Search results for: Dalia Michel Reyes Villeda
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 253

Search results for: Dalia Michel Reyes Villeda

253 Selective Adsorption of Anionic Textile Dyes with Sustainable Composite Materials Based on Physically Activated Carbon and Basic Polyelectrolytes

Authors: Mari Carmen Reyes Angeles, Dalia Michel Reyes Villeda, Ana María Herrera González

Abstract:

This work reports the design and synthesis of two composite materials based on physically activated carbon and basic polyelectrolytes useful in the adsorption of textile dyes present in aqueous solutions and wastewater. The synthesis of basic polyelectrolytes poly(2-vinylpyridine) (P2VP) and poly(4-vinylpyridine) (P4VP) was made by means of free radical polymerization. The carbon made from prickly pear peel (CarTunaF) was thermally activated in the presence of combustion gases. Composite materials CarTunaF2VP and CarTunaF4VP were obtained from CarTunaF and polybasic polyelectrolytes P2VP and P4VP with a ratio of 67:33 wt. The structure of each polyelectrolyte, P2VP, and P4VP, was elucidated by means of the FTIR and 1H NMR spectrophotometric techniques. Their thermal stability was evaluated using TGA. The characterization of CarTunaF and composite materials CarTunaF2VP and CarTunaF4VP was made by means of FTIR, TGA, SEM, and N2 adsorption. The adsorptive capacities of the polyelectrolytes and the composite materials were evaluated by adsorption of direct dyes present in aqueous solutions. The polyelectrolytes removed between 90 and 100% of the dyes, and the composite materials removed between 68 and 93% of the dyes. Using the four adsorbents P2VP, P4VP, CarTuna2VP, and CarTuna4VP, it was observed that the dyes studied, Direct Blue 80, Direct Turquoise 86, and Direct Orange 26, were adsorbed in the range between 46.1 and 188.7mg∙g-1 by means of electrostatic interactions between the anionic groups in the dyes with the cationic groups in the adsorbents. By using adsorbent materials in the treatment of wastewater from the textile industry, an improvement in the quality of the water was observed by decreasing its pH, COD, conductivity, and color considerably

Keywords: adsorption, anionic dyes, composite, polyelectrolytes

Procedia PDF Downloads 99
252 Zoonotic Risk Practices in Rural Households in the Penka-Michel Health District (West Cameroon)

Authors: Namekong Fokeng Armand

Abstract:

Background: Zoonoses are nowadays a serious public health problem in both developing and developed countries. They contribute to increase the economic burden. In case of emergence, rural populations are the most affected, hence the need to investigate risk practices in rural households of Penka-Michel (West Cameroon). Methods: This cross-sectional study was conducted from October to November 2021 among 200 heads of households living in the Penka-Michel health district (West Cameroon). It was done using a pre-tested and validated questionnaire, allowing to obtain socio-demographic, economic data, and data on zoonotic risk practices. Results: The participants [women (56%), men (44%)] worked mainly in the informal private sector (53%) and practiced agriculture secondarily (90%). Their highest level of education, for the most part, was a secondary school (50%); the average household size was 06 persons with a monthly income > 36270 FCFA (72%). 74% of household heads thought that animals can transmit diseases, and 17% had heard about zoonotic diseases through the media (65%). Rats caught in households (60%) were consumed there (74%), as was bush meat (61%) or dog meat (18%). For family food (90%), animals were slaughtered within the household (97%), rarely preceded by a veterinary inspection (6%). 87% of households practiced traditional rites with animal blood, 65% shared the same habitat as their animals, 41% did not systematically wash their hands after handling animals. More than 50% of households owned one or more dogs, usually strays (41%) and 48% of which were vaccinated (rabies). Many households had at least one: poultry (98%); pig (50%); dog (57%), cat (52%). 25% of households slaughtered sick animals for consumption, and 27% ate dead animals. Conclusion: This study identified numerous zoonotic risk practices in households in the Penka-Michel health district (West Cameroon). Concerted, multisectoral communication / awareness-raising actions are needed to break with these practices.

