Search results for: core analysis
28726 A Study of the Relationship between Habitat Patch Metrics and Landscape Connectivity with Reference to Colombo Wetlands Sri Lanka
Authors: H. E. M. W. G. M. K. Ekanayake, J. Dharmasena
Abstract:
Natural Landscape fragmentation and habitat loss are emerging issues in Sri Lanka, which is due to rapid urban development and inadequate concern of managing Landscape connectivity. Urban Wetlands are the most vulnerable ecosystem effects from the fragmentation. Therefore, management of landscape connectivity with proper analysis and understanding has become a most important measure for urban wetland habitats. This study aimed to introduce spatial planning strategy to identify and locate landscape developments appropriately in order to restore landscape connectivity. Therefore, the study focuses on understanding the relationship between habitat patch metrics and landscape connectivity with reference to Colombo wetlands. Geographic Information Systems (GIS) was used to measure the wetland patch metrics; Patch area, Total edge, Perimeter-area ratio, Core area index and Inter-patch distances. Further, GIS-enabled least-cost path tool was used to measure the Landscape connectivity and calculate the number of species flow paths per wetland patch. According to the research findings; increasing the patch area, maintaining a mean perimeter-area ratio and core area index also reducing the inter-patch distances could enhance the landscape connectivity. Further, this study introduces three patch typologies; ‘active patches,' ‘open patches’ and ‘closed patches’ that severs to landscape connectivity in different levels. In the end, the study proposes a strategy for Landscape Architects to select most suitable locations to implement ecological based landscape developments with adjacent to the existing urban habitat in order to enhance habitat patch metrics and to restore the landscape connectivity.Keywords: landscape fragmentation, urban wetlands, landscape connectivity, patch metrics
Procedia PDF Downloads 20428725 Performance of CO₂/N₂ Foam in Enhanced Oil Recovery
Authors: Mohamed Hassan, Rahul Gajbhiye
Abstract:
The high mobility and gravity override of CO₂ gas can be minimized by generating the CO₂ foam with the aid of surfactant. However, CO₂ is unable to generate the foam/stable foam above its supercritical point (1100 psi, 31°C). These difficulties with CO₂ foam is overcome by adding N₂ in small fraction to enhance the foam generation of CO₂ at supercritical conditions. This study shows how the addition of small quantity of N₂ helps in generating the CO₂ foam and performance of the CO₂/N₂ mixture foam in enhanced oil recovery. To investigate the performance of CO₂/N₂ foam, core-flooding experiments were conducted at elevated pressure and temperature condition (higher than supercritical CO₂ - 50°C and 1500 psi) in sandstone cores. Fluorosurfactant (FS-51) was used as a foaming agent, and n-decane was used as model oil in all the experiments. The selection of foam quality and N₂ fraction was optimized based on foam generation and stability tests. Every gas or foam flooding was preceded by seawater injection to simulate the behavior in the reservoir. The results from the core-flood experiments showed that the CO₂ and CO₂/N₂ foam flooding recovered an additional 34-40% of Original Initial Oil in Place (OIIP) indicating that foam flooding succeeded in producing more oil than pure CO₂ gas injection processes. Additionally, the performance CO₂/N₂ foam injection was better than CO₂ foam injection.Keywords: CO₂/N₂ foam, enhanced oil recovery (EOR), supercritical CO₂, sweep efficiency
Procedia PDF Downloads 27628724 Surface-Quenching Induced Cell Opening Technique in Extrusion of Thermoplastic Foamed Sheets
Authors: Abhishek Gandhi, Naresh Bhatnagar
Abstract:
In this article, a new technique has been developed to manufacture open cell extruded thermoplastic foamed sheets with the aid of extrudate surface-quenching phenomenon. As the extrudate foam exits the die, its surface is rapidly quenched which results in freezing of cells on the surface, while the cells at the core continue to grow and leads to development of open-cellular microstructure at the core. Influence of chill roll temperature was found to be extremely significant in developing porous morphological attributes. Subsequently, synergistic effect of blowing agent content and chill roll temperature was examined for their expansion ratio and open-cell microstructure. Further, chill roll rotating speed was found extremely significant in obtaining open-cellular foam structures. This study intends to enhance the understanding of researchers working in the area of open-cell foam processing.Keywords: foams, porous materials, morphology, composite, microscopy, open-cell foams
Procedia PDF Downloads 44828723 Spatial Analysis for Wind Risk Index Assessment
Authors: Ljiljana Seric, Vladimir Divic, Marin Bugaric
Abstract:
This paper presents methodology for spatial analysis of GIS data that is used for assessing the microlocation risk index from potential damages of high winds. The analysis is performed on freely available GIS data comprising information about wind load, terrain cover and topography of the area. The methodology utilizes the legislation of Eurocode norms for determination of wind load of buildings and constructions. The core of the methodology is adoption of the wind load parameters related to location on geographical spatial grid. Presented work is a part of the Wind Risk Project, supported by the European Commission under the Civil Protection Financial Instrument of the European Union (ECHO). The partners involved in Wind Risk project performed Wind Risk assessment and proposed action plan for three European countries – Slovenia, Croatia and Germany. The proposed method is implemented in GRASS GIS open source GIS software and demonstrated for Case study area of wider area of Split, Croatia. Obtained Wind Risk Index is visualized and correlated with critical infrastructures like buildings, roads and power lines. The results show good correlation between high Wind Risk Index with recent incidents related to wind.Keywords: Eurocode norms, GIS, spatial analysis, wind distribution, wind risk
