Search results for: embedded applications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7109

Search results for: embedded applications

6779 Molecular Dynamics Simulation for Vibration Analysis at Nanocomposite Plates

Authors: Babak Safaei, A. M. Fattahi

Abstract:

Polymer/carbon nanotube nanocomposites have a wide range of promising applications Due to their enhanced properties. In this work, free vibration analysis of single-walled carbon nanotube-reinforced composite plates is conducted in which carbon nanotubes are embedded in an amorphous polyethylene. The rule of mixture based on various types of plate model namely classical plate theory (CLPT), first-order shear deformation theory (FSDT), and higher-order shear deformation theory (HSDT) was employed to obtain fundamental frequencies of the nanocomposite plates. Generalized differential quadrature (GDQ) method was used to discretize the governing differential equations along with the simply supported and clamped boundary conditions. The material properties of the nanocomposite plates were evaluated using molecular dynamic (MD) simulation corresponding to both short-(10,10) SWCNT and long-(10,10) SWCNT composites. Then the results obtained directly from MD simulations were fitted with those calculated by the rule of mixture to extract appropriate values of carbon nanotube efficiency parameters accounting for the scale-dependent material properties. The selected numerical results are presented to address the influences of nanotube volume fraction and edge supports on the value of fundamental frequency of carbon nanotube-reinforced composite plates corresponding to both long- and short-nanotube composites.

Keywords: nanocomposites, molecular dynamics simulation, free vibration, generalized, differential quadrature (GDQ) method

Procedia PDF Downloads 306
6778 Iontophoretic Drug Transport: An Non-Invasive Transdermal Approach

Authors: Ashish Jain, Shivam Tayal

Abstract:

There has been great interest in the field of Iontophoresis since few years due to its great applications in the field of controlled transdermal drug delivery system. It is an technique which is used to enhance the transdermal permeation of ionized high molecular weight molecules across the skin membrane especially Peptides & Proteins by the application of direct current of 1-4 mA for 20-40 minutes whereas chemical must be placed on electrodes with same charge. Iontophoresis enhanced the delivery of drug into the skin via pores like hair follicles, sweat gland ducts etc. rather than through stratum corneum. It has wide applications in the field of experimental, Therapeutic, Diagnostic, Dentistry etc. Medical science is using it to treat Hyperhidrosis (Excessive sweating) in hands and feet and to treat other ailments like hypertension, Migraine etc. Nowadays commercial transdermal iontophoretic patches are available in the market to treat different ailments. Researchers are keen to research in this field due to its vast applications and advantages.

Keywords: iontophoresis, novel drug delivery, transdermal, permeation enhancer

Procedia PDF Downloads 227
6777 A Review on Applications of Evolutionary Algorithms to Reservoir Operation for Hydropower Production

Authors: Nkechi Neboh, Josiah Adeyemo, Abimbola Enitan, Oludayo Olugbara

Abstract:

Evolutionary algorithms are techniques extensively used in the planning and management of water resources and systems. It is useful in finding optimal solutions to water resources problems considering the complexities involved in the analysis. River basin management is an essential area that involves the management of upstream, river inflow and outflow including downstream aspects of a reservoir. Water as a scarce resource is needed by human and the environment for survival and its management involve a lot of complexities. Management of this scarce resource is necessary for proper distribution to competing users in a river basin. This presents a lot of complexities involving many constraints and conflicting objectives. Evolutionary algorithms are very useful in solving this kind of complex problems with ease. Evolutionary algorithms are easy to use, fast and robust with many other advantages. Many applications of evolutionary algorithms, which are population based search algorithm, are discussed. Different methodologies involved in the modeling and simulation of water management problems in river basins are explained. It was found from this work that different evolutionary algorithms are suitable for different problems. Therefore, appropriate algorithms are suggested for different methodologies and applications based on results of previous studies reviewed. It is concluded that evolutionary algorithms, with wide applications in water resources management, are viable and easy algorithms for most of the applications. The results suggested that evolutionary algorithms, applied in the right application areas, can suggest superior solutions for river basin management especially in reservoir operations, irrigation planning and management, stream flow forecasting and real-time applications. The future directions in this work are suggested. This study will assist decision makers and stakeholders on the best evolutionary algorithm to use in varied optimization issues in water resources management.

