Search results for: Information Technology Environment
19712 Implementation of a Photo-Curable 3D Additive Manufacturing Technology with Grey Capability by Using Piezo Ink-jets
Authors: Ming-Jong Tsai, Y. L. Cheng, Y. L. Kuo, S. Y. Hsiao, J. W. Chen, P. H. Liu, D. H. Chen
Abstract:
The 3D printing is a combination of digital technology, material science, intelligent manufacturing and control of opto-mechatronics systems. It is called the third industrial revolution from the view of the Economist Journal. A color 3D printing machine may provide the necessary support for high value-added industrial and commercial design, architectural design, personal boutique, and 3D artist’s creation. The main goal of this paper is to develop photo-curable color 3D manufacturing technology and system implementation. The key technologies include (1) Photo-curable color 3D additive manufacturing processes development and materials research (2) Piezo type ink-jet head control and Opto-mechatronics integration technique of the photo-curable color 3D laminated manufacturing system. The proposed system is integrated with single Piezo type ink-jet head with two individual channels for two primary UV light curable color resins which can provide for future colorful 3D printing solutions. The main research results are 16 grey levels and grey resolution of 75 dpi.Keywords: 3D printing, additive manufacturing, color, photo-curable, Piezo type ink-jet, UV Resin
Procedia PDF Downloads 56519711 Green Open Space in Sustainable Housing and Islamic Values Perspectives – Case Study Kampung Kauman Malang
Authors: Nunik Junara, Sugeng Triyadi
Abstract:
Sustainable Housing in Islamic perspective, can be defined as a multi-dimensional process that seeks to achieve a balance between economic and socio-cultural aspects on the side, and environmental aspect on the other. There are many quotes verses in the Quran and Hadith that leads to the belief that Islam as a Rahmatan lil Alamin, where men are encouraged to act wisely in treating nature and all living things in it. One aspect of the natural environment that closed to human is plants. In the settlement, the availability of plants or also called green open space is highly recommended. The availability of green open space in the neighborhood, both the public and private green open spaces is expected to reduce the effects of global warming that has engulfed various parts of the world. Green open space that can be viewed from the angle of eco-aestetic and eco-medical in sustainable architecture, is expected to increase the temperature and provide aesthetic impression to the surrounding environment. This paper attempts to discuss the principles of Islamic values related to the natural environment as a major resource for sustainability. This paper also aims to raise awareness of the importance of the theme of sustainability in settlements, especially in big cities. Analysis of the availability of green open space in kampung Kauman Malang is one example of the effort to apply the principles of sustainable housing.Keywords: green open space, sustainable housing, Islamic values, Kampung Kauman Malang
Procedia PDF Downloads 41519710 Comparative Study of Expository and Simulation Method of Teaching Woodwork at Federal University of Technology, Minna, Nigeria
Authors: Robert Ogbanje Okwori
Abstract:
The research studied expository and simulation method of teaching woodwork at Federal University of Technology, Minna, Niger State, Nigeria. The purpose of the study was to compare expository and simulation method of teaching woodwork and determine the method that is more effective in improving performance of students in woodwork. Two research questions and two hypotheses were formulated to guide the study. Fifteen objective questions and two theory questions were used for data collection. The questions set were on structure of timber. The study used the quasi experimental design. The population of the study consisted of 25 woodwork students of Federal University of Technology, Minna, Niger State, Nigeria and three hundred (300) level students were used for the study. The lesson plans for expository method and questions were validated by three lecturers in the Department of Industrial and Technology Education, Federal University of Technology, Minna, Nigeria. The validators checked the appropriates of test items and all the corrections and inputs were effected before administration of the instrument. Data obtained were analyzed using mean, standard deviation and t-test statistical tool. The null hypotheses were formulated and tested using t-test statistics at 0.05 level of significance. The findings of the study showed that simulation method of teaching has improved students’ performance in woodwork and the performance of the students was not influenced by gender. Based on the findings of the study, it was concluded that there was a significant difference in the mean achievement scores of students taught woodwork using simulation method. This implies that simulation method is more effective than expository method of teaching woodwork. Therefore, woodwork teachers should adopt simulation method of teaching woodwork towards better performance. It was recommended that simulation method should be used by woodwork lecturers to teach woodwork since students perform better using the method and also the teachers needs to be trained and re-trained in using simulation method for teaching woodwork. Teachers should be encouraged to use simulation method for their instructional delivery because it will allow them to identify their areas of strength and weakness when imparting knowledge to woodwork students. Government and different agencies should assist in procuring materials and equipment for wood workshops to enable students effectively practice what they have been taught using simulation method.Keywords: comparative, expository, simulation, woodwork
Procedia PDF Downloads 43219709 Existence of Financial Service Authority Prior to 2045
Authors: Syafril Hendrik Hutabarat, Hartiwiningsih, Pujiyono Suwadi
Abstract:
The Financial Service Authority (FSA) was formed as a response to the 1997 monetary crisis and the 2008 financial crisis so that it was more defensive in nature while developments in information and communication technology have required state policies to be more offensive to keep up with times. Reconstruction of Authorities of the FSA's Investigator is intended to keep the agency worthy to be part of an integrated criminal justice system in Indonesia which has implications for expanding its authority in line with efforts to protect and increase the welfare of the people. The results show that internal synergy between sub-sectors in the financial services sector is not optimised, some are even left behind so that the FSA is not truly an authority in the financial services sector. This research method is empirical. The goal of synergy must begin with internal synergy which has its moment when Indonesia gets a demographic bonus in the 2030s and becomes an international logistics hub supported by the national financial services sector.Keywords: reconstruction, authorities, FSA investigators, synergy, demography
Procedia PDF Downloads 8019708 A Witty Relief Ailment Based on the Integration of IoT and Cloud
Authors: Sai Shruthi Sridhar, A. Madhumidha, Kreethika Guru, Priyanka Sekar, Ananthi Malayappan
Abstract:
Numerous changes in technology and its recent development are structuring long withstanding effect to our world, one among them is the emergence of “Internet of Things” (IoT). Similar to Technology world, one industry stands out in everyday life–healthcare. Attention to “quality of health care” is an increasingly important issue in a global economy and for every individual. As per WHO (World Health Organization) it is estimated to be less than 50% adhere to the medication provided and only about 20% get their medicine on time. Medication adherence is one of the top problems in healthcare which is fixable by use of technology. In recent past, there were minor provisions for elderly and specially-skilled to get motivated and to adhere medicines prescribed. This paper proposes a novel solution that uses IOT based RFID Medication Reminder Solution to provide personal health care services. This employs real time tracking which offer quick counter measures. The proposed solution builds on the recent digital advances in sensor technologies, smart phones and cloud services. This novel solution is easily adoptable and can benefit millions of people with a direct impact on the nation’s health care expenditure with innovative scenarios and pervasive connectivity.Keywords: cloud services, IoT, RFID, sensors
Procedia PDF Downloads 35019707 Determining the Collaboration and Challenges of Public Employment Service with Stakeholders, Employers and Job Seekers: In Case of Amhara National Regional State, Ethiopia
Authors: Redie Bezabih Hailu
Abstract:
Unemployment is a problem of nations that needs a continuous research. This study aimed to determine the collaborations and challenges of public employment service (PES) with special emphasis of stakeholders, employers and job seekers. The researcher used pragmatic philosophy, exploratory design and inductive approach to collect data from the respondents using interview and focused group discussion techniques. PES provides job market information, vocational counseling, and training. As PES is not fully furnished with man power, budget, modern technologies, it is providing less adequate services to the employers and job seekers. Matching job seekers with job vacancies is the major challenge for the center and using paper-based data management system too. There is also a number of job seekers in spite of very limited number of vacancies that the service provision is poor due to the fact that there is low level of vacancies and high level of job seekers. The center has collaboration with AFE, AYA, BoTVED, BoWCY, and CETU. The major challenges with this collaborations was the absence of operational guidelines to evaluate effectiveness and performance, lottery method of selecting candidates for vacancies and nepotism or favoritism were challenges for job seekers. On the other hand, (COVID-19) pandemic, inability to get skilled labor, absence of standardized payment, expectation of job seekers and less educational quality and mass graduation were another challenges for employment services. The study recommended quality education and training, operational guideline for collaboration, technology based labor market information system and suggested further studies on quality of PES.Keywords: public employment service, collaborations, stakeholders, employers, job seekers
Procedia PDF Downloads 5919706 Facilitating the Learning Environment as a Servant Leader: Empowering Self-Directed Student Learning
Authors: Thomas James Bell III
Abstract:
Pedagogy is thought of as one's philosophy, theory, or teaching method. This study examines the science of learning, considering the forced reconsideration of effective pedagogy brought on by the aftermath of the 2020 coronavirus pandemic. With the aid of various technologies, online education holds challenges and promises to enhance the learning environment if implemented to facilitate student learning. Behaviorism centers around the belief that the instructor is the sage on the classroom stage using repetition techniques as the primary learning instrument. This approach to pedagogy ascribes complete control of the learning environment and works best for students to learn by allowing students to answer questions with immediate feedback. Such structured learning reinforcement tends to guide students' learning without considering learners' independence and individual reasoning. And such activities may inadvertently stifle the student's ability to develop critical thinking and self-expression skills. Fundamentally liberationism pedagogy dismisses the concept that education is merely about students learning things and more about the way students learn. Alternatively, the liberationist approach democratizes the classroom by redefining the role of the teacher and student. The teacher is no longer viewed as the sage on the stage but as a guide on the side. Instead, this approach views students as creators of knowledge and not empty vessels to be filled with knowledge. Moreover, students are well suited to decide how best to learn and which areas improvements are needed. This study will explore the classroom instructor as a servant leader in the twenty-first century, which