Procedia PDF Downloads 31628722 The Development of Student Core Competencies through the STEM Education Opportunities in Classroom
Authors: Z. Dedovets, M. Rodionov
Abstract:
The goal of the modern education system is to prepare students to be able to adapt to ever-changing life situations. They must be able to acquire required knowledge independently; apply such knowledge in practice to solve various problems by using modern technologies; think critically and creatively; competently use information; be communicative, work in a team; and develop their own moral values, intellect and cultural awareness. As a result, the status of education significantly increases; new requirements to its quality have been formed. In recent years, the competency-based approach in education has become of significant interest. This approach is a strengthening of applied and practical characteristics of a school education and leads to the forming of the key students’ competencies which define their success in future life. In this article, the authors’ attention focuses on a range of key competencies, educational, informational and communicative and on the possibility to develop such competencies via STEM education. This research shows the change in students’ attitude towards scientific disciplines such as mathematics, general science, technology and engineering as a result of STEM education. Two-staged analyzes questionnaires completed by students of forms II to IV in the republic of Trinidad and Tobago allowed the authors to categorize students between two levels that represent students’ attitude to various disciplines. The significance of differences between selected levels was confirmed with the use of Pearsons’ chi-squared test. In summary, the analysis of obtained data makes it possible to conclude that STEM education has a great potential for development of core students’ competencies and encourages the development of positive student attitude towards the above mentioned above scientific disciplines.Keywords: STEM, science, technology, engineering, mathematics, students’ competency, Pearson's chi-squared test
Procedia PDF Downloads 38628721 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment
Authors: Atma Sahu
Abstract:
After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems
Procedia PDF Downloads 9528720 Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications
Authors: Robyn White, Juan Bornman, Ensa Johnson
Abstract:
People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system.Keywords: augmentative and alternative communication, person with little or no functional speech, sexual crimes, testifying in court, victim of crime, witness competency
Procedia PDF Downloads 48028719 Investigating Dynamic Transition Process of Issues Using Unstructured Text Analysis
Authors: Myungsu Lim, William Xiu Shun Wong, Yoonjin Hyun, Chen Liu, Seongi Choi, Dasom Kim, Namgyu Kim
Abstract:
The amount of real-time data generated through various mass media has been increasing rapidly. In this study, we had performed topic analysis by using the unstructured text data that is distributed through news article. As one of the most prevalent applications of topic analysis, the issue tracking technique investigates the changes of the social issues that identified through topic analysis. Currently, traditional issue tracking is conducted by identifying the main topics of documents that cover an entire period at the same time and analyzing the occurrence of each topic by the period of occurrence. However, this traditional issue tracking approach has limitation that it cannot discover dynamic mutation process of complex social issues. The purpose of this study is to overcome the limitations of the existing issue tracking method. We first derived core issues of each period, and then discover the dynamic mutation process of various issues. In this study, we further analyze the mutation process from the perspective of the issues categories, in order to figure out the pattern of issue flow, including the frequency and reliability of the pattern. In other words, this study allows us to understand the components of the complex issues by tracking the dynamic history of issues. This methodology can facilitate a clearer understanding of complex social phenomena by providing mutation history and related category information of the phenomena.Keywords: Data Mining, Issue Tracking, Text Mining, topic Analysis, topic Detection, Trend Detection
Procedia PDF Downloads 40828718 Research on Community-Based Engineering Learning and Undergraduate Students’ Creativity in China: The Moderate Effect of Engineering Identity
Authors: Liang Wang, Wei Zhang
Abstract:
There have been some existing researches on design-based engineering learning (DBEL) and project-based or problem-based engineering learning (PBEL). Those findings have greatly promoted the reform of engineering education in China. However, the engineering with a big E means that more and more engineering activities are designed and operated by communities of practice (CoPs), namely community-based engineering learning. However, whether community-based engineering learning can promote students' innovation has not been verified in published articles. This study fills this gap by investigating the relationship between community-based learning approach and students’ creativity, using engineering identity as an intermediary variable. The goal of this study is to discover the core features of community-based engineering learning, and make the features more beneficial for students’ creativity. The study created and adapted open survey items from previously published studies and a scale on learning community, students’ creativity and engineering identity. Firstly, qualitative content