution and current condition. This article also considers pros and cons of this approach and the obstacles that this approach faces. The research methods include review of literature and documents, analytical and descriptive methods.

Keywords: migration crisis, preventive approach, Sub-Saharan States, the European Union

Procedia PDF Downloads 101
236 Review of Microstructure, Mechanical and Corrosion Behavior of Aluminum Matrix Composite Reinforced with Agro/Industrial Waste Fabricated by Stir Casting Process

Authors: Mehari Kahsay, Krishna Murthy Kyathegowda, Temesgen Berhanu

Abstract:

Aluminum matrix composites have gained focus on research and industrial use, especially those not requiring extreme loading or thermal conditions, for the last few decades. Their relatively low cost, simple processing and attractive properties are the reasons for the widespread use of aluminum matrix composites in the manufacturing of automobiles, aircraft, military, and sports goods. In this article, the microstructure, mechanical, and corrosion behaviors of the aluminum metal matrix were reviewed, focusing on the stir casting fabrication process and usage of agro/industrial waste reinforcement particles. The results portrayed that mechanical properties like tensile strength, ultimate tensile strength, hardness, percentage of elongation, impact, and fracture toughness are highly dependent on the amount, kind, and size of reinforcing particles. Additionally, uniform distribution, wettability of reinforcement particles, and the porosity level of the resulting composite also affect the mechanical and corrosion behaviors of aluminum matrix composites. The two-step stir-casting process resulted in better wetting characteristics, a lower porosity level, and a uniform distribution of particles with proper handling of process parameters. On the other hand, the inconsistent and contradicting results on corrosion behavior regarding monolithic and hybrid aluminum matrix composites need further study.

Keywords: microstructure, mechanical behavior, corrosion, aluminum matrix composite

Procedia PDF Downloads 45
235 Engineering Strategies Towards Improvement in Energy Storage Performance of Ceramic Capacitors for Pulsed Power Applications

Authors: Abdul Manan

Abstract:

The necessity for efficient and cost-effective energy storage devices to intelligently store the inconsistent energy output from modern renewable energy sources is peaked today. The scientific community is struggling to identify the appropriate material system for energy storage applications. Countless contributions by researchers worldwide have now helped us identify the possible snags and limitations associated with each material/method. Energy storage has attracted great attention for its use in portable electronic devices military field. Different devices, such as dielectric capacitors, supercapacitors, and batteries, are used for energy storage. Of these, dielectric capacitors have high energy output, a long life cycle, fast charging and discharging capabilities, work at high temperatures, and excellent fatigue resistance. The energy storage characteristics have been studied to be highly affected by various factors, such as grain size, optimized compositions, grain orientation, energy band gap, processing techniques, defect engineering, core-shell formation, interface engineering, electronegativity difference, the addition of additives, density, secondary phases, the difference of Pmax-Pr, sample thickness, area of the electrode, testing frequency, and AC/DC conditions. The data regarding these parameters/factors are scattered in the literature, and the aim of this study is to gather the data into a single paper that will be beneficial for new researchers in the field of interest. Furthermore, control over and optimizing these parameters will lead to enhancing the energy storage properties.

Keywords: strategies, ceramics, energy storage, capacitors

Procedia PDF Downloads 54
234 Prevalence of Common Mental Disorders and Its Correlation with Mental Toughness among Professional South African Rugby Players

Authors: H. B. Grobler, K. Du Plooy, P. Kruger, S. Ellis

Abstract:

Objectives: The primary objective of the study was to determine the common mental disorders (CMD) identified by professional South African rugby players and its correlation with their mental toughness, as a first step towards developing such a programme within a larger research project. Design: Survey research, within the theoretical perspective of field theory, was conducted, utilising an adaptation of an already existing mental health questionnaire. The aim was to obtain feedback from as many possible professional South African rugby players in order to make certain generalizations and come to conclusions with regard to the current mental health experiences of these rugby players. Methods: Non-randomized sampling was done, linking it with internet research in the form of the online completion of a questionnaire. A sample of 215 rugby players participated and completed the online questionnaire. Permission was obtained to make use of an existing questionnaire, previously used by the specific authors with retired professional rugby players. A section on mental toughness was added. Data were descriptively analysed by means of the SPSS software platform. Results: Results indicated that the most significant problem that the players are experiencing, is a problem with alcohol (47.9%). Other problems that featured are distress (16.3%), sleep disturbances (7%), as well as anxiety and depression (4.2%). 4.7% of the players indicated that they smoke. 3.3% of the players experience themselves as not being mentally tough. A positive correlation between mental toughness and sound sleep (0.262) was found while a negative correlation was found between mental toughness and the following: anxiety/depression (-0.401), anxiety/depression positive (-0.423), distress (-0.259) and common mental disorder problems in general (-0.220). Conclusions: Although the presence of CMD at first glance do not seem significantly high amongst all the players, it must be considered that if one player in a team experiences the presence of CMD, it will have an impact on his mental toughness and most likely on his performance, as well as on the performance of the whole team. It is therefore important to ensure mental health in the whole team, by addressing individual CMD problems. A mental health support programme is therefore needed to be implemented to the benefit of these players within the South African context.

Keywords: common mental disorders, mental toughness, professional athletes, rugby players

Procedia PDF Downloads 193
233 The Effect of Branched-Chain Amino Acids, Arginine, and Citrulline on Repeated Swimming Performance

Authors: Chun-Fang Hsueh, Chen-Kang Chang

Abstract:

Introduction: Branched-chain amino acids (BCAA) could reduce cerebral uptake of tryptophan, leading to decreased synthesis of serotonin in the brain. Arginine and citrulline could reduce exercise-induced hyperammonemia by increasing nitric oxide synthesis and the urea cycle. The combination of these supplements could reduce exercise-induced central fatigue. The purpose of this study was to examine the effect of BCAA, arginine, and citrulline supplementation on repeated swimming performance in teenage athletes. Methods: Eight male and eight female high school swimmers ingested 0.085 g/kg BCAA, 0.05 g/kg arginine and 0.05 g/kg citrulline (AA trial) or placebo (PL trial) in a randomized cross-over design. One hour after the ingestion, the subjects performed a 50 m sprint with their best style every 2 min for 8 times in an indoor 25 m pool. The subjects were asked to swim with their maximal effort each time. The time, stroke frequency and stroke length in each sprint were recorded. Venous blood samples were collected before and after the exercise. The time for each sprint was analyzed by 2-way analysis of variance with repeated measurement. Results: When all subjects were pooled together, total time for the AA trial was significantly faster than the PL trial (AA: 244.02 ± 22.94 s; PL: 247.55 ± 24.17 s, p < .001). Individual sprint time showed significant trial (p= .001) and trial x time (p= .004) effects. The post-hoc analysis revealed that the AA trial was significantly faster than the PL trial in the 2nd, 5th, and 6th sprint. In female subjects, there is a significant trial effect (p= .004) with the AA trial being faster in the 1st, 2nd, and 5th sprint. On the other hand, the trial effect was not significant (p= .072) in male subjects. Conclusions: The combined supplementation could improve 8 x 50 m performance in high school swimmers. The blood parameters including BCAA, tryptophan, NH₃, nitric oxide, and urea, as well as the stroke frequency and length in each sprint, are being analyzed. The results will be presented in the conference.

Keywords: central fatigue, hyperammonemia, tryptophan, urea

Procedia PDF Downloads 161
232 Epidemiology and Risk Factors of Injury and Stress Fractures in Male and Female Runners

Authors: Balazs Patczai, Katalin Gocze, Gabriella Kiss, Dorottya Szabo, Tibor Mintal

Abstract:

Introduction: Running has become increasingly popular on a global scale in the past decades. Amateur athletes are taking their sport to a new level in an attempt to surpass their performance goals. The aim of our study was to assess the musculoskeletal condition of amateur runners and the prevalence of injuries with a special focus on stress fracture risk. Methods: The cross sectional analysis included ankle mobility, hamstring and lower back flexibility, the use of Renne’s test for iliotibial band syndrome, functional tests for trunk and rotary stability, and measurements of bone density. Data was collected at 2 major half-marathon events in Hungary. Results: Participants (n=134) mean age was 41.76±8.57 years (males: 40.67±8.83, females: 42.08±8.56). Measures of hamstring and lower back flexibility fell into the category of good for both genders (males: 7.13±6.83cm, females: 10.17±6.67cm). No side asymmetry nor gender differences were characteristic in the case of ankle mobility. Trunk stability was significantly better for males than in females (p=0.004). Markers of bone health were in the low normal range for females and were significantly better for males (T-score: p=0.003, T-ratio: p=0.014, Z-score: p=0.034, Z-ratio: p=0.011). 5.2% of females had a previous stress fracture and 24.1% experienced irregular menstrual cycles during the past year. As for the knowledge on the possible association of energy deficiency, menstrual disturbances and their effect on bone health, Only 8.6% of females have heard of the female athlete triad either during their studies or from a health professional. Discussion: The overall musculoskeletal state was satisfactory for both genders both physically and functionally. More attention and effort should be placed on primary and secondary prevention of amateur runners. Very few active women are well informed about the effects of low energy availability and menstrual dysfunction and the negative impact these have on bone health.

Keywords: bone health, flexibility, running, stress fracture

Procedia PDF Downloads 101
231 Aircraft Components, Manufacturing and Design: Opportunities, Bottlenecks, and Challenges

Authors: Ionel Botef

Abstract:

Aerospace products operate in very aggressive environments characterized by high temperature, high pressure, large stresses on individual components, the presence of oxidizing and corroding atmosphere, as well as internally created or externally ingested particulate materials that induce erosion and impact damage. Consequently, during operation, the materials of individual components degrade. In addition, the impact of maintenance costs for both civil and military aircraft was estimated at least two to three times greater than initial purchase values, and this trend is expected to increase. As a result, for viable product realisation and maintenance, a spectrum of issues regarding novel processing technologies, innovation of new materials, performance, costs, and environmental impact must constantly be addressed. One of these technologies, namely the cold-gas dynamic-spray process has enabled a broad range of coatings and applications, including many that have not been previously possible or commercially practical, hence its potential for new aerospace applications. Therefore, the purpose of this paper is to summarise the state of the art of this technology alongside its theoretical and experimental studies, and explore how the cold-gas dynamic-spray process could be integrated within a framework that finally could lead to more efficient aircraft maintenance. Based on the paper's qualitative findings supported by authorities, evidence, and logic essentially it is argued that the cold-gas dynamic-spray manufacturing process should not be viewed in isolation, but should be viewed as a component of a broad framework that finally leads to more efficient aerospace operations.

Keywords: aerospace, aging aircraft, cold spray, materials

Procedia PDF Downloads 98
230 Healthy Beverages Made from Grape Juice: Antioxidant, Energetic, and Isotonic Components

Authors: Yasmina Bendaali, Cristian Vaquero, Carlos Escott, Carmen González, Antonio Morata

Abstract:

Consumer tendencies to healthy eating habits and request for organic beverages led to the production of new drinks from fruit juices as a source of nutrients and bioactive compounds. Grape juice is a rich source of sugars, organic acids, and phenolic compounds, which define its beneficial effect on health and the attractive sensory profile for consumers' choices (color, taste, flavor). Thus, grape juice was used as a source of sugars, avoiding the addition of sweeteners by diluting it with mineral water to obtain the sugar concentration recommended for isotonic drinks (6% to 8%) to provide energy during physical activities. In addition, phenolic compounds of grape juice are associated with many human health benefits, mainly antioxidant activity, which helps to prevent different diseases associated with oxidative stress, including cancers and cardiovascular and neurodegenerative diseases. Furthermore, physical exercise has been shown to increase the production of free radicals and other reactive oxygen species. Thus, athletes need to improve their antioxidant defense systems to prevent oxidative damage. Different studies have demonstrated the positive effect of grape juice consumption during physical activities, which improves antioxidant activity and performance, protects against oxidative damage, and reduces inflammation. Thus, the use of grape juice to develop isotonic drinks can provide isotonic drinks with antioxidant and biological activities in addition to their principal role of rehydration and replacement of minerals and carbohydrates during physical exercises. Moreover, attractive sensory characteristics, mainly color, which is provided by anthocyanin content, have a great contribution to making the drinks more natural and help to dispense the use of synthetic dyes in addition to the health benefits which will be a novel product in the field of healthy beverages responding on the demand of consumers for new, innovative, and healthy products.