Keywords: zoonoses, risky practices, rural households, penka-michel, cameroon

Procedia PDF Downloads 170
251 Prediction of Structural Response of Reinforced Concrete Buildings Using Artificial Intelligence

Authors: Juan Bojórquez, Henry E. Reyes, Edén Bojórquez, Alfredo Reyes-Salazar

Abstract:

This paper addressed the use of Artificial Intelligence to obtain the structural reliability of reinforced concrete buildings. For this purpose, artificial neuronal networks (ANN) are developed to predict seismic demand hazard curves. In order to have enough input-output data to train the ANN, a set of reinforced concrete buildings (low, mid, and high rise) are designed, then a probabilistic seismic hazard analysis is made to obtain the seismic demand hazard curves. The results are then used as input-output data to train the ANN in a feedforward backpropagation model. The predicted values of the seismic demand hazard curves found by the ANN are then compared. Finally, it is concluded that the computer time analysis is significantly lower and the predictions obtained from the ANN were accurate in comparison to the values obtained from the conventional methods.

Keywords: structural reliability, seismic design, machine learning, artificial neural network, probabilistic seismic hazard analysis, seismic demand hazard curves

Procedia PDF Downloads 196
250 The Links between Cardiovascular Risk and Psychological Wellbeing in Elderly

Authors: Laura Sapranaviciute-Zabazlajeva, Abdonas Tamosiunas, Dalia Luksiene, Dalia Virviciute

Abstract:

The cardiovascular diseases (CVD) is the leading cause of death in the EU, especially in the middle aged and elderly population. Psychological wellbeing (PWB) has been linked with better cardiovascular health and survival in the elderly. The aim of the study is to evaluate associations between CVD risk and PWB in middle-aged and elderly population. 10,940 middle aged and older Lithuanians of age 45-74 years, were invited to participate in the study. A study sample was a random and stratified by gender and age. In 2006-2008 7,087 responders participated in the survey, so the response rate was 64.8%. A follow-up study was conducted from 2006 till 2015. New CVD cases and deaths from CVD were evaluated using the Kaunas population-based CVD register and death register of Kaunas. Study results revealed that good PWB predicts longer life in female participants (Log Rank = 13.7, p < 0.001). In the fully adjusted model for socio-demographic, social and CVD risk factors, hazard ratio for CVD mortality risk was lower amongst women with good PWB (HR = 0.28, 95% CI 0.11-0.72), but not significantly for men. Our study concludes, that lower CVD mortality rates is being associated with better PWB in female aged 45-74 years.

Keywords: psychological well-being, cardiovascular disease, elderly, survival

Procedia PDF Downloads 360
249 An Effect of Organic Supplements on Stimulating Growth of Vanda and Mokara Seedlings in Tissue Culture

Authors: Kullanart Obsuwan, Chockpisit Thepsithar

Abstract:

This study aimed to investigate effect of different organic supplements on growth of Vanda and Mokara seedlings. Vanda and Mokara seedlings approximately 0.2 and 0.3 cm. in height were sub-cultured onto VW supplemented with 150 ml/L coconut water, 100 g/L potato extract, 100 g/L ‘Gros Michel’ banana (AAA group) and 100 g/L ‘Namwa’ banana (ABB group). The explants were sub-cultured onto the same medium every month for 3 months. The best medium increased stem height to 0.52 and 0.44 Cm. in Vanda and Mokara respectively was supplemented with coconut water. The maximum fresh weight of Vanda (0.59 g) was found on medium supplemented with ‘Gros Michel’ banana while Mokara cultured on medium supplemented with Potato extract had the maximum fresh weight (0.27 g) and number of roots (5.20 roots/shoot) statistically different (p≤ 0.05) to other treatments. However, Vanda cultured on medium supplemented with ‘Namwa’ banana had the maximum number of roots (3.80 roots/shoot). Our results suggested that growth of different orchid genera was responded diversely to different organic supplements.

