Search results for: saltwater intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 194

Search results for: saltwater intrusion

44 Assessment of Hydrologic Response of a Naturalized Tropical Coastal Mangrove Ecosystem Due to Land Cover Change in an Urban Watershed

Authors: Bryan Clark B. Hernandez, Eugene C. Herrera, Kazuo Nadaoka

Abstract:

Mangrove forests thriving in intertidal zones in tropical and subtropical regions of the world offer a range of ecosystem services including carbon storage and sequestration. They can regulate the detrimental effects of climate change due to carbon releases two to four times greater than that of mature tropical rainforests. Moreover, they are effective natural defenses against storm surges and tsunamis. However, their proliferation depends significantly on the prevailing hydroperiod at the coast. In the Philippines, these coastal ecosystems have been severely threatened with a 50% decline in areal extent observed from 1918 to 2010. The highest decline occurred in 1950 - 1972 when national policies encouraged the development of fisheries and aquaculture. With the intensive land use conversion upstream, changes in the freshwater-saltwater envelope at the coast may considerably impact mangrove growth conditions. This study investigates a developing urban watershed in Kalibo, Aklan province with a 220-hectare mangrove forest replanted for over 30 years from coastal mudflats. Since then, the mangrove forest was sustainably conserved and declared as protected areas. Hybrid land cover classification technique was used to classify Landsat images for years, 1990, 2010, and 2017. Digital elevation model utilized was Interferometric Synthetic Aperture Radar (IFSAR) with a 5-meter resolution to delineate the watersheds. Using numerical modelling techniques, the hydrologic and hydraulic analysis of the influence of land cover change to flow and sediment dynamics was simulated. While significant land cover change occurred upland, thereby increasing runoff and sediment loads, the mangrove forests abundance adjacent to the coasts for the urban watershed, was somehow sustained. However, significant alteration of the coastline was observed in Kalibo through the years, probably due to the massive land-use conversion upstream and significant replanting of mangroves downstream. Understanding the hydrologic-hydraulic response of these watersheds to change land cover is essential to helping local government and stakeholders facilitate better management of these mangrove ecosystems.

Keywords: coastal mangroves, hydrologic model, land cover change, Philippines

Procedia PDF Downloads 95
43 Accessing the 'No-Harm' Principle of Protection of the Mekong River’s Environment

Authors: Hang Thuy Tran, Hanh Hong Pham, Ha Thanh Hoa

Abstract:

From 2009 up to now, the water quantity and water quality of the Mekong River, located in the South of Vietnam, have been significantly reduced. The phenomenon happened as a result of climate change and human activities. The Mekong River is an international source of water, flowing across the borders of 6 countries, with Vietnam downstream. Activities to block the flow or build dams to construct hydroelectricity or diversion in upstream countries are either the direct cause or the risk of further deterioration of the water quality and quantity of the Mekong River, as evidenced by two phenomena which are a saline intrusion and transboundary water pollution. The protection of the crucial source of water is done through bilateral and multilateral cooperation mechanisms, notably the Mekong River Commission, established by members of the Agreement on the Cooperation for the Sustainable Development of the Mekong River Basin 1995. In this document, under Article 7, the 'no-harm' principle requires member states to take appropriate measures to prevent causing substantial damage to other member states. This principle has been practiced through the work of a number of committees established by the commission. However, the content of the rules is undetailed, lacks an implementation monitoring mechanism, and has an unreasonable dispute solution. With such difficulties, the provisions in the principle of no-harm are not adequate to protect the Mekong River's water resources in the current context.

Keywords: no-harm principle, transboundary water pollution, Mekong Commission, international source of water

Procedia PDF Downloads 157
42 Investigating the Shear Behaviour of Fouled Ballast Using Discrete Element Modelling

Authors: Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiathmakjornr

Abstract:

For several hundred years, the design of railway tracks has practically remained unchanged. Traditionally, rail tracks are placed on a ballast layer due to several reasons, including economy, rapid drainage, and high load bearing capacity. The primary function of ballast is to distributing dynamic track loads to sub-ballast and subgrade layers, while also providing lateral resistance and allowing for rapid drainage. Upon repeated trainloads, the ballast becomes fouled due to ballast degradation and the intrusion of fines which adversely affects the strength and deformation behaviour of ballast. This paper presents the use of three-dimensional discrete element method (DEM) in studying the shear behaviour of the fouled ballast subjected to direct shear loading. Irregularly shaped particles of ballast were modelled by grouping many spherical balls together in appropriate sizes to simulate representative ballast aggregates. Fouled ballast was modelled by injecting a specified number of miniature spherical particles into the void spaces. The DEM simulation highlights that the peak shear stress of the ballast assembly decreases and the dilation of fouled ballast increases with an increase level of fouling. Additionally, the distributions of contact force chain and particle displacement vectors were captured during shearing progress, explaining the formation of shear band and the evolutions of volumetric change of fouled ballast.

Keywords: railway ballast, coal fouling, discrete element modelling, discrete element method

Procedia PDF Downloads 424
41 Revealing the Potential of Geotourism and Geoheritage of Gedangsari Area, Yogyakarta

Authors: Cecilia Jatu, Adventino

Abstract:

Gedangsari is located in Gunungkidul, Yogyakarta Province, which has several criteria to be used as a new geosite object. The research area is located in the southern mountain zone of Java, composed of 5 rock formations with Oligocene up to Middle Miocene age. The purpose of this study is to reveal the potential of geotourism and the geoheritage to be proposed as a new geosite and to make a geosite map of Gedangsari. The research method used is descriptive data collection and which includes quantitative geological data collection, geotourism, and heritage sites, then supported by petrographic analysis, geological structure, geological mapping, and SWOT analysis. The geological data proved that Gedangsari consists of igneous rock (intrusion), pyroclastic rock, and sediment rock. This condition caused many varieties and particular geomorphological platform. Geotourism that include in Gedangsari are Luweng Sampang Canyon, Gedangsari Bouma Sequence, Watugajah Columnar Joint, Gedangsari Marine Fan Sediment, and Tegalrejo Waterfall. There is also Tegalrejo Village, which can be considered as geoheritage site because of its culture and batik traditional cloth. The results of the SWOT analysis, Gedangsari geosite must be developed and appropriately promoted in order to improve the existence. The development of geosite area will have a significant impact that improve the economic growth of the surrounding community and can be used by the government as base information for sustainable development. In addition, the making of an educational map about the geological conditions and geotourism location of the Gedangsari geosite can increase the people's knowledge about Gedangsari.