analysis methods by MAXQDA were used to analyze 32 open-ended questionnaires. Then the authors collected data (n=322) from undergraduate students in engineering competition teams and engineering laboratories in Zhejiang University, and structural equation modelling (SEM) was used to understand the relationship between different factors. The study finds: (a) community-based engineering learning has four main elements like real-task context, self-inquiry learning, deeply-consulted cooperation and circularly-iterated design, (b) community-based engineering learning can significantly enhance the engineering undergraduate students’ creativity, and (c) engineering identity partially moderated the relationship between community-based engineering learning and undergraduate students' creativity. The findings further illustrate the value of community-based engineering learning for undergraduate students. In the future research, the authors should further clarify the core mechanism of community-based engineering learning, and pay attention to the cultivation of undergraduate students’ engineer identity in learning community.Keywords: community-based engineering learning, students' creativity, engineering identity, moderate effect
Procedia PDF Downloads 14528717 Numerical Investigation of Poling Vector Angle on Adaptive Sandwich Plate Deflection
Authors: Alireza Pouladkhan, Mohammad Yavari Foroushani, Ali Mortazavi
Abstract:
This paper presents a finite element model for a sandwich plate containing a piezoelectric core. A sandwich plate with a piezoelectric core is constructed using the shear mode of piezoelectric materials. The orientation of poling vector has a significant effect on deflection and stress induced in the piezo-actuated adaptive sandwich plate. In the present study, the influence of this factor for a clamped-clamped-free-free and simple-simple-free-free square sandwich plate is investigated using Finite Element Method. The study uses ABAQUS (v.6.7) software to derive the finite element model of the sandwich plate. By using this model, the study gives the influences of the poling vector angle on the response of the smart structure and determines the maximum transverse displacement and maximum stress induced.Keywords: finite element method, sandwich plate, poling vector, piezoelectric materials, smart structure, electric enthalpy
Procedia PDF Downloads 23328716 A Psychoanalytic Lens: Unmasked Layers of the Self among Post-Graduate Psychology Students in Surviving the COVID-19 Lockdown
Authors: Sharon Sibanda, Benny Motileng
Abstract:
The World Health Organisation (WHO) identified the Sars-Cov-2 (COVID-19) as a pandemic on the 12ᵗʰ of March 2020, with South Africa recording its first case on the 5ᵗʰ of March 2020. The rapidly spreading virus led the South African government to implement one of the strictest nationwide lockdowns globally, resulting in the closing down of all institutions of higher learning effective March 18ᵗʰ 2020. Thus, this qualitative study primarily aimed to explore whether post-graduate psychology students were in a state of a depleted or cohesive self, post the psychological isolation of COVID-19 risk-adjusted level 5 lockdown. Semi-structured interviews from a qualitative interpretive approach comprising N=6 psychology post-graduate students facilitated a rich understanding of their intra-psychic experiences of the self. Thematic analysis of data gathered from the interviews illuminated how students were forced into the self by the emotional isolation of hard lockdown, with the emergence of core psychic conflict often defended against through external self-object experiences. The findings also suggest that lockdown stripped off this sample of psychology post-graduate students’ defensive escape from the inner self through external self-object distractions. The external self was stripped to the core of the internal self by the isolation of hard lockdown, thereby uncovering the psychic function of roles and defenses amalgamated throughout modern cultural consciousness that dictates self-functioning. The study suggests modelling reflexivity skills in the integration of internal and external self-experience dynamics as part of a training model for continued personal and professional development for psychology students.Keywords: COVID-19, fragmentation, self-object experience, true/false self
Procedia PDF Downloads 5828715 Sexual and Gender Based Crimes in International Criminal Law: Moving Forwards or Backwards
Authors: Khadija Ali
Abstract:
Prosecution of sexual violence in international criminal law requires not only an understanding of the mechanisms employed to prosecute sexual violence but also a critical analysis of the factors facilitating perpetuation of such crimes in armed conflicts. The extrapolations laid out in this essay delve into the jurisprudence of international criminal law pertaining to sexual and gender based violence followed by the core question of this essay: Has the entrenchment of sexual violence as international crimes in the Rome Statute been successful to address such violence in armed conflicts?Keywords: conflict, gender, international criminal law, sexual violence
Procedia PDF Downloads 57228714 Integrating Deterministic and Probabilistic Safety Assessment to Decrease Risk & Energy Consumption in a Typical PWR
Authors: Ebrahim Ghanbari, Mohammad Reza Nematollahi
Abstract:
Integrating deterministic and probabilistic safety assessment (IDPSA) is one of the most commonly used issues in the field of safety analysis of power plant accident. It has also been recognized today that the role of human error in creating these accidents is not less than systemic errors, so the human interference and system errors in fault and event sequences are necessary. The integration of these analytical topics will be reflected in the frequency of core damage and also the study of the use of water resources in an accident such as the loss of all electrical power of the plant. In this regard, the SBO accident was simulated for the pressurized water reactor in the deterministic analysis issue, and by analyzing the operator's behavior in controlling the accident, the results of the combination of deterministic and probabilistic assessment were identified. The results showed that the best performance of the plant operator would reduce the risk of an accident by 10%, as well as a decrease of 6.82 liters/second of the water sources of the plant.Keywords: IDPSA, human error, SBO, risk