Keywords: orchid, in vitro propagation, fresh weight, plant height

Procedia PDF Downloads 370
248 Healing to Be a Man or Living in the Truth: Comparison on the Concept of Healing between Foucault and Chan

Authors: Jing Li Hong

Abstract:

This study compared Michel Foucault’s thoughts and the Chan School’s thoughts on the idea of healing. Healing is not an unfamiliar idea in Buddhist thoughts. The paired concepts of illness and medicine are often used as a metaphor to describe the relationship between people and truth. Foucault investigated the topic of care of self in his later studies and dedicated a large portion of his final semester course at the Collège de France in 1984 to discuss the meaning of Socrates’s offering of a sacrifice to the god of medicine in Phaedo. Foucault indicated a key preposition in ancient philosophy, namely healing. His idea of healing also addressed the relationship between subject and truth. From this relationship, Foucault unraveled his novel study on truth, namely the technologies of the self, with an emphasis on the care of self. Whereas numerous philosophers ask obvious questions such as ‘what is truth’ and ‘how to learn about truth,’ Foucault proposed distinct questions such as ‘what is our relationship to truth’ and ‘how does our relationship with truth turn us into who we are now?’ Thus, healing in both Buddhist and Foucault’s thoughts is related to the relationship between being and truth. This study first reviews Buddhist and Foucault’s ideas of healing to explicate what is illness and what is medicine. Because Buddhist thoughts cover an extensive scope, this study focuses on the thoughts of the Chan School. The second part is a discussion on medicine (treatment), specifically what is used as the medicine for the illness in both thoughts, and how can this medicine treat the illness. This part includes a description and comparison of the use of concepts of negation in these two thought groups. Finally, the subjects that practice the technologies of the self in both groups are compared from the idea of care of self; in other words, the differences between the subjects formed by the different relationships between being and truth are analyzed.

Keywords: Chan, heterogeneous, living style, language of paradox, Michel Foucault, negation, parrhesia, the care of self

Procedia PDF Downloads 181
247 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 476
246 Foucault and the Archaeology of Transhumanism

Authors: Michel Foucault, Friedrich Nietzsche, Max More, Natasha Vita-More, Francesca Ferrando

Abstract:

During the early part of his intellectual and academic career (1950s and 1960s), Michel Foucault developed an interest for what we can call the ‘anthropological question’, or how our modernity deals with human nature from an epistemological standpoint. The great originality of Foucault’s thought here lies in the fact that he approaches this question not from the perspective of this ‘sovereign subject’ (that has characterized the History of Western thought) he wishes to disclose and ‘denounce’, but rather at the level of discourses and the way they constitute who we are, so to speak. This led him, in turn, to formulate a series of though-provoking statements during his so-called ‘archaeological period’ of the 1960s concerning what we call ‘man’ in the West, such as that he is an ‘invention of recent date’ (as a proper object of concern and reflection), and, perhaps more importantly, that he might disappear in the near future, ‘like a face drawn in sand at the edge of the sea’. Foucault is following on the footsteps of Nietzsche in that regard, who had famously announced in the 19th ce. the ‘death of God’ and the need for the future generations to surpass (so to speak) the traditional ‘Christian-centred’ Western conception of the human. While Foucault exposed such insights more than half a century ago, they appear to be more actual than ever today with the development and rise in popularity of intellectual movements such as Transhumanism and Posthumanism, which seek to question and propose an alternative to the concepts of ‘man’ or ‘human nature’ in our culture. They rely for that on the same assumption as Foucault and Nietzsche that those concepts (and the meaning we attribute to them) have become ‘obsolete’ as it is and thus must be overcome (at a conceptual, but also a more practical level). Hence, those movements not only echo the important Foucauldian reflection of the 1950s and 1960s on the ‘anthropological question’ but seem to have been literally announced by it, so to speak. The aim of this paper will therefore be to show the relevance of Foucault (and in particular his archaeological method) in understanding the nature of Transhumanism (and Posthumanism), for instance, by analysing and assessing it as a form of discourse that is literally reshaping the way we understand ourselves as human beings in our (post)modern age, drawing for that on a number of key texts including from the early productions of Foucault.

Keywords: foucault, nietzsche, archaeology, transhumanism, posthumanism

Procedia PDF Downloads 70
245 Poisson Type Spherically Symmetric Spacetimes

Authors: Gonzalo García-Reyes

Abstract:

Conformastat spherically symmetric exact solutions of Einstein's field equations representing matter distributions made of fluid both perfect and anisotropic from given solutions of Poisson's equation of Newtonian gravity are investigated. The approach is used in the construction of new relativistic models of thick spherical shells and three-component models of galaxies (bulge, disk, and dark matter halo), writing, in this case, the metric in cylindrical coordinates. In addition, the circular motion of test particles (rotation curves) along geodesics on the equatorial plane of matter configurations and the stability of the orbits against radial perturbations are studied. The models constructed satisfy all the energy conditions.

