123 research outputs found

    The Influence of The Abraham Accords on the Visual Coverage of the Israeli-Palestinian Conflict in Arab Media: A Comparative Analysis

    Get PDF
    This study examines the influence of the official signing of the Abraham Accords on the Arab media visual coverage of the Israeli-Palestinian conflict. This study operationalized visual frames in terms of the human-interest vs technical frame and peace vs war frame, and explored the use of graphic portrayal as a framing device, in order to compare between the Arab media visual framing of the Israeli-Palestinian conflict before and after the official signing of the Abraham Accords to examine the impact of foreign policy on the coverage among news outlets of different Arab countries. A comparative analysis was conducted relying on the collection of visuals from the digital websites of three Arab television stations: Saudi Arabia-government owned Al Arabiya (reflecting a conservative stand towards the normalization), the Qatar-government owned Al Jazeera (reflecting an opposing stand towards the normalization) and Sky News Arabia, co-owned by Abu Dhabi Media Investment Corp, owned by a member of the Abu Dhabi Emirate ruling family, and British Sky Broadcasting (reflecting a supportive stand towards the normalization). The study examined a total of 3,298 visuals from two Gaza wars: the 2014 Gaza war that took place before the signing of the Abraham Accords and the recent Gaza war in 2021 which came after. The results show significant differences between the visual coverage of both wars as well as between the three news websites. This study contributes to the current understanding of how conflicts are framed on multi-levels, where peace vs war frames act as an outline framework reflecting the actual events, followed by more specific frames related to the attributes of war

    Investigation of lost circulation materials impact on fracture gradient

    Get PDF
    Lost circulation is a challenging problem to be prevented or mitigated during drilling. Lost circulation treatments are widely applied to mitigate losses using a corrective approach or to prevent losses using preventive approaches, also known as wellbore strengthening . The disagreement among the different wellbore strengthening theories and the lack of understanding the strengthening mechanism resulted in the absence of a standardized method to evaluate the effectiveness of lost circulation materials (LCM) for wellbore strengthening application. An extensive experimental investigation was performed by constructing a high pressure LCM test apparatus to investigate the effects of different parameters on the sealing efficiency of LCM treatments. In addition, hydraulic fracturing experiments, which simulates downhole conditions, were carried out to evaluate the impact of LCM addition on enhancing both; breakdown and re-opening pressure. The results showed that the sealing efficiency of LCM treatments is highly dependent on the fracture width and the particle size distribution (PSD). Carefully selected LCM blends can seal fractures up to 2500 micron and certain unconventional squeeze LCM can seal wider fractures. A particle size distribution selection criterion for LCM treatments was developed based on a statistical analysis of the experimental results states that D50 and D90 should be equal or greater than 3/10 and 6/5 the fracture width, respectively. The addition of different LCM blends enhanced the breakdown pressure up to 18% and the re-opening pressure up to 210%. Comparing the fractures created by the experiments with analytical models, only one model estimated similar fracture widths --Abstract, page iii

    Beamforming and non-orthogonal multiple access for rate and secrecy enhancement of fifth generation communication system

    Get PDF
    The fifth-generation (5G) communication systems have many anticipated functionalities and requirements such as high data rate, massive connectivity, wide coverage area, low latency and enhanced secrecy performance. In order to meet these criteria, communication schemes that combine 5G key enabling technologies need to be investigated. In this thesis, a novel communication system that merges non-orthogonal multiple access (NOMA), energy harvesting, beamforming, and full-duplex (FD) techniques in order to enhance both capacity and secrecy of 5G system is introduced. In the capacity improving scheme, NOMA is first combined with beamforming to serve more than one user in each beamforming vector. Next, simultaneous wireless information and power transfer (SWIPT) technique is exploited to encourage the strong user (user with better channel condition) to relay the information messages of the weak user (user with poor channel condition) in FD manner. The total sum rate maximisation problem is formulated and solved by means of convex-concave procedure. The system performance is also analysed by deriving the outage probability of both users. Additionally, the model is extended to a more general case wherein the users are moving, and the outage probability of this dynamic topology is provided by means of the stochastic geometry framework. Novel secure schemes are also introduced to safeguard legitimate users’ information from internal and external eavesdroppers. In the internal eavesdropper’s case, artificial signal concept is adopted to protect NOMA’s weak user’s information from being intercepted by the strong user. The secrecy outage probability of theweak user is derived and validated. In addition, game theory discipline is exploited to provide an efficient eavesdropping avoidance algorithm. Null-steering beamforming is adopted in the external eavesdropper’s case in two different schemes namely self and nonself-cooperative jamming. In self-cooperative strategy, the base station applies the null-steering jamming to impair the eavesdropper channel, while sending the information-bearing signals to the intended legitimate users. Whereas in the nonself-cooperative jamming scheme, the base station provides the helpers with the required information and power by means of SWIPT technique in the first phase. The helpers deploy null-steering beamforming to jam the eavesdropper during the information exchange between the base station and the intended users in the second phase. The secrecy outage probability of the legitimate users is derived in both jamming schemes. Game theory is also introduced to the nonself-cooperative jamming scheme for further improvements on the secrecy outage behaviour and the economic revenue of the system. The proposed capacity enhancing scheme demonstrates about 200% higher sum rate when compared with the non-cooperative and half-duplex cooperative NOMA systems. In addition, the novel secure scheme in the internal eavesdropper case is proven to enhance the information security of the weak user without compromising the functionalities of the strong user or NOMA superiority over orthogonal multiple access systems. Null-steering based jamming system also illustrates improved secrecy performance in the external eavesdropper case when compared to the conventional jamming schemes. Numerical simulations are carried out in order to validate the derived closed-form expressions and to illustrate the performance enhancement achieved by the proposed schemes where the rate is increased by 200% and the secrecy outage probability is decreased by 33% when compared to the baseline systems