Procedia PDF Downloads 12928713 Core-Shell Structured Magnetic Nanoparticles for Efficient Hyperthermia Cancer Treatment
Authors: M. R. Phadatare, J. V. Meshram, S. H. Pawar
Abstract:
Conversion of electromagnetic energy into heat by nanoparticles (NPs) has the potential to be a powerful, non-invasive technique for biomedical applications such as magnetic fluid hyperthermia, drug release, disease treatment and remote control of single cell functions, but poor conversion efficiencies have hindered practical applications so far. In this paper, an attempt has been made to increase the efficiency of magnetic, thermal induction by NPs. To increase the efficiency of magnetic, thermal induction by NPs, one can take advantage of the exchange coupling between a magnetically hard core and magnetically soft shell to tune the magnetic properties of the NP and maximize the specific absorption rate, which is the gauge of conversion efficiency. In order to examine the tunability of magnetocrystalline anisotropy and its magnetic heating power, a representative magnetically hard material (CoFe₂O₄) has been coupled to a soft material (Ni₀.₅Zn₀.₅Fe₂O₄). The synthesized NPs show specific absorption rates that are of an order of magnitude larger than the conventional one.Keywords: magnetic nanoparticles, surface functionalization of magnetic nanoparticles, magnetic fluid hyperthermia, specific absorption rate
Procedia PDF Downloads 32028712 Numerical Analysis of Laminar Reflux Condensation from Gas-Vapour Mixtures in Vertical Parallel Plate Channels
Authors: Foad Hassaninejadafarahani, Scott Ormiston
Abstract:
Reflux condensation occurs in a vertical channels and tubes when there is an upward core flow of vapor (or gas-vapor mixture) and a downward flow of the liquid film. The understanding of this condensation configuration is crucial in the design of reflux condensers, distillation columns, and in loss-of-coolant safety analyses in nuclear power plant steam generators. The unique feature of this flow is the upward flow of the vapor-gas mixture (or pure vapor) that retards the liquid flow via shear at the liquid-mixture interface. The present model solves the full, elliptic governing equations in both the film and the gas-vapor core flow. The computational mesh is non-orthogonal and adapts dynamically the phase interface, thus produces sharp and accurate interface. Shear forces and heat and mass transfer at the interface are accounted for fundamentally. This modeling is a big step ahead of current capabilities by removing the limitations of previous reflux condensation models which inherently cannot account for the detailed local balances of shear, mass, and heat transfer at the interface. Discretisation has been done based on a finite volume method and a co-located variable storage scheme. An in-house computer code was developed to implement the numerical solution scheme. Detailed results are presented for laminar reflux condensation from steam-air mixtures flowing in vertical parallel plate channels. The results include velocity and pressure profiles, as well as axial variations of film thickness, Nusselt number and interface gas mass fraction.Keywords: Reflux, Condensation, CFD-Two Phase, Nusselt number
Procedia PDF Downloads 36328711 Functional Neural Network for Decision Processing: A Racing Network of Programmable Neurons Where the Operating Model Is the Network Itself
Authors: Frederic Jumelle, Kelvin So, Didan Deng
Abstract:
In this paper, we are introducing a model of artificial general intelligence (AGI), the functional neural network (FNN), for modeling human decision-making processes. The FNN is composed of multiple artificial mirror neurons (AMN) racing in the network. Each AMN has a similar structure programmed independently by the users and composed of an intention wheel, a motor core, and a sensory core racing at a specific velocity. The mathematics of the node’s formulation and the racing mechanism of multiple nodes in the network will be discussed, and the group decision process with fuzzy logic and the transformation of these conceptual methods into practical methods of simulation and in operations will be developed. Eventually, we will describe some possible future research directions in the fields of finance, education, and medicine, including the opportunity to design an intelligent learning agent with application in AGI. We believe that FNN has a promising potential to transform the way we can compute decision-making and lead to a new generation of AI chips for seamless human-machine interactions (HMI).Keywords: neural computing, human machine interation, artificial general intelligence, decision processing
Procedia PDF Downloads 12528710 Bioinformatics Identification of Rare Codon Clusters in Proteins Structure of HBV
Authors: Abdorrasoul Malekpour, Mohammad Ghorbani Mojtaba Mortazavi, Mohammadreza Fattahi, Mohammad Hassan Meshkibaf, Ali Fakhrzad, Saeid Salehi, Saeideh Zahedi, Amir Ahmadimoghaddam, Parviz Farzadnia Dr., Mohammadreza Hajyani Asl Bs
Abstract:
Hepatitis B as an infectious disease has eight main genotypes (A–H). The aim of this study is to Bioinformatically identify Rare Codon Clusters (RCC) in proteins structure of HBV. For detection of protein family accession numbers (Pfam) of HBV proteins; used of uni-prot database and Pfam search tool were used. Obtained Pfam IDs were analyzed in Sherlocc program and RCCs in HBV proteins were detected. In further, the structures of TrEMBL entries proteins studied in PDB database and 3D structures of the HBV proteins and locations of RCCs were visualized and studied using Swiss PDB Viewer software. Pfam search tool have found nine significant hits and 0 insignificant hits in 3 frames. Results of Pfams studied in the Sherlocc program show this program not identified RCCs in the external core antigen (PF08290) and truncated HBeAg protein (PF08290). By contrast the RCCs become identified in Hepatitis core antigen (PF00906) Large envelope protein S (PF00695), X protein (PF00739), DNA polymerase (viral) N-terminal domain (PF00242) and Protein P (Pf00336). In HBV genome, seven RCC identified that found in hepatitis core antigen, large envelope protein S and DNA polymerase proteins and proteins structures of TrEMBL entries sequences that reported in Sherlocc program outputs are not complete. Based on situation of RCC in structure of HBV proteins, it suggested those RCCs are important in HBV life cycle. We hoped that this study provide a new and deep perspective in protein research and drug design for treatment of HBV.Keywords: rare codon clusters, hepatitis B virus, bioinformatic study, infectious disease
Procedia PDF Downloads 48828709 Jurrasic Deposit Ichnofossil Study of Cores from Bintuni Basin, Eastern Indonesia
Authors: Aswan Aswan
Abstract:
Ichnofossils were examined based on two wells cores of Jurassic sediment from Bintuni Basin, West Papua, Indonesia. The cores are the Jurassic interval and known as the potential reservoir interval in this area. Representative of 18 ichnogenera was recorded including forms assigned to Arenicolites, Asterosoma, Bergaueria, Chondrites, cryptic bioturbation, Glossifungites, Lockeia, Ophiomorpha, Palaeophycus, Phycosiphon, Planolites, Rhizocorallium, Rosselia, root structure, Skolithos, Teichicnus, Thalassinoides, and Zoophycos. The two cores represent a depositional system that is dominated by tidal flat, shallow marine shelf continuum possibly crossed by estuaries or tidal shoals channels. From the first core identified two deepening cycles. The shallow one is a shallow marine with tidal influence while the deeper one attached to the shelf. Shallow interval usually indicates by appearances of Ophiomorpha and Glossifungites while the deeper shallow marine interval signs by the abundance of Phycosiphon. The second core reveals eight deepening cycles.Keywords: ichnofossil, Jurassic, sediment, reservoir, Bintuni, Indonesia, West Papua
Procedia PDF Downloads 36228708 Seepage Analysis through Earth Dam Embankment: Case Study of Batu Dam
Authors: Larifah Mohd Sidik, Anuar Kasa
Abstract:
In recent years, the demands for raw water are increasing along with the growth of the economy and population. Hence, the need for the construction and operation of dams is one of the solutions for the management of water resources problems. The stability of the embankment should be taken into consideration to evaluate the safety of retaining water. The safety of the dam is mostly based on numerous measurable components, for instance, seepage flowrate, pore water pressure and deformation of the embankment. Seepage and slope stability is the primary and most important reason to ascertain the overall safety behavior of the dams. This research study was conducted to evaluate static condition seepage and slope stability performances of Batu dam which is located in Kuala Lumpur capital city. The numerical solution Geostudio-2012 software was employed to analyse the seepage using finite element method, SEEP/W and slope stability using limit equilibrium method, SLOPE/W for three different cases of reservoir level operations; normal and flooded condition. Results of seepage analysis using SEEP/W were utilized as parental input for the analysis of SLOPE/W. Sensitivity analysis on hydraulic conductivity of material was done and calibrated to minimize the relative error of simulation SEEP/W, where the comparison observed field data and predicted value were also carried out. In seepage analysis, such as leakage flow rate, pore water distribution and location of a phreatic line are determined using the SEEP/W. The result of seepage analysis shows the clay core effectively lowered the phreatic surface and no piping failure is shown in the result. Hence, the total seepage flux was acceptable and within the permissible limit.Keywords: earth dam, dam safety, seepage, slope stability, pore water pressure
Procedia PDF Downloads 21928707 UNIX Source Code Leak: Evaluation and Feasible Solutions
Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar
Abstract:
Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.Keywords: data transmission, Linux, source code, operating system
Procedia PDF Downloads 27028706 Deregulation of Thorium for Room Temperature Superconductivity
Authors: Dong Zhao
Abstract:
Abstract—Extensive research on obtaining applicable room temperature superconductors meets the major barrier, and the record Tc of 135 K achieved via cuprate has been idling for decades. Even though, the accomplishment of higher Tc than the cuprate was made through pressurizing certain compounds composed of light elements, such as for the LaH10 and for the metallic hydrogen. Room temperature superconductivity under ambient pressure is still the preferred approach and is believed to be the ultimate solution for many applications. While racing to find the breakthrough method to achieve this room temperature Tc milestone in superconducting research, a report stated a discovery of a possible high-temperature superconductor, i.e., the thorium sulfide ThS. Apparently, ThS’s Tc can be at room temperature or even higher. This is because ThS revealed an unusual property of the ‘coexistence of high electrical conductivity and diamagnetism’. Noticed that this property of coexistence of high electrical conductivity and diamagnetism is in line with superconductors, meaning ThS is also at its superconducting state. Surprisingly, ThS owns the property of superconductivity at least at room temperature and under atmosphere pressure. Further study of the