Keywords: general relativity, exact solutions, spherical symmetry, galaxy, kinematics and dynamics, dark matter

Procedia PDF Downloads 87
244 Microwave Security System in Museums: Design and Implementation

Authors: Dalia Elsheakh, Hala Elsadek

Abstract:

The objective of this paper is to propose a competitive microwave security system that can be applied with reasonable price at museums in Egypt, considering the priceless elements in 23 Egyptian museums countrywide and the lack of good recent security systems even in big ones. The system main goal is to detect valuable targets to ensure their presence in the pre-defined positions in order to protect them from being stolen. The system is based on real time microwave scanning for the required space volume through transmitting RF waves at consecutive angles and detecting the back scattered waves from required objects to detect their existence at pre-specified locations.

Keywords: microwave security system, object locating system, real time locating system (RTLS), antenna array, array electronic scanning

Procedia PDF Downloads 349
243 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 425
242 Synchronization of Semiconductor Laser Networks

Authors: R. M. López-Gutiérrez, L. Cardoza-Avendaño, H. Cervantes-de Ávila, J. A. Michel-Macarty, C. Cruz-Hernández, A. Arellano-Delgado, R. Carmona-Rodríguez

Abstract:

In this paper, synchronization of multiple chaotic semiconductor lasers is achieved by appealing to complex system theory. In particular, we consider dynamical networks composed by semiconductor laser, as interconnected nodes, where the interaction in the networks are defined by coupling the first state of each node. An interesting case is synchronized with master-slave configuration in star topology. Nodes of these networks are modeled for the laser and simulated by Matlab. These results are applicable to private communication.

Keywords: chaotic laser, network, star topology, synchronization

Procedia PDF Downloads 566
241 Residents’ Perceptions towards the Application of Vertical Landscape in Cairo, Egypt

Authors: Yomna Amr Ahmed Lotfi Koraim, Dalia Moati Rasmi Elkhateeb

Abstract:

Vertical landscape is introduced in this study as an alternative innovative technology for urban sustainable developments for its diverse environmental, economic, and psycho-social advantages. The main aim is to investigate the social acceptance of vertical landscape in Cairo, Egypt. The study objectives were to explore the perceptions of residents concerning this certain phenomenon and their opinions about its implementation. Survey questionnaires were administrated to 60 male and female residents from the Greater Cairo area. Despite the various concerns expressed about the application of vertical landscape, there was a clear majority of approval about its suitability. This is quite encouraging for the prospect of vertical landscape implementation in Cairo, Egypt.

Keywords: vertical landscape, green facades, vertical greening, social acceptance, sustainable urban development

Procedia PDF Downloads 355
240 Michel Foucault’s Docile Bodies and The Matrix Trilogy: A Close Reading Applied to the Human Pods and Growing Fields in the Films

Authors: Julian Iliev

Abstract:

The recent release of The Matrix Resurrections persuaded many film scholars that The Matrix trilogy had lost its appeal and its concepts were largely outdated. This study examines the human pods and growing fields in the trilogy. Their functionality is compared to Michel Foucault’s concept of docile bodies: linking fictional and contemporary worlds. This paradigm is scrutinized through surveillance literature. The analogy brings to light common elements of hidden surveillance practices in technologies. The comparison illustrates the effects of body manipulation portrayed in the movies and their relevance with contemporary surveillance practices. Many scholars have utilized a close reading methodology in film studies (J.Bizzocchi, J.Tanenbaum, P.Larsen, S. Herbrechter, and Deacon et al.). The use of a particular lens through which media text is examined is an indispensable factor that needs to be incorporated into the methodology. The study spotlights both scenes from the trilogy depicting the human pods and growing fields. The functionality of the pods and the fields compare directly with Foucault’s concept of docile bodies. By utilizing Foucault’s study as a lens, the research will unearth hidden components and insights into the films. Foucault recognizes three disciplines that produce docile bodies: 1) manipulation and the interchangeability of individual bodies, 2) elimination of unnecessary movements and management of time, and 3) command system guaranteeing constant supervision and continuity protection. These disciplines can be found in the pods and growing fields. Each body occupies a single pod aiding easier manipulation and fast interchangeability. The movement of the bodies in the pods is reduced to the absolute minimum. Thus, the body is transformed into the ultimate object of control – minimum movement correlates to maximum energy generation. Supervision is exercised by wiring the body with numerous types of cables. This ultimate supervision of body activity reduces the body’s purpose to mere functioning. If a body does not function as an energy source, then it’s unplugged, ejected, and liquefied. The command system secures the constant supervision and continuity of the process. To Foucault, the disciplines are distinctly different from slavery because they stop short of a total takeover of the bodies. This is a clear difference from the slave system implemented in the films. Even though their system might lack sophistication, it makes up for it in the elevation of functionality. Further, surveillance literature illustrates the connection between the generation of body energy in The Matrix trilogy to the generation of individual data in contemporary society. This study found that the three disciplines producing docile bodies were present in the portrayal of the pods and fields in The Matrix trilogy. The above comparison combined with surveillance literature yields insights into analogous processes and contemporary surveillance practices. Thus, the constant generation of energy in The Matrix trilogy can be equated to the consistent data generation in contemporary society. This essay shows the relevance of the body manipulation concept in the Matrix films with contemporary surveillance practices.