Keywords: evolutionary algorithm, multi-objective, reservoir operation, river basin management

Procedia PDF Downloads 469
6776 Carbon Nanotubes and Novel Applications for Textile

Authors: Ezgi Ismar

Abstract:

Carbon nanotubes (CNTs) are different from other allotropes of carbon, such as graphite, diamond and fullerene. Replacement of metals in flexible textiles has an advantage. Particularly in the last decade, both their electrical and mechanical properties have become an area of interest for Li-ion battery applications where the conductivity has a major importance. While carbon nanotubes are conductive, they are also less in weight compared to convectional conductive materials. Carbon nanotubes can be used inside the fiber so they can offer to create 3-D structures. In this review, you can find some examples of how carbon nanotubes adapted to textile products.

Keywords: carbon nanotubes, conductive textiles, nanotechnology, nanotextiles

Procedia PDF Downloads 356
6775 Functionalized Nanoparticles for Biomedical Applications

Authors: Temesgen Geremew

Abstract:

Functionalized nanoparticles have emerged as a revolutionary class of materials with immense potential in various biomedical applications. These engineered nanoparticles possess unique properties tailored to interact with biological systems, offering unprecedented opportunities in drug delivery, imaging, diagnostics, and therapy. This research delves into the design, synthesis, and characterization of functionalized nanoparticles for targeted biomedical applications. The primary focus lies on developing nanoparticles with precisely controlled size, surface chemistry, and biocompatibility for specific medical purposes. The research will also explore the crucial interaction of these nanoparticles with biological systems, encompassing cellular uptake, biodistribution, and potential toxicity evaluation. The successful development of functionalized nanoparticles holds the promise to revolutionize various aspects of healthcare. This research aspires to contribute significantly to this advancement by providing valuable insights into the design and application of these versatile materials within the ever-evolving field of biomedicine.

Keywords: nanoparticles, biomedicals, cancer, biocompatibility

Procedia PDF Downloads 42
6774 Technological Applications in Automobile Manufacturing Sector - A Case Study Analysis

Authors: Raja Kannusamy

Abstract:

The research focuses on the applicable technologies in the automobile industry and their effects on the productivity and annual revenue of the industry. A study has been conducted on 6 major automobile manufacturing industries represented in this research as M1, M2, M3, M4, M5 and M6. The results indicate that M1, which is a pioneer in technological applications, remains the market leader, followed by M5 & M2 taking the second and third positions, respectively. M3, M6 and M4 are the followers and are placed next in positions. It has also been observed that M1 and M2 have entered into an agreement to share the basic structural technologies and they maintain long-term and trusted relationships with their suppliers through the Keiretsu system. With technological giants such as Apple, Microsoft, Uber and Google entering the automobile industry in recent years, an upward trend is expected in the futuristic market with self-driving cars to dominate the automobile sector. To keep up with the market trend, it is essential for automobile manufacturers to understand the importance of developing technological capabilities and skills to be competitive in the marketplace.

Keywords: automobile manufacturing industries, competitiveness, performance improvement, technological applications

Procedia PDF Downloads 157
6773 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage

Authors: P. Jayashree, S. Rajkumar

Abstract:

With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.

Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding

Procedia PDF Downloads 269
6772 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 119
6771 Multiple Institutional Logics and the Ability of Institutional Entrepreneurs: An Analysis in the Turkish Education Field

Authors: Miraç Savaş Turhan, Ali Danişman

Abstract:

Recently scholars of new institutional theory have used institutional logics perspective to explain the contradictory practices in modern western societies. Accordingly, distinct institutional logics are embedded in central institutions such as the market, state, democracy, family, and religion. They guide individual and organizational actors and constraint their behaviors in a particular organizational field. Through this perspective, actors are assumed to have a situated, embedded, boundedly intentional, and adaptive role against the structure in social, cultural and political context. On the other hand, over a decade, there is an emerging attempt focusing on the role of actors on creating, maintaining, and changing the institutions. Such attempts brought out the concept of institutional entrepreneurs to explain the role of individual actors in relation to institutions. Institutional entrepreneurs are individuals, groups of individuals, organizations or groups of organizations that are able to initiate some actions to build, maintain or change institutions. While recent studies on institutional logics perspective have attempted to explain roles of entrepreneurial actors who have resources and skills, little is known about the effects of multiple institutional logics on the ability of institutional entrepreneurs. In this study, we aim to find out that how multiple institutional logics affect the ability of institutional entrepreneurs during the process of institutional change. We examine this issue in the Turkish Education Field. While institutional logics were identified based on the previous studies in the education field, the actions taken by Turkish National Education Ministry from 2003 to 2013 was examined through content analysis The early results indicate that there are remarkable shift and contradictions in the ability of institutional entrepreneur in taking actions to change the field in relationship to balance of power shift among the carriers of institutional logics.

Keywords: institutional theory, institutional logics, institutional entrepreneurs, Turkish national education

Procedia PDF Downloads 331
6770 Depiction of a Circulated Double Psi-Shaped Microstrip Antenna for Ku-Band Satellite Applications

Authors: M. Naimur Rahman, Mohammad Tariqul Islam, Mandeep Singh Jit Singh, Norbahiah Misran

Abstract:

This paper presents the architecture and exploration of a compact, circulated double Psi-shaped microstrip patch antenna for Ku-band satellite applications. The antenna is composed of the double Psi-shaped patch in opposite focus which is circulated with a ring. The antenna size is 24 mm × 18 mm and the prototype is imprinted on Rogers RT/duroid 5880 materials with the depth of 1.57 mm. The substrate has a relative permittivity of 2.2 and the dielectric constant of 0.0009. The excitation is supplied through a 50Ω microstrip line. The performance of the presented antenna has been simulated and verified with the High-Frequency Structural Simulator (HFSS). The results depict that the antenna covers the frequency spectrum 14.6 - 17.4 GHz (Ku-band) with 10 dB return loss. The antenna has a 4.40 dBi maximum gain with stable radiation patterns throughout the operating band which makes the proposed antenna compatible for the satellite application in Ku-band.

Keywords: Ku-band antenna, microstrip antenna, psi-shaped antenna, satellite applications

Procedia PDF Downloads 281
6769 Intrusion Detection Techniques in NaaS in the Cloud: A Review

Authors: Rashid Mahmood

Abstract:

The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.

Keywords: IDS, cloud, naas, detection

Procedia PDF Downloads 299
6768 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 179
6767 FSO Performance under High Solar Irradiation: Case Study Qatar

Authors: Syed Jawad Hussain, Abir Touati, Farid Touati

Abstract:

Free-Space Optics (FSO) is a wireless technology that enables the optical transmission of data though the air. FSO is emerging as a promising alternative or complementary technology to fiber optic and wireless radio-frequency (RF) links due to its high-bandwidth, robustness to EMI, and operation in unregulated spectrum. These systems are envisioned to be an essential part of future generation heterogeneous communication networks. Despite the vibrant advantages of FSO technology and the variety of its applications, its widespread adoption has been hampered by rather disappointing link reliability for long-range links due to atmospheric turbulence-induced fading and sensitivity to detrimental climate conditions. Qatar, with modest cloud coverage, high concentrations of airborne dust and high relative humidity particularly lies in virtually rainless sunny belt with a typical daily average solar radiation exceeding 6 kWh/m2 and 80-90% clear skies throughout the year. The specific objective of this work is to study for the first time in Qatar the effect of solar irradiation on the deliverability of the FSO Link. In order to analyze the transport media, we have ported Embedded Linux kernel on Field Programmable Gate Array (FPGA) and designed a network sniffer application that can run into FPGA. We installed new FSO terminals and configure and align them successively. In the reporting period, we carry out measurement and relate them to weather conditions.