Keywords: Gedangsari, geoheritage, geotourism, geosite

Procedia PDF Downloads 96
40 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 634
39 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 273
38 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 189
37 Machine Learning Facing Behavioral Noise Problem in an Imbalanced Data Using One Side Behavioral Noise Reduction: Application to a Fraud Detection

Authors: Salma El Hajjami, Jamal Malki, Alain Bouju, Mohammed Berrada

Abstract:

With the expansion of machine learning and data mining in the context of Big Data analytics, the common problem that affects data is class imbalance. It refers to an imbalanced distribution of instances belonging to each class. This problem is present in many real world applications such as fraud detection, network intrusion detection, medical diagnostics, etc. In these cases, data instances labeled negatively are significantly more numerous than the instances labeled positively. When this difference is too large, the learning system may face difficulty when tackling this problem, since it is initially designed to work in relatively balanced class distribution scenarios. Another important problem, which usually accompanies these imbalanced data, is the overlapping instances between the two classes. It is commonly referred to as noise or overlapping data. In this article, we propose an approach called: One Side Behavioral Noise Reduction (OSBNR). This approach presents a way to deal with the problem of class imbalance in the presence of a high noise level. OSBNR is based on two steps. Firstly, a cluster analysis is applied to groups similar instances from the minority class into several behavior clusters. Secondly, we select and eliminate the instances of the majority class, considered as behavioral noise, which overlap with behavior clusters of the minority class. The results of experiments carried out on a representative public dataset confirm that the proposed approach is efficient for the treatment of class imbalances in the presence of noise.

Keywords: machine learning, imbalanced data, data mining, big data

Procedia PDF Downloads 103
36 Geostatistical Simulation of Carcinogenic Industrial Effluent on the Irrigated Soil and Groundwater, District Sheikhupura, Pakistan

Authors: Asma Shaheen, Javed Iqbal

Abstract:

The water resources are depleting due to an intrusion of industrial pollution. There are clusters of industries including leather tanning, textiles, batteries, and chemical causing contamination. These industries use bulk quantity of water and discharge it with toxic effluents. The penetration of heavy metals through irrigation from industrial effluent has toxic effect on soil and groundwater. There was strong positive significant correlation between all the heavy metals in three media of industrial effluent, soil and groundwater (P < 0.001). The metal to the metal association was supported by dendrograms using cluster analysis. The geospatial variability was assessed by using geographically weighted regression (GWR) and pollution model to identify the simulation of carcinogenic elements in soil and groundwater. The principal component analysis identified the metals source, 48.8% variation in factor 1 have significant loading for sodium (Na), calcium (Ca), magnesium (Mg), iron (Fe), chromium (Cr), nickel (Ni), lead (Pb) and zinc (Zn) of tannery effluent-based process. In soil and groundwater, the metals have significant loading in factor 1 representing more than half of the total variation with 51.3 % and 53.6 % respectively which showed that pollutants in soil and water were driven by industrial effluent. The cumulative eigen values for the three media were also found to be greater than 1 representing significant clustering of related heavy metals. The results showed that heavy metals from industrial processes are seeping up toxic trace metals in the soil and groundwater. The poisonous pollutants from heavy metals turned the fresh resources of groundwater into unusable water. The availability of fresh water for irrigation and domestic use is being alarming.

Keywords: groundwater, geostatistical, heavy metals, industrial effluent

Procedia PDF Downloads 206
35 Metabolomics Fingerprinting Analysis of Melastoma malabathricum L. Leaf of Geographical Variation Using HPLC-DAD Combined with Chemometric Tools

Authors: Dian Mayasari, Yosi Bayu Murti, Sylvia Utami Tunjung Pratiwi, Sudarsono

Abstract:

Melastoma malabathricum L. is an Indo-Pacific herb that has been traditionally used to treat several ailments such as wounds, dysentery, diarrhea, toothache, and diabetes. This plant is common across tropical Indo-Pacific archipelagos and is tolerant of a range of soils, from low-lying areas subject to saltwater inundation to the salt-free conditions of mountain slopes. How the soil and environmental variation influences secondary metabolite production in the herb, and an understanding of the plant’s utility as traditional medicine, remain largely unknown and unexplored. The objective of this study is to evaluate the variability of the metabolic profiles of M. malabathricum L. across its geographic distribution. By employing high-performance liquid chromatography-diode array detector (HPLC-DAD), a highly established, simple, sensitive, and reliable method was employed for establishing the chemical fingerprints of 72 samples of M. malabathricum L. leaves from various geographical locations in Indonesia. Specimens collected from six terrestrial and archipelago regions of Indonesia were analyzed by HPLC to generate chromatogram peak profiles that could be compared across each region. Data corresponding to the common peak areas of HPLC chromatographic fingerprint were analyzed by hierarchical component analysis (HCA) and principal component analysis (PCA) to extract information on the most significant variables contributing to characterization and classification of analyzed samples data. Principal component values were identified as PC1 and PC2 with 41.14% and 19.32%, respectively. Based on variety and origin, the high-performance liquid chromatography method validated the chemical fingerprint results used to screen the in vitro antioxidant activity of M. malabathricum L. The result shows that the developed method has potential values for the quality of similar M. malabathrium L. samples. These findings provide a pathway for the development and utilization of references for the identification of M. malabathricum L. Our results indicate the importance of considering geographic distribution during field-collection efforts as they demonstrate regional metabolic variation in secondary metabolites of M. malabathricum L., as illustrated by HPLC chromatogram peaks and their antioxidant activities. The results also confirm the utility of this simple approach to a rapid evaluation of metabolic variation between plants and their potential ethnobotanical properties, potentially due to the environments from whence they were collected. This information will facilitate the optimization of growth conditions to suit particular medicinal qualities.