    Older adults as simulated participants: a scoping review

    Get PDF
    AbstractIntroductionSimulated participants (SPs) can support development of competencies associated with person-centred care of older adults. There is limited information and understanding about working with older adult SPs and those who support them to create authentic, safe and effective simulations. This review aimed to review simulation literature focused on the care of older adults to explore and summarize what is known about working with older adults as SPs in healthcare providers’ education.MethodsThis scoping review followed Arksey and O’Malley’s five-stage approach, involving identification, selection, charting, collating, summarizing and reporting on results. Databases searched included MEDLINE, PsychINFO and EBSCO. To capture additional articles, we hand-searched the reference lists of articles selected for inclusion, MedEdPORTAL and Google Scholar.ResultsFrom the initial 816 citations identified, 12 articles were in scope. Articles were either research or educational guides. Findings related to general characteristics of articles, description of SPs, conceptualization of SP role/scenario, SP preparation and scenario implementation.DiscussionOlder adult SPs contribute to healthcare provider training in authentic, engaging, safe and effective ways. This scoping review provides a foundation on which to further develop older adult SP practices by highlighting their well-being and safety (both physical and psychological), promoting ways to increase diversity and inclusion, and emphasizing that the words we use matter. Improved reporting details of articles involving older adult SPs will facilitate the identification of effective practices

    A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case

    Get PDF
    In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user's message for successive interference cancellation operation in NOMA. To impair strong user's eavesdropping capability, weak user's information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user's message or not. To investigate users' power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems

    Development of predictive optimization model for autonomous rotary drilling system using machine learning approach.

    Get PDF
    The growing global energy demand and strict environmental policies motivate the use of technology and performance improvement techniques in drilling operations. In the traditional drilling method, the effort and time required to optimize drilling depend on the effectiveness of human driller in selecting the optimal set of parameters to improve system performance. Although existing work has identified the significance of upscaling from manual drilling to autonomous drilling system, little has been done to support this transition. In this paper, predictive optimization model is proposed for autonomous drilling systems. To evaluate optimized operating procedure, a comparative study of surface operating parameters using weight on bit (WOB), rotary speed (RPM) versus drilling mechanical specific energy (DMSE), and feed thrust (FET) is presented. The study used a data-driven approach that uses offset drilling data with machine learning model in finding a pair of input operating variables that serves as best tuning parameters for the topdrive and drawwork system. The results illustrate that derived variables (DMSE, FET) gave higher prediction accuracy with correlation coefficient (R2) of 0.985, root mean square error (RMSE) of 7.6 and average absolute percentage error (AAPE) of 34, whilst using the surface operating parameters (WOB, RPM) delivered an R2, RMSE and AAPE of 0.74, 28 and 106, respectively. Although previous researches have predicted ROP using ANN, this research considered the selection of tuning control variables and using it in predicting the system ROP for an autonomous system. The model output offers parameter optimization and adaptative control of autonomous drilling system

    Fulminant reversible cerebral vasoconstriction syndrome in post-partum female

    Get PDF
    Reversible cerebral vasoconstriction syndrome (RCVS) is a clinical and radiologic syndrome that represents a common presentation of a diverse group of disorders. Call-Fleming syndrome which is a part of RCVS group. We present a case of 30 year old primigravida who developed thunderclap headache followed by seizures on her day 1 of postpartum period. MRI revealed left anterior cerebral artery infarct with vasoconstriction of bilateral internal carotid arteries and its branches. She was managed conservatively. Follow up on 25th day revealed complete reversal of vasoconstriction in above mentioned arteries which confirmed the diagnosis of Call-Fleming syndrome. Patient had residual aphasia and right lower limb paresis on 2 months follow up
    corecore