Keywords: free space optics, solar irradiation, field programmable gate array, FSO outage

Procedia PDF Downloads 342
6766 Electronic Tongue as an Innovative Non-Destructive Tool for the Quality Monitoring of Fruits

Authors: Mahdi Ghasemi-Varnamkhasti, Ayat Mohammad-Razdari, Seyedeh-Hoda Yoosefian

Abstract:

Taste is an important sensory property governing acceptance of products for administration through mouth. The advent of artificial sensorial systems as non-destructive tools able to mimic chemical senses such as those known as electronic tongue (ET) has open a variety of practical applications and new possibilities in many fields where the presence of taste is the phenomenon under control. In recent years, electronic tongue technology opened the possibility to exploit information on taste attributes of fruits providing real time information about quality and ripeness. Electronic tongue systems have received considerable attention in the field of sensor technology during the last two decade because of numerous applications in diverse fields of applied sciences. This paper deals with some facets of this technology in the quality monitoring of fruits along with more recent its applications.

Keywords: fruit, electronic tongue, non-destructive, taste machine, horticultural

Procedia PDF Downloads 238
6765 User Selections on Social Network Applications

Authors: C. C. Liang

Abstract:

MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.

Keywords: consumer behavior, social media, technology acceptance model, flow experience

Procedia PDF Downloads 333
6764 Innovation Trends in South Korea

Authors: Mario Gómez, José Carlos Rodríguez

Abstract:

This paper analyzes innovation trends in South Korea by means of the number of patent applications filed by residents and nonresidents during the period 1965 to 2012. Making use of patent data released by the World Intellectual Property Organization (WIPO), we search for the presence of multiple structural changes in patent application series in this country. These changes may suggest that firms’ innovative activity has been modified as a result of implementing some science, technology and innovation (STI) policies. Accordingly, the new regulations implemented in this country in the last decades have influenced its innovative activity. The question conducting this research is thus how STI policies in South Korea have influenced its innovation activity. The results confirm the existence of multiple structural changes in the series of patent applications resulting from alternative STI policies implemented during these years.

Keywords: econometric methods, innovation activity, Korea, patent applications, science, technology and innovation policy, STI

Procedia PDF Downloads 293
6763 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 447
6762 Influence of Convective Boundary Condition on Chemically Reacting Micropolar Fluid Flow over a Truncated Cone Embedded in Porous Medium

Authors: Pradeepa Teegala, Ramreddy Chitteti

Abstract:

This article analyzes the mixed convection flow of chemically reacting micropolar fluid over a truncated cone embedded in non-Darcy porous medium with convective boundary condition. In addition, heat generation/absorption and Joule heating effects are taken into consideration. The similarity solution does not exist for this complex fluid flow problem, and hence non-similarity transformations are used to convert the governing fluid flow equations along with related boundary conditions into a set of nondimensional partial differential equations. Many authors have been applied the spectral quasi-linearization method to solve the ordinary differential equations, but here the resulting nonlinear partial differential equations are solved for non-similarity solution by using a recently developed method called the spectral quasi-linearization method (SQLM). Comparison with previously published work on special cases of the problem is performed and found to be in excellent agreement. The effect of pertinent parameters namely, Biot number, mixed convection parameter, heat generation/absorption, Joule heating, Forchheimer number, chemical reaction, micropolar and magnetic field on physical quantities of the flow are displayed through graphs and the salient features are explored in detail. Further, the results are analyzed by comparing with two special cases, namely, vertical plate and full cone wherever possible.

Keywords: chemical reaction, convective boundary condition, joule heating, micropolar fluid, mixed convection, spectral quasi-linearization method

Procedia PDF Downloads 260
6761 An Integrated Cognitive Performance Evaluation Framework for Urban Search and Rescue Applications

Authors: Antonio D. Lee, Steven X. Jiang

Abstract:

A variety of techniques and methods are available to evaluate cognitive performance in Urban Search and Rescue (USAR) applications. However, traditional cognitive performance evaluation techniques typically incorporate either the conscious or systematic aspect, failing to take into consideration the subconscious or intuitive aspect. This leads to incomplete measures and produces ineffective designs. In order to fill the gaps in past research, this study developed a theoretical framework to facilitate the integration of situation awareness (SA) and intuitive pattern recognition (IPR) to enhance the cognitive performance representation in USAR applications. This framework provides guidance to integrate both SA and IPR in order to evaluate the cognitive performance of the USAR responders. The application of this framework will help improve the system design.