Keywords: fingerprint, high performance liquid chromatography, Melastoma malabathricum l., metabolic profiles, principal component analysis

Procedia PDF Downloads 128
34 The Role of 'Hindu Tantrism' in Conceptualization of the Divine Manifestations in Vajrayana Tradition of Tibetan Buddhism

Authors: Mohammed T. Shabeer

Abstract:

Hoary moorlands of Tibet bear bundle of religious traditions. Vajrayana tradition of Tibetan Buddhism is one of the deep rooted religious orders of the area. It demands the homage to a variety of gods and diverse worships, especially to manifestations like the Dalai Lamas. This divine diversity has been conceptualized by remoteness of the area and transcontinental intrusion of Asiatic philosophies like Indian Buddhism, Mongolian Shamanism and Hindu Tantrism. This study reveals the role of Hindu Tantrism in conceptualizing the manifestations in Vajrayana Tradition of Tibetan Buddhism in a comparative way. Nowadays, the academic explorations and researches in the field of ‘Tibetology’ are widely tolerable in east and west alike. International community concerns such studies supportive of the restless campaigns for ‘free Tibet’. Moreover, the scientific sources on the topic are rarest and precious in the field of comparative religion. This study reveals a clear account of god concept of Vajrayana tradition and insists that the god concept of the tradition is conceptualized from the amalgamation of Indian Hindu Tantrism, Mongolian Shamanism, and Indian Buddhism. Primly, it sheds the light upon the mysterious similarities between Indian and Tibetan concepts of manifestation of gods. The scientific examination of this problem lasts in the conclusion that the transcontinental transmission of Hindu Tantrism in the special occasion of Buddhist Diaspora of 12th century in consequence of the invasion of Muslim Ghorid Sultanate had paved a vital role in shaping the Vajrayana tradition especially conceptualizing the manifestation of Tibetan gods.

Keywords: Buddhist diaspora, Hindu tantrism, manifestation of god, Vajrayana tradition of Tibetan Buddhism

Procedia PDF Downloads 171
33 Violence in the School Environment: When the Teenager Encounters the Threat of Depression

Authors: Ndje Ndje Mireille

Abstract:

For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.

Keywords: violence, school, depression threats, adolescent, behavior

Procedia PDF Downloads 63
32 Climate Change and Its Impacts: The Case of Coastal Fishing Communities of the Meghna River in South-Central Bangladesh

Authors: Md. Royhanur Islam, Thomas Cansse, Md. Sahidul Islam, Atiqur Rahman Sunny

Abstract:

The geographical location of Bangladesh makes it one of the most vulnerable countries to climate change. Climate-induced phenomena mainly affect the south-central region of Bangladesh (Laxmipur district) where they have begun to occur more frequently. The aim of the study was to identify the hydro-climatic factors that lead to weather-related disasters in the coastal areas and analyse the consequences of these factors on coastal livelihoods, with possible adaptation options using participatory rural appraisal (PRA) tools. The present study showed several disasters such as land erosion, depressions and cyclones, coastal flooding, storm surge, and precipitation. The frequency of these disasters is of a noticeable rate. Surveys have also discovered that land erosion is ongoing. Tidal water is being introduced directly into the mainland, and as a result of the salt intrusion, production capacity is declining. The coastal belt is an important area for fishing activities, but due to changed fishing times and a lack of Alternative Income Generating Activities (AIGAs), people have been forced to search for alternative livelihood options by taking both short-term and long-term adaptation options. Therefore, in order to increase awareness and minimize the losses, vulnerable communities must be fully incorporated into disaster response strategies. The government as well as national and international donor organizations should come forward and resolve the present situation of these vulnerable groups since otherwise, they will have to endure endless and miserable suffering due to the effects of climate change ahead in their lives.

Keywords: adaptation, community, fishery development, livelihood

Procedia PDF Downloads 94
31 Characteristics of Pyroclastic and Igenous Rocks Mineralogy of Lahat Regency, South Sumatra

Authors: Ridho Widyantama Putra, Endang Wiwik Dyah Hastuti

Abstract:

The study area is located in Lahat Regency, South Sumatra and is part of a 500 m – 2000 m elevated perbukitan barisan zone controlled by the main fault of Sumatra (Semangko Fault), administratively located on S4.08197 - E103.01403 and S4.16786 - E103.07700, the product of Semangko Fault in the form of normal fault flight trending north-southeast, composed of lithologic is a pyroclastic rock, volcanic rock and plutonic rock intrusion. On the Manna and Enggano sheets of volcanic quartenary products are located along perbukitan barisan zone. Petrology types of pyroclastic rocks encountered in the form of welded tuff, tuff lapilli, agglomerate, pyroclastic sandstone, pyroclastic claystone, and lava. Some pyroclastic material containing sulfide minerals (pyrite), the type of sedimentation flow with different grain size from ash to lapilli. The present of tuff lapilli covers almost 50% of the total research area, through observation petrography encountered minerals in the form of glass, quartz, palgioklas, and biotite. Lava in this area has been altered characterized by the presence of minerals such as chlorite and secondary biotite, this change is caused by the structure that develops in the hilly zone and is proved by the presence of secondary structures in the form of stocky and normal faults as well as the primary structure of columnar joint, From medial facies to distal facies, the division of facies is divided based on geomorphological observations and dominant types of lithology.

Keywords: tuff lapili, pyroclastic, mineral, petrography, volcanic, lava

Procedia PDF Downloads 136
30 Basin Geometry and Salt Structures in the Knana/Ragoubet Mahjbia Ranges, North of Tunisia

Authors: Mohamed Montassar Ben Slama, Mohamed Fadel Ladeb, Mohamed Ghanmi, Mohamed Ben Youssef, Fouad Zargouni

Abstract:

The salt province Basin in Northern Tunisia is a complex of late Triassic to Early Cretaceous rift and sag basins which was inverted during the Tertiary folding. The deposition of evaporitic sediments during the Late Triassic times played a major role in the subsequent tectonic evolution of the basin. Within southern tethyan passive marge, the ductile salt mass shown early mobilization, vertical transport and withdrawal of the evaporites. These movements influenced the sedimentation during the late Jurassic and Early Cretaceous. The evaporites also influenced deformation during the inversion of the basin and the development of the Tertiary and Quaternary folding. In the studied area, the biostratigraphic and tectonic map analysis of the region of Jebel el Asoued / Ragoubet el Mahjbia can resolve between the hypotheses of the diapiric intrusion of the Triassic salt and the lateral spreading of the Triassic salt as salt ‘glacier’. Also the variation in thickness and facies of the Aptian sediments demonstrates the existence of continental rise architecture at the Aptian time. The observation in a mappable outcrop of the extension segment of the graben fault of Bou Arada on the one hand confirms the existence of a Cretaceous extensive architecture and the tectonic inversion during the Tertiary time has not filled the main game distension. The extent of our observations of Triassic/Aptian and Triassic/Early Campanian contacts, we propose a composite salt ‘glacier’ model as the structures recorded in the Gulf of Mexico in the subsurface and in the Ouenza east Algeria and in Tunisia within Fedj el Adoum, Touiref-Nebeur and Jebel Ech Cheid in the outcrops.