Keywords: grape juice, isotonic, antioxidants, anthocyanins, natural, sport

Procedia PDF Downloads 51
229 Self‑reported Auditory Problems Are Associated with Adverse Mental Health Outcomes and Alcohol Misuse in the UK Armed Forces

Authors: Fred N. H. Parker, Nicola T. Fear, S. A. M. Stevelink, L. Rafferty

Abstract:

Purpose Auditory problems, such as hearing loss and tinnitus, have been associated with mental health problems and alcohol misuse in the UK general population and in the US Armed Forces; however, few studies have examined these associations within the UK Armed Forces. The present study examined the association between auditory problems and probable common mental disorders, post-traumatic stress disorder and alcohol misuse. Methods 5474 serving and ex-service personnel from the UK Armed Forces were examined, selected from those who responded to phase two (data collection 2007–09) and phase three (2014–16) of a military cohort study. Multivariable logistic regression was used to examine the association between auditory problems at phase two and mental health problems at phase three. Results 9.7% of participants reported ever experiencing hearing problems alone, 7.9% reported tinnitus within the last month alone, and 7.8% reported hearing problems with tinnitus. After adjustment, hearing problems with tinnitus at phase two was associated with increased odds of probable common mental disorders (AOR = 1.50, 95% CI 1.09–2.08), post-traumatic stress disorder (AOR = 2.30, 95% CI 1.41–3.76), and alcohol misuse (AOR = 1.94, 95% CI 1.28–2.96) at phase three. Tinnitus alone was associated with probable post-traumatic stress disorder (AOR = 1.80, 95% CI 1.03–3.15); however, hearing problems alone were not associated with any outcomes of interest. Conclusions The association between auditory problems and mental health problems emphasizes the importance of the prevention of auditory problems in the Armed Forces: through enhanced audiometric screening, improved hearing protection equipment, and greater levels of utilization of such equipment.

Keywords: armed forces, hearing problems, tinnitus, mental health, alcohol misuse

Procedia PDF Downloads 136
228 Like a Bridge over Troubled Waters: The Value of Joint Learning Programs in Intergroup Identity-Based Conflict in Israel

Authors: Rachelly Ashwall, Ephraim Tabory

Abstract:

In an attempt to reduce the level of a major identity-based conflict in Israel between Ultra-orthodox and secular Jews, several initiatives in recent years have tried to bring members of the two societies together in facilitated joint discussion forums. Our study analyzes the impact of two types of such programs: joint mediation training classes and confrontation-based learning programs that are designed to facilitate discussions over controversial issues. These issues include claims about an unequal shouldering of national obligations such as military service, laws requiring public observance of the Sabbath, and discrimination against women, among others. The study examines the factors that enabled the two groups to reduce their social distance, and increase their understanding of each other, and develop a recognition and tolerance of the other group's particular social identity. The research conducted over a course of two years involved observations of the activities of the groups, interviews with the participants, and analysis of the social media used by the groups. The findings demonstrate the progression from a mutual initial lack of knowledge about habits, norms, and attitudes of the out-group to an increasing desire to know, understand and more readily accept the identity of a previously rejected outsider. Participants manifested more respect, concern for and even affection for those whose identity initially led them to reject them out of hand. We discuss the implications for seemingly intractable identity-based conflict in fragile societies.

Keywords: identity-based conflict, intergroup relations, joint mediation learning, out-group recognition, social identity

Procedia PDF Downloads 226
227 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS

Authors: Ali Riza Perçin, Eser Bingül

Abstract:

Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.

Keywords: social media, "generation Y", terrorist organization, islamic state IS

Procedia PDF Downloads 407
226 MXene-Based Self-Sensing of Damage in Fiber Composites

Authors: Latha Nataraj, Todd Henry, Micheal Wallock, Asha Hall, Christine Hatter, Babak Anasori, Yury Gogotsi

Abstract:

Multifunctional composites with enhanced strength and toughness for superior damage tolerance are essential for advanced aerospace and military applications. Detection of structural changes prior to visible damage may be achieved by incorporating fillers with tunable properties such as two-dimensional (2D) nanomaterials with high aspect ratios and more surface-active sites. While 2D graphene with large surface areas, good mechanical properties, and high electrical conductivity seems ideal as a filler, the single-atomic thickness can lead to bending and rolling during processing, requiring post-processing to bond to polymer matrices. Lately, an emerging family of 2D transition metal carbides and nitrides, MXenes, has attracted much attention since their discovery in 2011. Metallic electronic conductivity and good mechanical properties, even with increased polymer content, coupled with hydrophilicity make MXenes a good candidate as a filler material in polymer composites and exceptional as multifunctional damage indicators in composites. Here, we systematically study MXene-based (Ti₃C₂) coated on glass fibers for fiber reinforced polymer composite for self-sensing using microscopy and micromechanical testing. Further testing is in progress through the investigation of local variations in optical, acoustic, and thermal properties within the damage sites in response to strain caused by mechanical loading.

Keywords: damage sensing, fiber composites, MXene, self-sensing

Procedia PDF Downloads 99
225 Recognition and Counting Algorithm for Sub-Regional Objects in a Handwritten Image through Image Sets

Authors: Kothuri Sriraman, Mattupalli Komal Teja

Abstract:

In this paper, a novel algorithm is proposed for the recognition of hulls in a hand written images that might be irregular or digit or character shape. Identification of objects and internal objects is quite difficult to extract, when the structure of the image is having bulk of clusters. The estimation results are easily obtained while going through identifying the sub-regional objects by using the SASK algorithm. Focusing mainly to recognize the number of internal objects exist in a given image, so as it is shadow-free and error-free. The hard clustering and density clustering process of obtained image rough set is used to recognize the differentiated internal objects, if any. In order to find out the internal hull regions it involves three steps pre-processing, Boundary Extraction and finally, apply the Hull Detection system. By detecting the sub-regional hulls it can increase the machine learning capability in detection of characters and it can also be extend in order to get the hull recognition even in irregular shape objects like wise black holes in the space exploration with their intensities. Layered hulls are those having the structured layers inside while it is useful in the Military Services and Traffic to identify the number of vehicles or persons. This proposed SASK algorithm is helpful in making of that kind of identifying the regions and can useful in undergo for the decision process (to clear the traffic, to identify the number of persons in the opponent’s in the war).

Keywords: chain code, Hull regions, Hough transform, Hull recognition, Layered Outline Extraction, SASK algorithm

Procedia PDF Downloads 313
224 Integrated Microsystem for Multiplexed Genosensor Detection of Biowarfare Agents

Authors: Samuel B. Dulay, Sandra Julich, Herbert Tomaso, Ciara K. O'Sullivan

Abstract:

An early, rapid and definite detection for the presence of biowarfare agents, pathogens, viruses and toxins is required in different situations which include civil rescue and security units, homeland security, military operations, public transportation securities such as airports, metro and railway stations due to its harmful effect on the human population. In this work, an electrochemical genosensor array that allows simultaneous detection of different biowarfare agents within an integrated microsystem that provides an easy handling of the technology which combines a microfluidics setup with a multiplexing genosensor array has been developed and optimised for the following targets: Bacillus anthracis, Brucella abortis and melitensis, Bacteriophage lambda, Francisella tularensis, Burkholderia mallei and pseudomallei, Coxiella burnetii, Yersinia pestis, and Bacillus thuringiensis. The electrode array was modified via co-immobilisation of a 1:100 (mol/mol) mixture of a thiolated probe and an oligoethyleneglycol-terminated monopodal thiol. PCR products from these relevant biowarfare agents were detected reproducibly through a sandwich assay format with the target hybridised between a surface immobilised probe into the electrode and a horseradish peroxidase-labelled secondary reporter probe, which provided an enzyme based electrochemical signal. The potential of the designed microsystem for multiplexed genosensor detection and cross-reactivity studies over potential interfering DNA sequences has demonstrated high selectivity using the developed platform producing high-throughput.