Keywords: cognitive performance, intuitive pattern recognition, situation awareness, urban search and rescue

Procedia PDF Downloads 305
6760 Advanced Mouse Cursor Control and Speech Recognition Module

Authors: Prasad Kalagura, B. Veeresh kumar

Abstract:

We constructed an interface system that would allow a similarly paralyzed user to interact with a computer with almost full functional capability. A real-time tracking algorithm is implemented based on adaptive skin detection and motion analysis. The clicking of the mouse is activated by the user's eye blinking through a sensor. The keyboard function is implemented by voice recognition kit.

Keywords: embedded ARM7 processor, mouse pointer control, voice recognition

Procedia PDF Downloads 557
6759 The Role of Mobile Applications on Consumerism Case Study: Snappfood Application

Authors: Vajihe Fasihi

Abstract:

With the advancement of technology and the expansion of the Internet, a significant change in lifestyle and consumption can be seen in societies. The increasing number of mobile applications (such as SnappFood) has expanded the scope of using apps for wider access to services to citizens and meets the needs of a large number of citizens in the shortest time and with reasonable quality. First, this article seeks to understand the concept and function of the Internet distribution network on the Iranian society, which was investigated in a smaller sample (students of the Faculty of Social Sciences of the Tehran university ) and uses the semi-structured interview method, and then explores the concept of consumerism. The main issue of this research is the effect of mobile apps, especially SnappFood, on increasing consumption and the difference between real needs and false needs among consumers. The findings of this research show that the use of the mentioned program has been effective in increasing the false needs of the sample community and has led to the phenomenon of consumerism.

Keywords: consumerism economics, false needs, mobile applications, reel needs

Procedia PDF Downloads 41
6758 Viable Use of Natural Extract Solutions from Tuberous and Cereals to Enhance the Synthesis of Activated Carbon-Graphene Composite

Authors: Pamphile Ndagijimana, Xuejiao Liu, Zhiwei Li, Yin Wang

Abstract:

Enhancing the properties of activated carbon is very imperative for various applications. Indeed, the activated carbon has promising physicochemical properties desired for a considerable number of applications. In this regard, we are proposing an enhanced and green technology for increasing the efficiency and performance of the activated carbon to various applications. The technique poses on the use of natural extracts from tuberous and cereals based-solutions. These solutions showed high potentiality to be used in the synthesis of activated carbon-graphene composite with only 3 mL. The extracted liquid from tuberous sourcing was enough to induce precipitation within a fraction of a minute in contrast to that from cereal sourced. Using these extracts, a synthesis of activated carbon-graphene composite was successful. Different characterization techniques such as XRD, SEM, FTIR, BET, and Raman spectroscopy were performed to investigate the composite materials. The results confirmed a conjugation between activated carbon and graphene material.

Keywords: activated carbon, cereals, extract solution, graphene, tuberous

Procedia PDF Downloads 120
6757 Assessment of Image Databases Used for Human Skin Detection Methods

Authors: Saleh Alshehri

Abstract:

Human skin detection is a vital step in many applications. Some of the applications are critical especially those related to security. This leverages the importance of a high-performance detection algorithm. To validate the accuracy of the algorithm, image databases are usually used. However, the suitability of these image databases is still questionable. It is suggested that the suitability can be measured mainly by the span the database covers of the color space. This research investigates the validity of three famous image databases.