Keywords: Cretaceous rift, salt ‘glassier’, tertiary folding, Tunisia

Procedia PDF Downloads 348
29 The Effectiveness of Synthesizing A-Pillar Structures in Passenger Cars

Authors: Chris Phan, Yong Seok Park

Abstract:

The Toyota Camry is one of the best-selling cars in America. It is economical, reliable, and most importantly, safe. These attributes allowed the Camry to be the trustworthy choice when choosing dependable vehicle. However, a new finding brought question to the Camry’s safety. Since 1997, the Camry received a “good” rating on its moderate overlap front crash test through the Insurance Institute of Highway Safety. In 2012, the Insurance Institute of Highway Safety introduced a frontal small overlap crash test into the overall evaluation of vehicle occupant safety test. The 2012 Camry received a “poor” rating on this new test, while the 2015 Camry redeemed itself with a “good” rating once again. This study aims to find a possible solution that Toyota implemented to reduce the severity of a frontal small overlap crash in the Camry during a mid-cycle update. The purpose of this study is to analyze and evaluate the performance of various A-pillar shapes as energy absorbing structures in improving passenger safety in a frontal crash. First, A-pillar structures of the 2012 and 2015 Camry were modeled using CAD software, namely SolidWorks. Then, a crash test simulation using ANSYS software, was applied to the A-pillars to analyze the behavior of the structures in similar conditions. Finally, the results were compared to safety values of cabin intrusion to determine the crashworthy behaviors of both A-pillar structures by measuring total deformation. This study highlights that it is possible that Toyota improved the shape of the A-pillar in the 2015 Camry in order to receive a “good” rating from the IIHS safety evaluation once again. These findings can possibly be used to increase safety performance in future vehicles to decrease passenger injury or fatality.

Keywords: A-pillar, Crashworthiness, Design Synthesis, Finite Element Analysis

Procedia PDF Downloads 92
28 OASIS: An Alternative Access to Potable Water, Renewable Energy and Organic Food

Authors: Julien G. Chenet, Mario A. Hernandez, U. Leonardo Rodriguez

Abstract:

The tropical areas are places where there is scarcity of access to potable water and where renewable energies need further development. They also display high undernourishment levels, even though they are one of the resources-richest areas in the world. In these areas, it is common to count on great extension of soils, high solar radiation and raw water from rain, groundwater, surface water or even saltwater. Even though resources are available, access to them is limited, and the low-density habitat makes central solutions expensive and investments not worthy. In response to this lack of investment, rural inhabitants use fossil fuels and timber as an energy source and import agrochemical for soils fertilization, which increase GHG emissions. The OASIS project brings an answer to this situation. It supplies renewable energy, potable water and organic food. The first step is the determination of the needs of the communities in terms of energy, water quantity and quality, food requirements and soil characteristics. Second step is the determination of the available resources, such as solar energy, raw water and organic residues on site. The pilot OASIS project is located in the Vichada department, Colombia, and ensures the sustainable use of natural resources to meet the community needs. The department has roughly 70% of indigenous people. They live in a very scattered landscape, with no access to clean water and energy. They use polluted surface water for direct consumption and diesel for energy purposes. OASIS pilot will ensure basic needs for a 400-students education center. In this case, OASIS will provide 20 kW of solar energy potential and 40 liters per student per day. Water will be treated form groundwater, with two qualities. A conventional one with chlorine, and as the indigenous people are not used to chlorine for direct consumption, second train is with reverse osmosis to bring conservable safe water without taste. OASIS offers a solution to supply basic needs, shifting from fossil fuels, timber, to a no-GHG-emission solution. This solution is part of the mitigation strategy against Climate Change for the communities in low-density areas of the tropics. OASIS is a learning center to teach how to convert natural resources into utilizable ones. It is also a meeting point for the community with high pedagogic impact that promotes the efficient and sustainable use of resources. OASIS system is adaptable to any tropical area and competes technically and economically with any conventional solution, that needs transport of energy, treated water and food. It is a fully automatic, replicable and sustainable solution to sort out the issue of access to basic needs in rural areas. OASIS is also a solution to undernourishment, ensuring a responsible use of resources, to prevent long-term pollution of soils and groundwater. It promotes the closure of the nutrient cycle, and the optimal use of the land whilst ensuring food security in depressed low-density regions of the tropics. OASIS is under optimization to Vichada conditions, and will be available to any other tropical area in the following months.

Keywords: climate change adaptation and mitigation, rural development, sustainable access to clean and renewable resources, social inclusion

Procedia PDF Downloads 226
27 Field Emission Scanning Microscope Image Analysis for Porosity Characterization of Autoclaved Aerated Concrete

Authors: Venuka Kuruwita Arachchige Don, Mohamed Shaheen, Chris Goodier

Abstract:

Aerated autoclaved concrete (AAC) is known for its lightweight, easy handling, high thermal insulation, and extremely porous structure. Investigation of pore behavior in AAC is crucial for characterizing the material, standardizing design and production techniques, enhancing the mechanical, durability, and thermal performance, studying the effectiveness of protective measures, and analyzing the effects of weather conditions. The significant details of pores are complicated to observe with acknowledged accuracy. The High-resolution Field Emission Scanning Electron Microscope (FESEM) image analysis is a promising technique for investigating the pore behavior and density of AAC, which is adopted in this study. Mercury intrusion porosimeter and gas pycnometer were employed to characterize porosity distribution and density parameters. The analysis considered three different densities of AAC blocks and three layers in the altitude direction within each block. A set of understandings was presented to extract and analyze the details of pore shape, pore size, pore connectivity, and pore percentages from FESEM images of AAC. Average pore behavior outcomes per unit area were presented. Comparison of porosity distribution and density parameters revealed significant variations. FESEM imaging offered unparalleled insights into porosity behavior, surpassing the capabilities of other techniques. The analysis conducted from a multi-staged approach provides porosity percentage occupied by various pore categories, total porosity, variation of pore distribution compared to AAC densities and layers, number of two-dimensional and three-dimensional pores, variation of apparent and matrix densities concerning pore behaviors, variation of pore behavior with respect to aluminum content, and relationship among shape, diameter, connectivity, and percentage in each pore classification.