Keywords: docile bodies, film trilogies, matrix movies, michel foucault, privacy loss, surveillance

Procedia PDF Downloads 93
239 A Proof of the N. Davydov Theorem for Douglis Algebra Valued Functions

Authors: Jean-Marie Vilaire, Ricardo Abreu-Blaya, Juan Bory-Reyes

Abstract:

The classical Beltrami system of elliptic equations generalizes the Cauchy Riemann equation in the complex plane and offers the possibility to consider homogeneous system with no terms of zero order. The theory of Douglis-valued functions, called Hyper-analytic functions, is special case of the above situation. In this note, we prove an analogue of the N. Davydov theorem in the framework of the theory of hyperanalytic functions. The used methodology contemplates characteristic methods of the hypercomplex analysis as well as the singular integral operators and elliptic systems of the partial differential equations theories.

Keywords: Beltrami equation, Douglis algebra-valued function, Hypercomplex Cauchy type integral, Sokhotski-Plemelj formulae

Procedia PDF Downloads 250
238 An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: proxy signature, warrant partial delegation, key agreement, discrete logarithm

Procedia PDF Downloads 345
237 Automatic Threshold Search for Heat Map Based Feature Selection: A Cancer Dataset Analysis

Authors: Carlos Huertas, Reyes Juarez-Ramirez

Abstract:

Public health is one of the most critical issues today; therefore, there is great interest to improve technologies in the area of diseases detection. With machine learning and feature selection, it has been possible to aid the diagnosis of several diseases such as cancer. In this work, we present an extension to the Heat Map Based Feature Selection algorithm, this modification allows automatic threshold parameter selection that helps to improve the generalization performance of high dimensional data such as mass spectrometry. We have performed a comparison analysis using multiple cancer datasets and compare against the well known Recursive Feature Elimination algorithm and our original proposal, the results show improved classification performance that is very competitive against current techniques.

Keywords: biomarker discovery, cancer, feature selection, mass spectrometry

Procedia PDF Downloads 337
236 Make Up Flash: Web Application for the Improvement of Physical Appearance in Images Based on Recognition Methods

Authors: Stefania Arguelles Reyes, Octavio José Salcedo Parra, Alberto Acosta López

Abstract:

This paper presents a web application for the improvement of images through recognition. The web application is based on the analysis of picture-based recognition methods that allow an improvement on the physical appearance of people posting in social networks. The basis relies on the study of tools that can correct or improve some features of the face, with the help of a wide collection of user images taken as reference to build a facial profile. Automatic facial profiling can be achieved with a deeper study of the Object Detection Library. It was possible to improve the initial images with the help of MATLAB and its filtering functions. The user can have a direct interaction with the program and manually adjust his preferences.

Keywords: Matlab, make up, recognition methods, web application

Procedia PDF Downloads 144
235 Predicting Survival in Cancer: How Cox Regression Model Compares to Artifial Neural Networks?