Keywords: biowarfare agents, genosensors, multipled detection, microsystem

Procedia PDF Downloads 241
223 Building Information Modelling (BIM) and Unmanned Aerial Vehicles (UAV) Technologies in Road Construction Project Monitoring and Management: Case Study of a Project in Cyprus

Authors: Yiannis Vacanas, Kyriacos Themistocleous, Athos Agapiou, Diofantos Hadjimitsis

Abstract:

Building Information Modelling (BIM) technology is considered by construction professionals as a very valuable process in modern design, procurement and project management. Construction professionals of all disciplines can use a single 3D model which BIM technology provides, to design a project accurately and furthermore monitor the progress of construction works effectively and efficiently. Unmanned Aerial Vehicles (UAVs), a technology initially developed for military applications, is now without any difficulty accessible and has already been used by commercial industries, including the construction industry. UAV technology has mainly been used for collection of images that allow visual monitoring of building and civil engineering projects conditions in various circumstances. UAVs, nevertheless, have undergone significant advances in equipment capabilities and now have the capacity to acquire high-resolution imagery from many angles in a cost effective manner, and by using photogrammetry methods, someone can determine characteristics such as distances, angles, areas, volumes and elevations of an area within overlapping images. In order to examine the potential of using a combination of BIM and UAV technologies in construction project management, this paper presents the results of a case study of a typical road construction project where the combined use of the two technologies was used in order to achieve efficient and accurate as-built data collection of the works progress, with outcomes such as volumes, and production of sections and 3D models, information necessary in project progress monitoring and efficient project management.

Keywords: BIM, project management, project monitoring, UAV

Procedia PDF Downloads 280
222 Heuristic Algorithms for Time Based Weapon-Target Assignment Problem

Authors: Hyun Seop Uhm, Yong Ho Choi, Ji Eun Kim, Young Hoon Lee

Abstract:

Weapon-target assignment (WTA) is a problem that assigns available launchers to appropriate targets in order to defend assets. Various algorithms for WTA have been developed over past years for both in the static and dynamic environment (denoted by SWTA and DWTA respectively). Due to the problem requirement to be solved in a relevant computational time, WTA has suffered from the solution efficiency. As a result, SWTA and DWTA problems have been solved in the limited situation of the battlefield. In this paper, the general situation under continuous time is considered by Time based Weapon Target Assignment (TWTA) problem. TWTA are studied using the mixed integer programming model, and three heuristic algorithms; decomposed opt-opt, decomposed opt-greedy, and greedy algorithms are suggested. Although the TWTA optimization model works inefficiently when it is characterized by a large size, the decomposed opt-opt algorithm based on the linearization and decomposition method extracted efficient solutions in a reasonable computation time. Because the computation time of the scheduling part is too long to solve by the optimization model, several algorithms based on greedy is proposed. The models show lower performance value than that of the decomposed opt-opt algorithm, but very short time is needed to compute. Hence, this paper proposes an improved method by applying decomposition to TWTA, and more practical and effectual methods can be developed for using TWTA on the battlefield.

Keywords: air and missile defense, weapon target assignment, mixed integer programming, piecewise linearization, decomposition algorithm, military operations research

Procedia PDF Downloads 313
221 Analysis of the Unmanned Aerial Vehicles’ Incidents and Accidents: The Role of Human Factors

Authors: Jacob J. Shila, Xiaoyu O. Wu

Abstract:

As the applications of unmanned aerial vehicles (UAV) continue to increase across the world, it is critical to understand the factors that contribute to incidents and accidents associated with these systems. Given the variety of daily applications that could utilize the operations of the UAV (e.g., medical, security operations, construction activities, landscape activities), the main discussion has been how to safely incorporate the UAV into the national airspace system. The types of UAV incidents being reported range from near sightings by other pilots to actual collisions with aircraft or UAV. These incidents have the potential to impact the rest of aviation operations in a variety of ways, including human lives, liability costs, and delay costs. One of the largest causes of these incidents cited is the human factor; other causes cited include maintenance, aircraft, and others. This work investigates the key human factors associated with UAV incidents. To that end, the data related to UAV incidents that have occurred in the United States is both reviewed and analyzed to identify key human factors related to UAV incidents. The data utilized in this work is gathered from the Federal Aviation Administration (FAA) drone database. This study adopts the human factor analysis and classification system (HFACS) to identify key human factors that have contributed to some of the UAV failures to date. The uniqueness of this work is the incorporation of UAV incident data from a variety of applications and not just military data. In addition, identifying the specific human factors is crucial towards developing safety operational models and human factor guidelines for the UAV. The findings of these common human factors are also compared to similar studies in other countries to determine whether these factors are common internationally.

Keywords: human factors, incidents and accidents, safety, UAS, UAV

Procedia PDF Downloads 217
220 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 112