ThS’s electrical and magnetic properties in comparison with thorium di-iodide ThI2 concluded its molecular configuration as [Th4+(e-)2]S. This means the ThS’s cation is composed of a [Th4+(e-)2]2+ cation core. It is noticed that this cation core is built by an oxidation state +4 of thorium atom plus an electron pair on this thorium atom that resulted in an oxidation state +2 of this [Th4+(e-)2]2+ cation core. This special construction of [Th4+(e-)2]2+ cation core may lead to the ThS’s room temperature superconductivity because of this characteristic electron lone pair residing on the thorium atom. Since the study of thorium chemistry was carried out in the period of before 1970s. the exploration about ThS’s possible room temperature superconductivity would require resynthesizing ThS. This re-preparation of ThS will provide the sample and enable professionals to verify the ThS’s room temperature superconductivity. Regrettably, the current regulation prevents almost everyone from getting access to thorium metal or thorium compounds due to the radioactive nature of thorium-232 (Th-232), even though the radioactive level of Th-232 is extremely low with its half-life of 14.05 billion years. Consequently, further confirmation of ThS’s high-temperature superconductivity through experiments will be impossible unless the use of corresponding thorium metal and related thorium compounds can be deregulated. This deregulation would allow researchers to obtain the necessary starting materials for the study of ThS. Hopefully, the confirmation of ThS’s room temperature superconductivity can not only establish a method to obtain applicable superconductors but also to pave the way for fully understanding the mechanism of superconductivity.Keywords: co-existence of high electrical conductivity and diamagnetism, electron pairing and electron lone pair, room temperature superconductivity, the special molecular configuration of thorium sulfide ThS
Procedia PDF Downloads 4928705 Leadership Strategies in Social Enterprises through Reverse Accountability: Analysis of Social Control for Pragmatic Organizational Design
Authors: Ananya Rajagopal
Abstract:
The study is based on an analysis of qualitative data used to analyze the business performance of entrepreneurs in emerging markets based on core variables such as collective leadership in reference to social entrepreneurship and reverse accountability attributes of stakeholders. In-depth interviews were conducted with 25 emerging enterprises within Mexico across five industrial segments. The study has been conducted focusing on five major research questions, which helped in developing the grounded theory related to reverser accountability. The results of the study revealed that the traditional entrepreneurship model based on an individualistic leadership style is being replaced by a collective leadership model. The study focuses on the leadership styles within social enterprises aimed at enhancing managerial capabilities and competencies, stakeholder values, and entrepreneurial growth. The theoretical motivation of this study has been derived from stakeholder theory and agency theory.Keywords: reverse accountability, social enterprises, collective leadership, grounded theory, social governance
Procedia PDF Downloads 12128704 A User-Friendly Approach for Design and Economic Analysis of Standalone PV System for the Electrification of Rural Area of Eritrea
Authors: Tedros Asefaw Gebremeskel, Xaoyi Yang
Abstract:
The potential of solar energy in Eritrea is relatively high, based on this truth, there are a number of isolated and remote villages situated far away from the electrical national grid which don’t get access to electricity. The core objective of this work is to design a most favorable and cost-effective power by means of standalone PV system for the electrification of a single housing in the inaccessible area of Eritrea. The sizing of the recommended PV system is achieved, such as radiation data and electrical load for the typical household of the selected site is also well thought-out in the design steps. Finally, the life cycle cost (LCC) analysis is conducted to evaluate the economic viability of the system. The outcome of the study promote the use of PV system for a residential building and show that PV system is a reasonable option to provide electricity for household applications in the rural area of Eritrea.Keywords: electrification, inaccessible area, life cycle cost, residential building, stand-alone PV system
Procedia PDF Downloads 14328703 Analysis of Genomics Big Data in Cloud Computing Using Fuzzy Logic
Authors: Mohammad Vahed, Ana Sadeghitohidi, Majid Vahed, Hiroki Takahashi
Abstract:
In the genomics field, the huge amounts of data have produced by the next-generation sequencers (NGS). Data volumes are very rapidly growing, as it is postulated that more than one billion bases will be produced per year in 2020. The growth rate of produced data is much faster than Moore's law in computer technology. This makes it more difficult to deal with genomics data, such as storing data, searching information, and finding the hidden information. It is required to develop the analysis platform for genomics big data. Cloud computing newly developed enables us to deal with big data more efficiently. Hadoop is one of the frameworks distributed computing and relies upon the core of a Big Data as a Service (BDaaS). Although many services have adopted this technology, e.g. amazon, there are a few applications in the biology field. Here, we propose a new algorithm to more efficiently deal with the genomics big data, e.g. sequencing data. Our algorithm consists of two parts: First is that BDaaS is applied for handling the data more efficiently. Second is that the hybrid method of MapReduce and Fuzzy logic is applied for data processing. This step can be parallelized in implementation. Our algorithm has great potential in computational analysis of genomics big data, e.g. de novo genome assembly and sequence similarity search. We will discuss our algorithm and its feasibility.Keywords: big data, fuzzy logic, MapReduce, Hadoop, cloud computing
