796 resultados para islam
Resumo:
Organic Rankine Cycle (ORC) is the most commonly used method for recovering energy from small sources of heat. The investigation of the ORC in supercritical condition is a new research area as it has a potential to generate high power and thermal efficiency in a waste heat recovery system. This paper presents a steady state ORC model in supercritical condition and its simulations with a real engine’s exhaust data. The key component of ORC, evaporator, is modelled using finite volume method, modelling of all other components of the waste heat recovery system such as pump, expander and condenser are also presented. The aim of this paper is to investigate the effects of mass flow rate and evaporator outlet temperature on the efficiency of the waste heat recovery process. Additionally, the necessity of maintaining an optimum evaporator outlet temperature is also investigated. Simulation results show that modification of mass flow rate is the key to changing the operating temperature at the evaporator outlet.
Resumo:
The Muslim Brotherhood is the most significant and enduring Sunni Islamist organization of the contemporary era. Its roots lie in the Middle East but it has grown into both a local and global movement, with its well-placed branches reacting effectively to take the opportunities for power and electoral competition offered by the Arab Spring.
Regarded by some as a force of moderation among Islamists, and by others as a façade hiding a terrorist fundamentalist threat, the potential influence of the Muslim Brotherhood on Middle Eastern politics remains ambiguous.The Muslim Brotherhood: The Arab Spring and its Future Face provides an essential insight into the organisation, with chapters devoted to specific cases where the Brotherhood has important impacts on society, the state and politics. Key themes associated with the Brotherhood, such as democracy, equality, pan-Islamism, radicalism, reform, the Palestine issue and gender, are assessed to reveal an evolutionary trend within the movement since its founding in Egypt in 1928 to its manifestation as the largest Sunni Islamist movement in the Middle East in the 21st century. The book addresses the possible future of the Muslim Brotherhood; whether it can surprise sceptics and effectively accommodate democracy and secular trends, and how its ascension to power through the ballot box might influence Western policy debates on their engagement with this manifestation of political Islam.
Drawing on a wide range of sources, this book presents a comprehensive study of a newly resurgent movement and is a valuable resource for students, scholars and policy makers focused on Middle Eastern Politics.
Resumo:
Featuring a brand new examination of Islamic fundamentalism in the wake of the Arab Spring, this fully revised and updated second edition of Islamic Fundamentalism since 1945 analyzes the roots and emergence of Islamic movements in the modern world and the main thinkers that inspired them.
Providing a much-needed historical overview of a fast-changing socio-political landscape, the main facets of Islamic fundamentalism are put in a global context, with a thematic debate of issues such as:
- the effects of colonialism on Islam
- secularism and the Islamic reaction
- Islam and violence in the 9/11 era
- globalization and transnational Islamist movements
- Islam in the wake of the Arab Awakening
Islamic Fundamentalism since 1945 provides an authoritative account of the causes and diversity of Islamic fundamentalism, a modern phenomenon which has grabbed the headlines as a grave threat to the West and a potentially revolutionary trend in the Middle East. It is a valuable resource for students and those interested in the history, effects and consequences of these Islamic movements
Resumo:
The third edition of this dynamic book has been fully revised and updated to provide a comprehensive introduction to contemporary politics in the Middle East. Purposefully employing a clear thematic structure and including a wide range of case studies, data, visuals and further reading guidance the book explores and analyses the major issues which define the politics of this region of the globe.
Milton-Edwards begins by introducing and explaining key concepts and debates and goes on to outline the impact of colonialism and its legacy, the rise of Arab nationalism and anti-colonial politics. She then examines major political issues affecting the region, such as American foreign policy, political Islam, war and conflict, political economy, democratization, ethnicity and the role of women. The book concludes by highlighting the politics of the region in the twenty-first century and the future challenges it faces. This is a perfect introduction for undergraduates, covering key political, economic and social debates and providing updates and guidance for further reading.
"The genius of this book is that it integrates together the different themes which run through Middle Eastern politics. The coherence of the approach which the author has adopted is indicated by the manner in which she has updated the work in this second edition. Despite the substantial changes which the East has undergone since 9/11 and the 2003 Gulf War, the original line of analysis retains all its force. It remains a key reference for all those who are seeking to understand the region's politics, whether undergraduates, postgraduates or lay readers."
Tim Niblock, Exeter University
"I welcome the new edition of this comprehensive guide to the politics of such an important region of the world. It combines sensible generalizations with useful case studies of particularly important subjects. It is a must for all those who want to understand the complex politics of the modern Middle East."
Roger Owen, Harvard University
"Beverley Milton-Edwards has produced an excellent book, which is both wide-ranging in its coverage and punchy in its arguments. As such, its functions are dual. It works well as a text book, introducing the general reader to key themes in the contemporary region, from oil politics to ethnicity, to women and nationalism. But it also works as a running commentary on key debates, such as the rile of colonialism and the relationship between Islam and democracy. In short, this is a book with attitude."