Keywords: image databases, image processing, pattern recognition, neural networks

Procedia PDF Downloads 242
6756 An Empirical Approach to NO2 Gas Sensing Properties of Carbon Films Fabricated by Arc Discharge Methane Decomposition Technique

Authors: Elnaz Akbari, Zolkafle Buntat

Abstract:

Today, the use of carbon-based materials such as graphene, carbon nanotubes, etc. in various applications is being extensively studied by researchers in the field. One of such applications is using them in gas sensors. While analytical investigations on the physical and chemical properties of carbon nanomaterials are the focal points in the studies, the need for experimental measurements on various physical characteristics of these materials is deeply felt. In this work, a set of experiments has been conducted using arc discharge Methane decomposition attempting to obtain carbonaceous materials (C-strands) formed between graphite electrodes. The current-voltage (I-V) characteristics of the fabricated C-strands have been investigated in the presence and absence of two different gases, NO2 and CO2. The results reveal that the current passing through the carbon films increases when the concentrations of gases are increased from 200 to 800 ppm. This phenomenon is a result of conductance changes and can be employed in sensing applications such as gas sensors.

Keywords: carbonaceous materials, gas sensing, methane arc discharge decomposition, I-V characteristics

Procedia PDF Downloads 200
6755 On the Design of Electronic Control Unitsfor the Safety-Critical Vehicle Applications

Authors: Kyung-Jung Lee, Hyun-Sik Ahn

Abstract:

This paper suggests a design methodology for the hardware and software of the Electronic Control Unit (ECU) of safety-critical vehicle applications such as braking and steering. The architecture of the hardware is a high integrity system such that it incorporates a high performance 32-bit CPU and a separate Peripheral Control-Processor (PCP) together with an external watchdog CPU. Communication between the main CPU and the PCP is executed via a common area of RAM and events on either processor which are invoked by interrupts. Safety-related software is also implemented to provide a reliable, self-testing computing environment for safety critical and high integrity applications. The validity of the design approach is shown by using the Hardware-in-the-Loop Simulation (HILS) for Electric Power Steering (EPS) systems which consists of the EPS mechanism, the designed ECU, and monitoring tools.

Keywords: electronic control unit, electric power steering, functional safety, hardware-in-the-loop simulation

Procedia PDF Downloads 278
6754 Comparison Study of Capital Protection Risk Management Strategies: Constant Proportion Portfolio Insurance versus Volatility Target Based Investment Strategy with a Guarantee

Authors: Olga Biedova, Victoria Steblovskaya, Kai Wallbaum

Abstract:

In the current capital market environment, investors constantly face the challenge of finding a successful and stable investment mechanism. Highly volatile equity markets and extremely low bond returns bring about the demand for sophisticated yet reliable risk management strategies. Investors are looking for risk management solutions to efficiently protect their investments. This study compares a classic Constant Proportion Portfolio Insurance (CPPI) strategy to a Volatility Target portfolio insurance (VTPI). VTPI is an extension of the well-known Option Based Portfolio Insurance (OBPI) to the case where an embedded option is linked not to a pure risky asset such as e.g., S&P 500, but to a Volatility Target (VolTarget) portfolio. VolTarget strategy is a recently emerged rule-based dynamic asset allocation mechanism where the portfolio’s volatility is kept under control. As a result, a typical VTPI strategy allows higher participation rates in the market due to reduced embedded option prices. In addition, controlled volatility levels eliminate the volatility spread in option pricing, one of the frequently cited reasons for OBPI strategy fall behind CPPI. The strategies are compared within the framework of the stochastic dominance theory based on numerical simulations, rather than on the restrictive assumption of the Black-Scholes type dynamics of the underlying asset. An extended comparative quantitative analysis of performances of the above investment strategies in various market scenarios and within a range of input parameter values is presented.

Keywords: CPPI, portfolio insurance, stochastic dominance, volatility target

Procedia PDF Downloads 147
6753 Evaluating the Effectiveness of Electronic Response Systems in Technology-Oriented Classes

Authors: Ahmad Salman

Abstract:

Electronic Response Systems such as Kahoot, Poll Everywhere, and Google Classroom are gaining a lot of popularity when surveying audiences in events, meetings, and classroom. The reason is mainly because of the ease of use and the convenience these tools bring since they provide mobile applications with a simple user interface. In this paper, we present a case study on the effectiveness of using Electronic Response Systems on student participation and learning experience in a classroom. We use a polling application for class exercises in two different technology-oriented classes. We evaluate the effectiveness of the usage of the polling applications through statistical analysis of the students performance in these two classes and compare them to the performances of students who took the same classes without using the polling application for class participation. Our results show an increase in the performances of the students who used the Electronic Response System when compared to those who did not by an average of 11%.