Procedia PDF Downloads 29928702 Ethics Can Enable Open Source Data Research
Authors: Dragana Calic
Abstract:
The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions
Procedia PDF Downloads 28428701 A Preliminary Comparative Study Between the United Kingdom and Taiwan: Public Private Collaboration and Cooperation in Tackling Large Scale Cyberattacks
Authors: Chi-Hsuan Cheng
Abstract:
This research aims to evaluate public-private partnerships against cyberattacks by comparing the UK and Taiwan. First, the study analyses major cyberattacks and factors influencing cybersecurity in both countries. Second, it assesses the effectiveness of current cyber defence strategies in combating cyberattacks by comparing the approaches taken in the UK and Taiwan, while also evaluating the cyber resilience of both nations. Lastly, the research evaluates existing public-private partnerships by comparing those in the UK and Taiwan, and proposes recommendations for enhancing cooperation and collaboration mechanisms in tackling cyberattacks. Grounded theory serves as the core research method. Theoretical sampling is used to recruit participants in both the UK and Taiwan, including investigators, police officers, and professionals from cybersecurity firms. Semi-structured interviews are conducted in English in the UK and Mandarin in Taiwan, recorded with consent, and pseudonymised for privacy. Data analysis involves open coding, grouping excerpts into codes, and categorising codes. Axial coding connects codes into categories, leading to the development of a codebook. The process continues iteratively until theoretical saturation is reached. Finally, selective coding identifies the core topic, evaluating public-private cooperation against cyberattacks and its implications for social and policing strategies in the UK and Taiwan, which highlights the current status of the cybersecurity industry, governmental plans for cybersecurity, and contributions to cybersecurity from both government sectors and cybersecurity firms, with a particular focus on public-private partnerships. In summary, this research aims to offer practical recommendations to law enforcement, private sectors, and academia for reflecting on current strategies and tailoring future approaches in cybersecurityKeywords: cybersecurity, cybercrime, public private partnerships, cyberattack
Procedia PDF Downloads 7528700 Thermodynamic Analyses of Information Dissipation along the Passive Dendritic Trees and Active Action Potential
Authors: Bahar Hazal Yalçınkaya, Bayram Yılmaz, Mustafa Özilgen
Abstract:
Brain information transmission in the neuronal network occurs in the form of electrical signals. Neural work transmits information between the neurons or neurons and target cells by moving charged particles in a voltage field; a fraction of the energy utilized in this process is dissipated via entropy generation. Exergy loss and entropy generation models demonstrate the inefficiencies of the communication along the dendritic trees. In this study, neurons of 4 different animals were analyzed with one dimensional cable model with N=6 identical dendritic trees and M=3 order of symmetrical branching. Each branch symmetrically bifurcates in accordance with the 3/2 power law in an infinitely long cylinder with the usual core conductor assumptions, where membrane potential is conserved in the core conductor at all branching points. In the model, exergy loss and entropy generation rates are calculated for each branch of equivalent cylinders of electrotonic length (L) ranging from 0.1 to 1.5 for four different dendritic branches, input branch (BI), and sister branch (BS) and two cousin branches (BC-1 & BC-2). Thermodynamic analysis with the data coming from two different cat motoneuron studies show that in both experiments nearly the same amount of exergy is lost while generating nearly the same amount of entropy. Guinea pig vagal motoneuron loses twofold more exergy compared to the cat models and the squid exergy loss and entropy generation were nearly tenfold compared to the guinea pig vagal motoneuron model. Thermodynamic analysis show that the dissipated energy in the dendritic tress is directly proportional with the electrotonic length, exergy loss and entropy generation. Entropy generation and exergy loss show variability not only between the vertebrate and invertebrates but also within the same class. Concurrently, single action potential Na+ ion load, metabolic energy utilization and its thermodynamic aspect contributed for squid giant axon and mammalian motoneuron model. Energy demand is supplied to the neurons in the form of Adenosine triphosphate (ATP). Exergy destruction and entropy generation upon ATP hydrolysis are calculated. ATP utilization, exergy destruction and entropy generation showed differences in each model depending on the variations in the ion transport along the channels.Keywords: ATP utilization, entropy generation, exergy loss, neuronal information transmittance
Procedia PDF Downloads 39328699 Industrial Ecology Perspectives of Food Supply Chains: A Framework of Analysis
Authors: Luciano Batista, Sylvia Saes, Nuno Fouto, Liam Fassam
Abstract:
This paper introduces the theoretical and methodological basis of an analytical framework conceived with the purpose of bringing industrial ecology perspectives into the core of the underlying disciplines supporting analyses in studies concerned with environmental sustainability aspects beyond the product cycle in a supply chain. Given the pressing challenges faced by the food sector, the framework focuses upon waste minimization through industrial linkages in food supply chains. The combination of industrial ecology practice with basic LCA elements, the waste hierarchy model, and the spatial scale of industrial symbiosis allows the standardization of qualitative analyses and associated outcomes. Such standardization enables comparative analysis not only between different stages of a supply chain, but also between different supply chains. The analytical approach proposed contributes more coherently to the wider circular economy aspiration of optimizing the flow of goods to get the most out of raw materials and cuts wastes to a minimum.Keywords: by-product synergy, food supply chain, industrial ecology, industrial symbiosis