Philip Robins, St Antony's College, Oxford
Resumo:
This third edition of Conflicts in the Middle East since 1945 analyzes the nature of conflict in the Middle East, with its racial, ethnic, political, cultural, religious and economic factors. Throughout the book Peter Hinchcliffe and Beverley Milton-Edwards put the main conflicts into their wider context, with thematic debates on issues such as the emergence of radical Islam, the resolution of conflicts, diplomacy and peace-making, and the role of the superpowers.
The book is brought fully up to date with events in the Middle East, covering, for instance, developments in Iraq in 2006 where a democratically elected government is in place but the insurgency show no sign of coming under control. The analysis of the Palestinian/Israeli conflict is also brought up to the present day, to include the election of the Hamas government and the 2006 conflict between Israel and Lebanon’s Hizballah.
Including a newly updated bibliography and maps of the area, this is the perfect introduction for all students wishing to understand the complex situation in the Middle East, in its historical context.
Resumo:
A study was undertaken to determine the effects of different concentrations of arsenic (As) in irrigation water on Boro (dry-season) rice (Oryza sativa) and their residual effects on the following Aman (wet-season) rice. There were six treatments, with 0, 0.1, 0.25, 0.5, 1, and 2 mg As L-1 applied as disodium hydrogen arsenate. All the growth and yield parameters of Boro rice responded positively at lower concentrations of up to 0.25 mg As L-1 in irrigation water but decreased sharply at concentrations more than 0.5 mg As L-1. Arsenic concentrations in grain and straw of Boro rice increased significantly with increasing concentration of As in irrigation water. The grain As concentration was in the range of 0.25 to 0.97 μg g-1 and its concentration in rice straw varied from 2.4 to 9.6 μg g-1 over the treatments. Residual As from previous Boro rice showed a very similar pattern in the following Aman rice, although As concentration in Aman rice grain and straw over the treatments was almost half of the As levels in Boro rice grain. Arsenic concentrations in both grain and straw of Boro and Aman rice were found to correlate with iron and be antagonistic with phosphorus. Copyright © Taylor & Francis Group, LLC.
Resumo:
The electron dynamics in a planar coil inductively coupled plasma (ICP) system with a capacitively biased electrode is investigated using space and phase resolved optical emission spectroscopy. The two power source frequencies are exact multiple of each other and phase-locked. In this configuration, the system is investigated when the coil is operated in both E-mode and H-mode. The results show that in a phase synchronized RF biased ICP, the electrode bias power couples with the capacitive contribution of the coil, in both E-mode and H-modes, similar to dual-frequency capacitively coupled plasmas (2f-CCPs). It is also demonstrated that in H-mode, the phase between the electrode bias frequency and the ICP coil frequency influences the electron heating, similar to the electrical asymmetry effect in 2f-CCPs.
Resumo:
The speed of manufacturing processes today depends on a trade-off between the physical processes of production, the wider system that allows these processes to operate and the co-ordination of a supply chain in the pursuit of meeting customer needs. Could the speed of this activity be doubled? This paper explores this hypothetical question, starting with examination of a diverse set of case studies spanning the activities of manufacturing. This reveals that the constraints on increasing manufacturing speed have some common themes, and several of these are examined in more detail, to identify absolute limits to performance. The physical processes of production are constrained by factors such as machine stiffness, actuator acceleration, heat transfer and the delivery of fluids, and for each of these, a simplified model is used to analyse the gap between current and limiting performance. The wider systems of production require the co-ordination of resources and push at the limits of human biophysical and cognitive limits. Evidence about these is explored and related to current practice. Out of this discussion, five promising innovations are explored to show examples of how manufacturing speed is increasing—with line arrays of point actuators, parallel tools, tailored application of precision, hybridisation and task taxonomies. The paper addresses a broad question which could be pursued by a wider community and in greater depth, but even this first examination suggests the possibility of unanticipated innovations in current manufacturing practices.
Resumo:
AIMS: Rheumatic heart disease (RHD) accounts for over a million premature deaths annually; however, there is little contemporary information on presentation, complications, and treatment.
METHODS AND RESULTS: This prospective registry enrolled 3343 patients (median age 28 years, 66.2% female) presenting with RHD at 25 hospitals in 12 African countries, India, and Yemen between January 2010 and November 2012. The majority (63.9%) had moderate-to-severe multivalvular disease complicated by congestive heart failure (33.4%), pulmonary hypertension (28.8%), atrial fibrillation (AF) (21.8%), stroke (7.1%), infective endocarditis (4%), and major bleeding (2.7%). One-quarter of adults and 5.3% of children had decreased left ventricular (LV) systolic function; 23% of adults and 14.1% of children had dilated LVs. Fifty-five percent (n = 1761) of patients were on secondary antibiotic prophylaxis. Oral anti-coagulants were prescribed in 69.5% (n = 946) of patients with mechanical valves (n = 501), AF (n = 397), and high-risk mitral stenosis in sinus rhythm (n = 48). However, only 28.3% (n = 269) had a therapeutic international normalized ratio. Among 1825 women of childbearing age (12-51 years), only 3.6% (n = 65) were on contraception. The utilization of valvuloplasty and valve surgery was higher in upper-middle compared with lower-income countries.