Authors: Dalia Rimawi, Walid Salameh, Amal Al-Omari, Hadeel AbdelKhaleq

Abstract:

Predication of Survival time of patients with cancer, is a core factor that influences oncologist decisions in different aspects; such as offered treatment plans, patients’ quality of life and medications development. For a long time proportional hazards Cox regression (ph. Cox) was and still the most well-known statistical method to predict survival outcome. But due to the revolution of data sciences; new predication models were employed and proved to be more flexible and provided higher accuracy in that type of studies. Artificial neural network is one of those models that is suitable to handle time to event predication. In this study we aim to compare ph Cox regression with artificial neural network method according to data handling and Accuracy of each model.

Keywords: Cox regression, neural networks, survival, cancer.

Procedia PDF Downloads 200
234 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: proxy signature, fault tolerance, rsa, key agreement protocol

Procedia PDF Downloads 285
233 Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: discrete logarithm, factoring, proxy signature, key agreement

Procedia PDF Downloads 307
232 Size Distribution Effect of InAs/InP Self–Organized Quantum Dots on Optical Properties

Authors: Abdelkader Nouri, M’hamed Bouslama, Faouzi Saidi, Hassan Maaref, Michel Gendry

Abstract:

Self-organized InAs quantum dots (QDs) have been grown on 3,1% InP (110) lattice mismatched substrate by Solid Source Molecular Beam Epitaxy (SSMBE). Stranski-Krastanov mode growth has been used to create self-assembled 3D islands on InAs wetting layer (WL). The optical quality depending on the temperature and power is evaluated. In addition, Atomic Force Microscopy (AFM) images shows inhomogeneous island dots size distribution due to temperature coalescence. The quantum size effect was clearly observed through the spectra photoluminescence (PL) shape.

Keywords: AFM, InAs QDs, PL, SSMBE

Procedia PDF Downloads 686
231 Comparison of the Seismic Response of Planar Regular and Irregular Steel Frames

Authors: Robespierre Chavez, Eden Bojorquez, Alfredo Reyes-Salazar

Abstract:

This study compares the seismic response of regular and vertically irregular steel frames determined by nonlinear time history analysis and by using several sets of earthquake records, which are divided in two categories: The first category having 20 stiff-soil ground motion records obtained from the NGA database, and the second category having 30 soft-soil ground motions recorded in the Lake Zone of Mexico City and exhibiting a dominant period (Ts) of two seconds. The steel frames in both format regular and irregular were designed according to the Mexico City Seismic Design Provisions (MCSDP). The effects of irregularity throught the height on the maximum interstory drifts are estimated.

Keywords: irregular steel frames, maximum interstory drifts, seismic response, seismic records

Procedia PDF Downloads 327
230 Stationary Gas Turbines in Power Generation: Past, Present and Future Challenges

Authors: Michel Moliere

Abstract:

In the next decades, the thermal power generation segment will survive only if it achieves deep mutations, including drastical abatements of CO2 emissions and strong efficiency gains. In this challenging perspective, stationary gas turbines appear as serious candidates to lead the energy transition. Indeed, during the past decades, these turbomachines have made brisk technological advances in terms of efficiency, reliability, fuel flex (including the combustion of hydrogen), and the ability to hybridize with regenrables. It is, therefore, timely to summarize the progresses achieved by gas turbines in the recent past and to examine what are their assets to face the challenges of the energy transition.

Keywords: energy transition, gas turbines, decarbonization, power generation

Procedia PDF Downloads 208
229 The Foucaultian Relationship between Power and Knowledge: Genealogy as a Method for Epistemic Resistance

Authors: Jana Soler Libran

Abstract:

The primary aim of this paper is to analyze the relationship between power and knowledge suggested in Michel Foucault's theory. Taking into consideration the role of power in knowledge production, the goal is to evaluate to what extent genealogy can be presented as a practical method for epistemic resistance. To do so, the methodology used consists of a revision of Foucault’s literature concerning the topic discussed. In this sense, conceptual analysis is applied in order to understand the effect of the double dimension of power on knowledge production. In its negative dimension, power is conceived as an organ of repression, vetoing certain instances of knowledge considered deceitful. In opposition, in its positive dimension, power works as an organ of the production of truth by means of institutionalized discourses. This double declination of power leads to the first main findings of the present analysis: no truth or knowledge can lie outside power’s action, and power is constituted through accepted forms of knowledge. To second these statements, Foucaultian discourse formations are evaluated, presenting external exclusion procedures as paradigmatic practices to demonstrate how power creates and shapes the validity of certain epistemes. Thus, taking into consideration power’s mechanisms to produce and reproduce institutionalized truths, this paper accounts for the Foucaultian praxis of genealogy as a method to reveal power’s intention, instruments, and effects in the production of knowledge. In this sense, it is suggested to consider genealogy as a practice which, firstly, reveals what instances of knowledge are subjugated to power and, secondly, promotes aforementioned peripherical discourses as a form of epistemic resistance. In order to counterbalance these main theses, objections to Foucault’s work from Nancy Fraser, Linda Nicholson, Charles Taylor, Richard Rorty, Alvin Goldman, or Karen Barad are discussed. In essence, the understanding of the Foucaultian relationship between power and knowledge is essential to analyze how contemporary discourses are produced by both traditional institutions and new forms of institutionalized power, such as mass media or social networks. Therefore, Michel Foucault's practice of genealogy is relevant, not only for its philosophical contribution as a method to uncover the effects of power in knowledge production but also because it constitutes a valuable theoretical framework for political theory and sociological studies concerning the formation of societies and individuals in the contemporary world.

Keywords: epistemic resistance, Foucault’s genealogy, knowledge, power, truth

Procedia PDF Downloads 124
228 Musical Tesla Coil Controlled by an Audio Signal Processed in Matlab

Authors: Sandra Cuenca, Danilo Santana, Anderson Reyes

Abstract:

The following project is based on the manipulation of audio signals through the Matlab software, which has an audio signal that is modified, and its resultant obtained through the auxiliary port of the computer is passed through a signal amplifier whose amplified signal is connected to a tesla coil which has a behavior like a vumeter, the flashes at the output of the tesla coil increase and decrease its intensity depending on the audio signal in the computer and also the voltage source from which it is sent. The amplified signal then passes to the tesla coil being shown in the plasma sphere with the respective flashes; this activation is given through the specified parameters that we want to give in the MATLAB algorithm that contains the digital filters for the manipulation of our audio signal sent to the tesla coil to be displayed in a plasma sphere with flashes of the combination of colors commonly pink and purple that varies according to the tone of the song.

Keywords: auxiliary port, tesla coil, vumeter, plasma sphere

Procedia PDF Downloads 90
227 Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption

Authors: Koyangbo Guere Monguia Michel Alex Emmanuel

Abstract:

In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files.

Keywords: cloud computing network, identity management systems, public key encryption, access control and authorization

Procedia PDF Downloads 358
226 Innovative Biomonitoring in Port Ecosystem: Lessons and Perspectives from the QUAMPO Project

Authors: Benedicte Madon, Marion Pillet, Justine Castrec, Quentin Fonatine, Pierre Lejeune, Michel Marengo, Helene Thomas

Abstract:

Biodiversity in port ecosystems faces many anthropic pressures from port activities. The maritime industry and port areas have been under scrutiny regarding their environmental impacts. In the port value chain, port managers need to implement actions to fulfil environmental certifications and European Directive requirements. This paper seeks to highlight the lessons learned and opportunities through the QUAMPO project to move towards port biodiversity restoration in Corsica using innovative biomonitoring in the goal of obtaining green certification.

Keywords: biomonitoring, port, water quality, invertebrate, corsica, biomarker, trace elements, HAP, PCB, certification

Procedia PDF Downloads 119
225 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 562
224 Biopolitics and Race in the Age of a Global Pandemic: Interactions and Transformations

Authors: Aistis ZekevicIus

Abstract:

Biopolitical theory, which was first developed by Michel Foucault, takes into consideration the administration of life by implying a style of government based on the regulation of populations as its subject. The intensification of the #BlackLivesMatter movement and popular outcries against racial discrimination in the US health system have prompted us to reconsider the relationship between biopolitics and race in the face of the COVID-19 pandemic. Based on works by Foucault, Achille Mbembe and Nicholas Mirzoeff that transcend the boundaries of poststructuralism, critical theory and postcolonial studies, the paper suggests that the global pandemic has highlighted new aspects of the interplay between biopower and race by encouraging the search for scapegoats, deepening the structural racial inequality, and thus producing necropolitical regimes of exclusion.

Keywords: biopolitics, biopower, necropolitics, pandemic, race

Procedia PDF Downloads 259