Keywords: Interactive Learning, Classroom Technology, Electronic Response Systems, Polling Applications, Learning Evaluation

Procedia PDF Downloads 109
6752 Designing Interactive Applications for Social Anxiety Scenario Stories for Children with Autism

Authors: Wen Huei Chou, Yi-Ting Chen

Abstract:

Individuals with Autism Spectrum Disorder (ASD) often struggle with social interactions and communication. It is challenging for them to understand social cues such as facial expressions, body language, and tone of voice in social settings, leading to social conflicts and misunderstandings. Over time, feelings of frustration and anxiety can make them reluctant to engage in social situations and worsen their communication barriers. This study focused on children with autism who also experience social anxiety. Through focus group interviews with parents of children with autism and occupational therapists, it explores the reasons and scenarios behind the development of social anxiety in these children. Social scenario stories and interactive applications tailored for children with autism were designed and developed. In addition, working with the educational robots, coping strategies for various emotional situations were elaborated on, and children were helped to understand their emotions.

Keywords: autism spectrum disorder, social anxiety, robot, social scenario story, interactive applications

Procedia PDF Downloads 72
6751 Study the Effect of Sensitization on the Microstructure and Mechanical Properties of Gas Tungsten Arc Welded AISI 304 Stainless Steel Joints

Authors: Viranshu Kumar, Hitesh Arora, Pradeep Joshi

Abstract:

SS 304 is Austenitic stainless steel with Chromium and Nickel as basic constituents. It has excellent corrosion resistance properties and very good weldability. Austenitic stainless steels have superior mechanical properties at high temperatures and are used extensively in a range of applications. SS 304L has wide applications in various industries viz. Nuclear, Pharmaceutical, marine, chemical etc. due to its excellent applications and ease of joining this material has become very popular for fabrication as well as weld surfacing. Austenitic stainless steels have a tendency to form chromium depleted zones at the grain boundaries during welding and heat treatment, where chromium combines with available carbon in the vicinity of the grain boundaries, to produce an area depleted in chromium, and thus becomes susceptible to intergranular corrosion. This phenomenon is known as sensitization.

Keywords: sensitization, SS 304, GTAW, mechanical properties, carbideprecipitationHAZ, microstructure, micro hardness, tensile strength

Procedia PDF Downloads 376
6750 Discovery of Two-dimensional Hexagonal MBene HfBO

Authors: Nanxi Miao, Junjie Wang

Abstract:

The discovery of 2D materials with distinct compositions and properties has been a research aim since the report of graphene. One of the latest members of the 2D material family is MXene, which is produced from the topochemical deintercalation of the A layer from a laminate MAX phase. Recently, analogous 2D MBenes (transitional metal borides) have been predicted by theoretical calculations as excellent alternatives in applications such as metal-ion batteries, magnetic devices, and catalysts. However, the practical applications of two-dimensional (2D) transition-metal borides (MBenes) have been severely hindered by the lack of accessible MBenes because of the difficulties in the selective etching of traditional ternary MAB phases with orthorhombic symmetry (ort-MAB). Here, we discover a family of ternary hexagonal MAB (h-MAB) phases and 2D hexagonal MBenes (h-MBenes) by ab initio predictions and experiments. Calculations suggest that the ternary h-MAB phases are more suitable precursors for MBenes than the ort-MAB phases. Based on the prediction, we report the experimental synthesis of h-MBene HfBO by selective removal of in from h-MAB Hf2InB2. The synthesized 2D HfBO delivered a specific capacity of 420 mAh g-1 as an anode material in lithium-ion batteries, demonstrating the potential for energy-storage applications. The discovery of this h-MBene HfBO added a new member to the growing family of 2D materials and provided opportunities for a wide range of novel applications.

Keywords: 2D materials, DFT calculations, high-throughput screening, lithium-ion batteries

Procedia PDF Downloads 44