Keywords: autoclaved aerated concrete, density, imaging technique, microstructure, porosity behavior

Procedia PDF Downloads 18
26 Heavy Sulphide Material Characterization of Grasberg Block Cave Mine, Mimika, Papua: Implication for Tunnel Development and Mill Issue

Authors: Cahya Wimar Wicaksono, Reynara Davin Chen, Alvian Kristianto Santoso

Abstract:

Grasberg Cu-Au ore deposit as one of the biggest porphyry deposits located in Papua Province, Indonesia produced by several intrusion that restricted by Heavy Sulphide Zone (HSZ) in peripheral. HSZ is the rock that becomes the contact between Grassberg Igneous Complex (GIC) with sedimentary and igneous rock outside, which is rich in sulphide minerals such as pyrite ± pyrrhotite. This research is to obtain the characteristic of HSZ based on geotechnical, geochemical and mineralogy aspect and those implication for daily mining operational activities. Method used in this research are geological and alteration mapping, core logging, FAA (Fire Assay Analysis), AAS (Atomic absorption spectroscopy), RQD (Rock Quality Designation) and rock water content. Data generated from methods among RQD data, mineral composition and grade, lithological and structural geology distribution in research area. The mapping data show that HSZ material characteristics divided into three type based on rocks association, there are near igneous rocks, sedimentary rocks and on HSZ area. And also divided based on its location, north and south part of research area. HSZ material characteristic consist of rock which rich of pyrite ± pyrrhotite, and RQD range valued about 25%-100%. Pyrite ± pyrrhotite which outcropped will react with H₂O and O₂ resulting acid that generates corrosive effect on steel wire and rockbolt. Whereas, pyrite precipitation proses in HSZ forming combustible H₂S gas which is harmful during blasting activities. Furthermore, the impact of H₂S gas in blasting activities is forming poison gas SO₂. Although HSZ high grade Cu-Au, however those high grade Cu-Au rich in sulphide components which is affected in flotation milling process. Pyrite ± pyrrhotite in HSZ will chemically react with Cu-Au that will settle in milling process instead of floating.

Keywords: combustible, corrosive, heavy sulphide zone, pyrite ± pyrrhotite

Procedia PDF Downloads 305
25 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 135
24 The Effects of Climate Change and Upstream Dam Development on Sediment Distribution in the Vietnamese Mekong Delta

Authors: Trieu Anh Ngoc, Nguyen Quang Kim

Abstract:

Located at the downstream of the Mekong Delta, the Vietnamese Mekong Delta is well-known as 'rice bowl' of Vietnam. The Vietnamese Mekong Delta experiences widespread flooding annually where is habitat for about 17 million people. The economy of this region mainly depends on the agricultural productivities. The suspended sediment load in the Mekong River plays an important role in carrying contaminants and nutrients to the delta and changing the geomorphology of the delta river system. In many past decades, flooding and suspended sediment were considered as indispensable factors in agricultural cultivations. Although flooding in the wet season caused serious inundation in paddy field and affected livelihoods, it is an effective facility for flushing acid and saline to this area - alluvial soil heavily contaminated with acid and salt intrusion. In addition, sediment delivery to this delta contained rich-nutrients distributed and deposited on the fields through flooding process. In recent decades, the changing of flow and sediment transport have been strongly and clearly occurring due to upstream dam development and climate change. However, effects of sediment delivery on agricultural cultivations were less attention. This study investigated the impacts of upstream flow on sediment distribution in the Vietnamese Mekong Delta. Flow fluctuation and sediment distribution were simulated by the Mike 11 model, including hydrodynamics model and advection-dispersion model. Various scenarios were simulated based on anticipated upstream discharges. Our findings indicated that sediment delivery into the Vietnamese Mekong Delta come from not only Tien River but also border of Cambodia floodplains. Sediment distribution in the Vietnamese Mekong Delta is dramatically changed by the distance from the main rivers and the secondary channels. The dam development in the upstream is one of the major factors leading a decrease in sediment discharge as well as sediment deposition. Moreover, sea level rise partially contributed to decrease in sediment transport and change of sediment distribution between upstream and downstream of the Vietnamese Mekong Delta.

Keywords: sediment transport, sea level rise, climate change, Mike Model

Procedia PDF Downloads 247
23 Parametric Investigation of Aircraft Door’s Emergency Power Assist System (EPAS)

Authors: Marshal D. Kafle, Jun H. Kim, Hyun W. Been, Kyoung M. Min

Abstract:

Fluid viscous damping systems are well suited for many air vehicles subjected to shock and vibration. These damping system work with the principle of viscous fluid throttling through the orifice to create huge pressure difference between compression and rebound chamber and obtain the required damping force. One application of such systems is its use in aircraft door system to counteract the door’s velocity and safely stop it. In exigency situations like crash or emergency landing where the door doesn’t open easily, possibly due to unusually tilting of fuselage or some obstacles or intrusion of debris obstruction to move the parts of the door, such system can be combined with other systems to provide needed force to forcefully open the door and also securely stop it simultaneously within the required time i.e.less than 8seconds. In the present study, a hydraulic system called snubber along with other systems like actuator, gas bottle assembly which together known as emergency power assist system (EPAS) is designed, built and experimentally studied to check the magnitude of angular velocity, damping force and time required to effectively open the door. Whenever needed, the gas pressure from the bottle is released to actuate the actuator and at the same time pull the snubber’s piston to operate the emergency opening of the door. Such EPAS installed in the suspension arm of the aircraft door is studied explicitly changing parameters like orifice size, oil level, oil viscosity and bypass valve gap and its spring of the snubber at varying temperature to generate the optimum design case. Comparative analysis of the EPAS at several cases is done and conclusions are made. It is found that during emergency condition, the systemopening time and angular velocity, when snubber with 0.3mm piston and shaft orifice and bypass valve gap of 0.5 mm with its original spring is used,shows significant improvement over the old ones.