CONCLUSION: Rheumatic heart disease patients were young, predominantly female, and had high prevalence of major cardiovascular complications. There is suboptimal utilization of secondary antibiotic prophylaxis, oral anti-coagulation, and contraception, and variations in the use of percutaneous and surgical interventions by country income level.
Modelling of Evaporator in Waste Heat Recovery System using Finite Volume Method and Fuzzy Technique
Resumo:
The evaporator is an important component in the Organic Rankine Cycle (ORC)-based Waste Heat Recovery (WHR) system since the effective heat transfer of this device reflects on the efficiency of the system. When the WHR system operates under supercritical conditions, the heat transfer mechanism in the evaporator is unpredictable due to the change of thermo-physical properties of the fluid with temperature. Although the conventional finite volume model can successfully capture those changes in the evaporator of the WHR process, the computation time for this method is high. To reduce the computation time, this paper develops a new fuzzy based evaporator model and compares its performance with the finite volume method. The results show that the fuzzy technique can be applied to predict the output of the supercritical evaporator in the waste heat recovery system and can significantly reduce the required computation time. The proposed model, therefore, has the potential to be used in real time control applications.
Resumo:
More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
Resumo:
Building secure systems is difficult for many reasons. This paper deals with two of the main challenges: (i) the lack of security expertise in development teams, and (ii) the inadequacy of existing methodologies to support developers who are not security experts. The security standard ISO 14508 (Common Criteria) together with secure design techniques such as UMLsec can provide the security expertise, knowledge, and guidelines that are needed. However, security expertise and guidelines are not stated explicitly in the Common Criteria. They are rather phrased in security domain terminology and difficult to understand for developers. This means that some general security and secure design expertise are required to fully take advantage of the Common Criteria and UMLsec. In addition, there is the problem of tracing security requirements and objectives into solution design,which is needed for proof of requirements fulfilment. This paper describes a security requirements engineering methodology called SecReq. SecReq combines three techniques: the Common Criteria, the heuristic requirements editorHeRA, andUMLsec. SecReqmakes systematic use of the security engineering knowledge contained in the Common Criteria and UMLsec, as well as security-related heuristics in the HeRA tool. The integrated SecReq method supports early detection of security-related issues (HeRA), their systematic refinement guided by the Common Criteria, and the ability to trace security requirements into UML design models. A feedback loop helps reusing experiencewithin SecReq and turns the approach into an iterative process for the secure system life-cycle, also in the presence of system evolution.
Resumo:
Dependence clusters are (maximal) collections of mutually dependent source code entities according to some dependence relation. Their presence in software complicates many maintenance activities including testing, refactoring, and feature extraction. Despite several studies finding them common in production code, their formation, identification, and overall structure are not well understood, partly because of challenges in approximating true dependences between program entities. Previous research has considered two approximate dependence relations: a fine-grained statement-level relation using control and data dependences from a program’s System Dependence Graph and a coarser relation based on function-level controlflow reachability. In principal, the first is more expensive and more precise than the second. Using a collection of twenty programs, we present an empirical investigation of the clusters identified by these two approaches. In support of the analysis, we consider hybrid cluster types that works at the coarser function-level but is based on the higher-precision statement-level dependences. The three types of clusters are compared based on their slice sets using two clustering metrics. We also perform extensive analysis of the programs to identify linchpin functions – functions primarily responsible for holding a cluster together. Results include evidence that the less expensive, coarser approaches can often be used as e�ective proxies for the more expensive, finer-grained approaches. Finally, the linchpin analysis shows that linchpin functions can be e�ectively and automatically identified.
Resumo:
Observation-based slicing is a recently-introduced, language-independent, slicing technique based on the dependencies observable from program behaviour. Due to the wellknown limits of dynamic analysis, we may only compute an under-approximation of the true observation-based slice. However, because the observation-based slice captures all possible dependence that can be observed, even such approximations can yield insight into the limitations of static slicing. For example, a static slice, S that is strictly smaller than the corresponding observation based slice is guaranteed to be unsafe. We present the results of three sets of experiments on 12 different programs, including benchmarks and larger programs, which investigate the relationship between static and observation-based slicing. We show that, in extreme cases, observation-based slices can find the true static minimal slice, where static techniques cannot. For more typical cases, our results illustrate the potential for observation-based slicing to highlight unsafe static slices. Finally, we report on the sensitivity of observation-based slicing to test quality.