Procedia PDF Downloads 42028698 Studies on Distribution of the Doped Pr3+ Ions in the LaF3 Based Transparent Oxyfluoride Glass-Ceramic
Authors: Biswajit Pal, Amit Mallik, Anil K. Barik
Abstract:
Current years have witnessed a phenomenal growth in the research on the rare earth-doped transparent host materials, the essential components in optoelectronics that meet up the increasing demand for fabrication of high quality optical devices especially in telecommunication system. The combination of low phonon energy (because of fluoride environment) and high chemical durability with superior mechanical stability (due to oxide environment) makes the oxyfluoride glass–ceramics the promising and useful materials in optoelectronics. The present work reports on the undoped and doped (1 mol% Pr2O3) glass ceramics of composition 16.52 Al2O3•1.5AlF3• 12.65LaF3•4.33Na2O•64.85 SiO2 (mol%), prepared by melting technique initially that follows annealation at 450 ºC for 1 h. The glass samples so obtained were heat treated at constant 600 ºC with a variation in heat treatment schedule (10- 80 h). TEM techniques were employed to structurally characterize the glass samples. Pr2O3 affects the phase separation in the glass and delays the onset of crystallization in the glass ceramic. The modified crystallization mechanism is established from the analysis of advanced STEM/EDXS results. The phase separated droplets after annealing turn into 10-20 nm of LaF3 nano crystals those upon scrutiny are found to be dotted with the doped Pr3+ ions within the crystals themselves. The EDXS results also suggest that the inner LaF3 crystal core is swallowed by an Al enriched layer that follows a Si enriched surrounding shell as the outer core. This greatly increases the viscosity in the periphery of the crystals that restricts further crystal growth to account for the formation of nano sized crystals.Keywords: advanced STEM/EDXS, crystallization mechanism, nano crystals, pr3+ ion doped glass and glass ceramic, structural characterization
Procedia PDF Downloads 18528697 Psychogeographic Analysis of Spatial Appropriation within Walking Practice: The City Centre versus University Campus in the Case of Van, Turkey
Authors: Yasemin Ilkay
Abstract:
Urban spatial pattern interacts with the minds and bodies of citizens and influences their perception and attitudes, which leads to a two-folded map of the same space: physical and Psychogeographic maps. Psychogeography is a field of inquiry (rooted in literature and fiction) investigating how the environment affects the feelings and behaviors of individuals. This term was posed by Situationist International Movement in the 1950s by Guy Debord; in the course of time, the artistic framework evolved into a political issue, especially with the term Dérive, which indicates ‘deviation’ and ‘resistance’ to the existing spatial reality. The term Dérive appeared on the track of Flânéur after one hundred years; and turned out to be a political tool to transform everyday urban life. The three main concepts of psychogeography [walking, dérive, and palimpsest] construct the epistemological framework for a psychogeographic spatial analysis. Mental representations investigating this framework would provide a designer to capture the invisible layers of the gap between ‘how a space is conceived’ and ‘how the same space is perceived and experienced.’ This gap is a neglected but critical issue to discuss in the planning discipline, and psychogeography provides methodological inputs to cover the interrelation among top-down designs of urban patterning and bottom-up reproductions of ‘the soul’ of urban space at the intersection of geography and psychology. City centers and university campuses exemplify opposite poles of spatial organization and walking practice, which may result in differentiated spatial appropriation forms. There is a traditional city center in Van, located at the core of the city with a dense population and several activities, but not connected to Van Lake, which is the largest lake in the country. On the other hand, the university campus is located at the periphery, and although it has a promenade along the lake’s coast and a regional hospital, it presents a limited walking experience with ambiguous forms of spatial appropriation. The city center draws a vivid urban everyday life; however, the campus presents a relatively natural life far away from the center. This paper aims to reveal the differentiated psychogeographic maps of spatial appropriation at the city center vs. the university campus, which is located at the periphery of the city and along the coast of the largest lake in Turkey. The main question of the paper is, “how do the psychogeographic maps of spatial appropriation differentiate at the city center and university campus in Van within the walking experience with reference to the two-folded map assumption.” The experiential maps of a core group of 15 planning students will be created with the techniques of mental mapping, photographing, and narratives through attentive walks conducted together on selected routes; in addition to these attentive walks, 30 more in-depth interviews will be conducted by the core group. The narrative of psychogeographic mapping of spatial appropriation at the two spatial poles would display the conflicting soul of the city with reference to sub-behavioural regions of walking, differentiated forms of derive and layers of palimpsest.Keywords: attentive walk, body, cognitive geography, derive, experiential maps, psychogeography, Van, Turkey
Procedia PDF Downloads 79