Keywords: aircraft door damper, bypass valve, emergency power assist system, hydraulic damper, oil viscosity

Procedia PDF Downloads 398
22 Multiscale Analysis of Shale Heterogeneity in Silurian Longmaxi Formation from South China

Authors: Xianglu Tang, Zhenxue Jiang, Zhuo Li

Abstract:

Characterization of shale multi scale heterogeneity is an important part to evaluate size and space distribution of shale gas reservoirs in sedimentary basins. The origin of shale heterogeneity has always been a hot research topic for it determines shale micro characteristics description and macro quality reservoir prediction. Shale multi scale heterogeneity was discussed based on thin section observation, FIB-SEM, QEMSCAN, TOC, XRD, mercury intrusion porosimetry (MIP), and nitrogen adsorption analysis from 30 core samples in Silurian Longmaxi formation. Results show that shale heterogeneity can be characterized by pore structure and mineral composition. The heterogeneity of shale pore is showed by different size pores at nm-μm scale. Macropores (pore diameter > 50 nm) have a large percentage of pore volume than mesopores (pore diameter between 2~ 50 nm) and micropores (pore diameter < 2nm). However, they have a low specific surface area than mesopores and micropores. Fractal dimensions of the pores from nitrogen adsorption data are higher than 2.7, what are higher than 2.8 from MIP data, showing extremely complex pore structure. This complexity in pore structure is mainly due to the organic matter and clay minerals with complex pore network structures, and diagenesis makes it more complicated. The heterogeneity of shale minerals is showed by mineral grains, lamina, and different lithology at nm-km scale under the continuous changing horizon. Through analyzing the change of mineral composition at each scale, random arrangement of mineral equal proportion, seasonal climate changes, large changes of sedimentary environment, and provenance supply are considered to be the main reasons that cause shale minerals heterogeneity from microcosmic to macroscopic. Due to scale effect, the change of shale multi scale heterogeneity is a discontinuous process, and there is a transformation boundary between homogeneous and in homogeneous. Therefore, a shale multi scale heterogeneity changing model is established by defining four types of homogeneous unit at different scales, which can be used to guide the prediction of shale gas distribution from micro scale to macro scale.

Keywords: heterogeneity, homogeneous unit, multiscale, shale

Procedia PDF Downloads 421
21 Study of Geological Structure for Potential Fresh-Groundwater Aquifer Determination around Cidaun Beach, Cianjur Regency, West Java Province, Indonesia

Authors: Ilham Aji Dermawan, M. Sapari Dwi Hadian, R. Irvan Sophian, Iyan Haryanto

Abstract:

The study of the geological structure in the surrounding area of Cidaun, Cianjur Regency, West Java Province, Indonesia was conducted around the southern coast of Java Island. This study aims to determine the potentially structural trap deposits of freshwater resources in the study area, according to that the study area is an area directly adjacent to the beach, where the water around it did not seem fresh and brackish due to the exposure of sea water intrusion. This study uses the method of geomorphological analysis and geological mapping by taking the data directly in the field within 10x10 km of the research area. Geomorphological analysis was done by calculating the watershed drainage density value and roundness of watershed value ratio. The goal is to determine the permeability of the sub-soil conditions, rock constituent, and the flow of surface water. While the field geological mapping aims to take the geological structure data and then will do the reconstruction to determine the geological conditions of research area. The result, from geomorphology aspects, that the considered area of potential groundwater consisted of permeable surface material, permeable sub-soil, and low of water run-off flow. It is very good for groundwater recharge area. While the results of geological reconstruction after conducted of geological mapping is joints that present were initiated for the Cipandak Fault that cuts Cipandak River. That fault across until the Cibako Syncline fold through the Cibako River. This syncline is expected to place of influent groundwater aquifer. The tip of Cibako River then united with Cipandak River, where the Cipandak River extends through Cipandak Syncline fold axis in the southern regions close to its estuary. This syncline is expected to place of influent groundwater aquifer too.

Keywords: geological structure, groundwater, hydrogeology, influent aquifer, structural trap

Procedia PDF Downloads 180
20 Critical Evaluation of the Transformative Potential of Artificial Intelligence in Law: A Focus on the Judicial System

Authors: Abisha Isaac Mohanlal

Abstract:

Amidst all suspicions and cynicism raised by the legal fraternity, Artificial Intelligence has found its way into the legal system and has revolutionized the conventional forms of legal services delivery. Be it legal argumentation and research or resolution of complex legal disputes; artificial intelligence has crept into all legs of modern day legal services. Its impact has been largely felt by way of big data, legal expert systems, prediction tools, e-lawyering, automated mediation, etc., and lawyers around the world are forced to upgrade themselves and their firms to stay in line with the growth of technology in law. Researchers predict that the future of legal services would belong to artificial intelligence and that the age of human lawyers will soon rust. But as far as the Judiciary is concerned, even in the developed countries, the system has not fully drifted away from the orthodoxy of preferring Natural Intelligence over Artificial Intelligence. Since Judicial decision-making involves a lot of unstructured and rather unprecedented situations which have no single correct answer, and looming questions of legal interpretation arise in most of the cases, discretion and Emotional Intelligence play an unavoidable role. Added to that, there are several ethical, moral and policy issues to be confronted before permitting the intrusion of Artificial Intelligence into the judicial system. As of today, the human judge is the unrivalled master of most of the judicial systems around the globe. Yet, scientists of Artificial Intelligence claim that robot judges can replace human judges irrespective of how daunting the complexity of issues is and how sophisticated the cognitive competence required is. They go on to contend that even if the system is too rigid to allow robot judges to substitute human judges in the recent future, Artificial Intelligence may still aid in other judicial tasks such as drafting judicial documents, intelligent document assembly, case retrieval, etc., and also promote overall flexibility, efficiency, and accuracy in the disposal of cases. By deconstructing the major challenges that Artificial Intelligence has to overcome in order to successfully invade the human- dominated judicial sphere, and critically evaluating the potential differences it would make in the system of justice delivery, the author tries to argue that penetration of Artificial Intelligence into the Judiciary could surely be enhancive and reparative, if not fully transformative.

Keywords: artificial intelligence, judicial decision making, judicial systems, legal services delivery

Procedia PDF Downloads 197
19 A Cognitive Behavioural Therapy for Post-Traumatic Stress Disorders

Authors: Ryotaro Ishikawa

Abstract:

INTRODUCTION: Post-traumatic stress disorder (PTSD) is a psychiatric label for a collection of psychological symptoms following a traumatic event. PTSD is as a result of a traumatic experience such as rape or sexual assault. A victim may have PTSD if she/he has experienced the following symptoms for at least a month: a) Stressor, b) Intrusion symptoms, c) Avoidance, d) Negative alterations in cognitions and mood, e) Alterations in arousal and reactivity. Studies on the cognitive theory of PTSD emphasized the roles of (a) negative appraisals of trauma memories in maintaining the symptomatology of PTSD, and (b) disorganized trauma memories in the development of PTSD. Mental contamination is primarily caused by experiences involving humans (e.g. violators or perpetrators) as opposed to substances (e.g. dirt or bodily fluids). Feelings of mental contamination may evoke following experiences of ill-treatment, sexual assault, domination, degradation, manipulation, betrayal, or humiliation. Some studies have demonstrated that traumatic thoughts related to sexual assault are particularly strong predictors of mental contamination. Treatment protocols based on cognitive-behavioral therapy appear to be beneficial in reducing the severity of PTSD and mental contamination. Studies on the cognitive theory of PTSD emphasized the roles of (A) negative appraisals of trauma memories in maintaining the symptomatology of PTSD, and (B) disorganized trauma memories in the development of PTSD. We will demonstrate a feasibility study of individual CBT for PTSD and mental contamination in Japanese clinical settings. METHOD: The single-arm trial is a group setting CBT intervention. The primary outcome is the self-rated Posttraumatic Stress Diagnostic Scale, with secondary measurements of depressive severity and mental pollution questionnaire. Assessments are conducted at baseline, after a waiting period before CBT, during CBT, and after CBT. RESULTS: Participants are eligible for the study and complete the outcome measures at all assessment points. In our hypothesis, receiving CBT would lead to improvements in primary and secondary PTSD severity. CONCLUSION: We will demonstrate a feasibility study of individual CBT for PTSD and mental contamination in Japanese clinical settings. Our treatment would achieve favorable treatment outcomes for PTSD with mental contamination in Japanese clinical settings.

Keywords: CBT, cognitive theory, PTSD, mental pollution

Procedia PDF Downloads 406
18 Peculiar Mineralogical and Chemical Evolution of Contaminated Igneous Rocks at a Gabbro-Carbonate Contact, Wadai Bayhan, Yemen

Authors: Murad Ali, Shoji Arai, Mohamed Khedr, Mukhtar Nasher, Shawki Nasr

Abstract:

The Wadi Bayhan area of southeastern Yemen is about 60 km NW of Al-Bayda city in the Al-Bayda uplift terrane at the southeast margin of the Arabian-Nubian Shield. Intrusion of alkali gabbro into carbonate rocks apparently produced an 8m to 10 m thick reaction zone at the contact. This had been identified as nepheline pyroxenite. We have observed this to be mineralogically zoned with calc-silicate assemblages (e.g. pyroxene, calcite, spinel, garnet and melilite). The presence of melilite implies a skarn. The sinuous embayed pyroxenite-skarn contact, the presence of skarn minerals in pyroxenite, and textural evidence for growth of calc-silicate skarn by replacement of both carbonate rocks and solid pyroxenite indicate that reaction involved assimilation of carbonate wall rock by magma and loss of Al and Si to the skarn. Textural relationships between minerals provide evidence for a metasomatic development of the skarn at the expense of the pyroxenite. This process, related to the circulation of fluids equilibrated with carbonates, is responsible for those pyroxenite-spinel (± calcite) skarns. The uneven modal distribution of euhedral pyroxenite and enveloping nepheline in pyroxenite, the restricted occurrence of alkali gabbro as dikes in pyroxenite and skarn and the leucocratic matrix of pyroxenite suggest that pyroxenite represents an accumulation of titanaugite cemented by an alkali-rich residual magma and that alkali gabbro represents a part of the residual contaminated magma that was squeezed out of the pyroxene crystal mush. Carbonate assimilation is modeled by reaction of calcite and magmatic plagioclase, which results in resorption of plagioclase, growth of pyroxene enriched in Ca, Fe, Ti, and Al, and solution of nepheline in residual contaminated magma. The composition of nepheline pyroxenite evolved by addition of Ca from dissolved carbonate rocks, loss of Al and Si to skarn, and local segregation of solid pyroxene and alkali gabbro magma. The predominance of pyroxenite among contaminated rocks and their restriction to a large zone along the intrusive contact provide little evidence for the genesis of a significant volume of alkaline magmatic surroundings by carbonate assimilation.

Keywords: Yemen, Wadi Bayhan, skarn, pyroxenite, carbonatite, metasomatic

Procedia PDF Downloads 300
17 Entropy in a Field of Emergence in an Aspect of Linguo-Culture

Authors: Nurvadi Albekov

Abstract:

Communicative situation is a basis, which designates potential models of ‘constructed forms’, a motivated basis of a text, for a text can be assumed as a product of the communicative situation. It is within the field of emergence the models of text, that can be potentially prognosticated in a certain communicative situation, are designated. Every text can be assumed as conceptual system structured on the base of certain communicative situation. However in the process of ‘structuring’ of a certain model of ‘conceptual system’ consciousness of a recipient is able act only within the border of the field of emergence for going out of this border indicates misunderstanding of the communicative situation. On the base of communicative situation we can witness the increment of meaning where the synergizing of the informative model of communication, formed by using of the invariant units of a language system, is a result of verbalization of the communicative situation. The potential of the models of a text, prognosticated within the field of emergence, also depends on the communicative situation. The conception ‘the field of emergence’ is interpreted as a unit of the language system, having poly-directed universal structure, implying the presence of the core, the center and the periphery, including different levels of means of a functioning system of language, both in terms of linguistic resources, and in terms of extra linguistic factors interaction of which results increment of a text. The conception ‘field of emergence’ is considered as the most promising in the analysis of texts: oral, written, printed and electronic. As a unit of the language system field of emergence has several properties that predict its use during the study of a text in different levels. This work is an attempt analysis of entropy in a text in the aspect of lingua-cultural code, prognosticated within the model of the field of emergence. The article describes the problem of entropy in the field of emergence, caused by influence of the extra-linguistic factors. The increasing of entropy is caused not only by the fact of intrusion of the language resources but by influence of the alien culture in a whole, and by appearance of non-typical for this very culture symbols in the field of emergence. The borrowing of alien lingua-cultural symbols into the lingua-culture of the author is a reason of increasing the entropy when constructing a text both in meaning and in structuring level. It is nothing but artificial formatting of lexical units that violate stylistic unity of a phrase. It is marked that one of the important characteristics descending the entropy in the field of emergence is a typical similarity of lexical and semantic resources of the different lingua-cultures in aspects of extra linguistic factors.

Keywords: communicative situation, field of emergence, lingua-culture, entropy

Procedia PDF Downloads 335
16 Identification of Igneous Intrusions in South Zallah Trough-Sirt Basin

Authors: Mohamed A. Saleem

Abstract:

Using mostly seismic data, this study intends to show some examples of igneous intrusions found in some areas of the Sirt Basin and explore the period of their emplacement as well as the interrelationships between these sills. The study area is located in the south of the Zallah Trough, south-west Sirt basin, Libya. It is precisely between the longitudes 18.35ᵒ E and 19.35ᵒ E, and the latitudes 27.8ᵒ N and 28.0ᵒ N. Based on a variety of criteria that are usually used as marks on the igneous intrusions, twelve igneous intrusions (Sills), have been detected and analysed using 3D seismic data. One or more of the following were used as identification criteria: the high amplitude reflectors paired with abrupt reflector terminations, vertical offsets, or what is described as a dike-like connection, the violation, the saucer form, and the roughness. Because of their laying between the hosting layers, the majority of these intrusions are classified as sills. Another distinguishing feature is the intersection geometry link between some of these sills. Every single sill has given a name just to distinguish the sills from each other such as S-1, S-2, and …S-12. To avoid the repetition of description, the common characteristics and some statistics of these sills are shown in summary tables, while the specific characters that are not common and have been noticed for each sill are shown individually. The sills, S-1, S-2, and S-3, are approximately parallel to one other, with the shape of these sills being governed by the syncline structure of their host layers. The faults that dominated the strata (pre-upper Cretaceous strata) have a significant impact on the sills; they caused their discontinuity, while the upper layers have a shape of anticlines. S-1 and S-10 are the group's deepest and highest sills, respectively, with S-1 seated near the basement's top and S-10 extending into the sequence of the upper cretaceous. The dramatic escalation of sill S-4 can be seen in N-S profiles. The majority of the interpreted sills are influenced and impacted by a large number of normal faults that strike in various directions and propagate vertically from the surface to the basement's top. This indicates that the sediment sequences were existed before the sill’s intrusion, were deposited, and that the younger faults occurred more recently. The pre-upper cretaceous unit is the current geological depth for the Sills S-1, S-2 … S-9, while Sills S-10, S-11, and S-12 are hosted by the Cretaceous unit. Over the sills S-1, S-2, and S-3, which are the deepest sills, the pre-upper cretaceous surface has a slightly forced folding, these forced folding is also noticed above the right and left tips of sill S-8 and S-6, respectively, while the absence of these marks on the above sequences of layers supports the idea that the aforementioned sills were emplaced during the early upper cretaceous period.

Keywords: Sirt Basin, Zallah Trough, igneous intrusions, seismic data

Procedia PDF Downloads 85
15 An Easy Approach for Fabrication of Macroporous Apatite-Based Bone Cement Used As Potential Trabecular Bone Substitute

Authors: Vimal Kumar Dewangan, T. S. Sampath Kumar, Mukesh Doble, Viju Daniel Varghese

Abstract:

The apatite-based, i.e., calcium-deficient hydroxyapatite (CDHAp) bone cement is well-known potential bone graft/substitute in orthopaedics due to its similar chemical composition with natural bone minerals. Therefore, an easy approach was attempted to fabricate the apatite-based (CDHAp) bone cement with improved injectability, bioresorbability, and macroporosity. In this study, the desired bone cement was developed by mixing the solid phase (consisting of wet chemically synthesized nanocrystalline hydroxyapatite and commercially available (synthetic) tricalcium phosphate) and the liquid phase (consisting of cement binding accelerator with few biopolymers in a dilute acidic solution) along with a liquid porogen as polysorbate or a solid porogen as mannitol (for comparison) in an optimized liquid-to-powder ratio. The fabricated cement sets within clinically preferred setting time (≤20 minutes) are better injectable (>70%) and also stable at ~7.3-7.4 (physiological pH). The CDHAp phased bone cement was resulted by immersing the fabricated after-set cement in phosphate buffer solution and other similar artificial body fluids and incubated at physiological conditions for seven days, confirmed through the X-ray diffraction and Fourier transform-infrared spectroscopy analyses. The so-formed synthetic apatite-based bone cement holds the acceptable compressive strength (within the range of trabecular bone) with average interconnected pores size falls in a macropores range (~50-200μm) inside the cement, verified by scanning electron microscopy (SEM), mercury intrusion porosimetry and micro-CT analysis techniques. Also, it is biodegradable (degrades ~19-22% within 10-12 weeks) when incubated in artificial body fluids under physiological conditions. The biocompatibility study of the bone cement, when incubated with MG63 cells, shows a significant increase in the cell viability after 3rd day of incubation compared with the control, and the cells were well-attached and spread completely on the surface of the bone cement, confirmed through SEM and fluorescence microscopy analyses. With this all, we can conclude that the developed synthetic macroporous apatite-based bone cement may have the potential to become promising material used as a trabecular bone substitute.

Keywords: calcium deficient hydroxyapatite, synthetic apatite-based bone cement, injectability, macroporosity, trabecular bone substitute

Procedia PDF Downloads 62