allows students to integrate technology that encapsulates more individual learning styles. The researcher will examine the Professional Scrum Master (PSM I) exam pass rate results of 124 students in six sections of an Agile scrum course. The students will be separated into two groups; the first group will follow a structured instructor-led course outlined by a course syllabus. The second group will consist of several small teams (ten or fewer) of self-led and self-empowered students. The teams will conduct several event meetings that include sprint planning meetings, daily scrums, sprint reviews, and retrospective meetings throughout the semester will the instructor facilitating the teams' activities as needed. The methodology for this study will use the compare means t-test to compare the mean of an exam pass rate in one group to the mean of the second group. A one-tailed test (i.e., less than or greater than) will be used with the null hypothesis, for the difference between the groups in the population will be set to zero. The major findings will expand the pedagogical approach that suggests pedagogy primarily exist in support of teacher-led learning, which has formed the pillars of traditional classroom teaching. But in light of the fourth industrial revolution, there is a fusion of learning platforms across the digital, physical, and biological worlds with disruptive technological advancements in areas such as the Internet of Things (IoT), artificial intelligence (AI), 3D printing, robotics, and others.Keywords: pedagogy, behaviorism, liberationism, flipping the classroom, servant leader instructor, agile scrum in education
Procedia PDF Downloads 15119705 Performance of HVOF Sprayed Ni-20CR and Cr3C2-NiCr Coatings on Fe-Based Superalloy in an Actual Industrial Environment of a Coal Fired Boiler
Authors: Tejinder Singh Sidhu
Abstract:
Hot corrosion has been recognized as a severe problem in steam-powered electricity generation plants and industrial waste incinerators as it consumes the material at an unpredictably rapid rate. Consequently, the load-carrying ability of the components reduces quickly, eventually leading to catastrophic failure. The inability to either totally prevent hot corrosion or at least detect it at an early stage has resulted in several accidents, leading to loss of life and/or destruction of infrastructures. A number of countermeasures are currently in use or under investigation to combat hot corrosion, such as using inhibitors, controlling the process parameters, designing a suitable industrial alloy, and depositing protective coatings. However, the protection system to be selected for a particular application must be practical, reliable, and economically viable. Due to the continuously rising cost of the materials as well as increased material requirements, the coating techniques have been given much more importance in recent times. Coatings can add value to products up to 10 times the cost of the coating. Among the different coating techniques, thermal spraying has grown into a well-accepted industrial technology for applying overlay coatings onto the surfaces of engineering components to allow them to function under extreme conditions of wear, erosion-corrosion, high-temperature oxidation, and hot corrosion. In this study, the hot corrosion performances of Ni-20Cr and Cr₃C₂-NiCr coatings developed by High Velocity Oxy-Fuel (HVOF) process have been studied. The coatings were developed on a Fe-based superalloy, and experiments were performed in an actual industrial environment of a coal-fired boiler. The cyclic study was carried out around the platen superheater zone where the temperature was around 1000°C. The study was conducted for 10 cycles, and one cycle was consisting of 100 hours of heating followed by 1 hour of cooling at ambient temperature. Both the coatings deposited on Fe-based superalloy imparted better hot corrosion resistance than the uncoated one. The Ni-20Cr coated superalloy performed better than the Cr₃C₂-NiCr coated in the actual working conditions of the coal fired boiler. It is found that the formation of chromium oxide at the boundaries of Ni-rich splats of the coating blocks the inward permeation of oxygen and other corrosive species to the substrate.Keywords: hot corrosion, coating, HVOF, oxidation
Procedia PDF Downloads 8919704 Block-Chain Land Administration Technology in Nigeria: Opportunities and Challenges
Authors: Babalola Sunday Oyetayo, Igbinomwanhia Uyi Osamwonyi, Idowu T. O., Herbert Tata
Abstract:
This paper explores the potential benefits of adopting blockchain technology in Nigeria's land administration systems while also addressing the challenges and implications of its implementation in the country's unique context. Through a comprehensive literature review and analysis of existing research, the paper delves into the key attributes of blockchain that can revolutionize land administration practices, with a particular focus on simplifying land registration procedures, expediting land title issuance, and enhancing data transparency and security. The decentralized and immutable nature of blockchain offers unique advantages, instilling trust and confidence in land transactions, which are especially crucial in Nigeria's land governance landscape. However, integrating blockchain in Nigeria's land administration ecosystem presents specific challenges, necessitating a critical evaluation of technical, socio-economic, and infrastructural barriers. These challenges encompass data privacy concerns, scalability, interoperability with outdated systems, and gaining acceptance from various stakeholders. By synthesizing these insights, the paper proposes strategies tailored to Nigeria's context to optimize the benefits of blockchain adoption while addressing the identified challenges. The research findings contribute significantly to the ongoing discourse on blockchain technology in Nigeria's land governance, offering evidence-based recommendations to policymakers, land administrators, and stakeholders. Ultimately, the paper aims to promote the effective utilization of blockchain, fostering efficiency, transparency, and trust in Nigeria's land administration systems to drive sustainable development and societal progress.Keywords: block-chain, technology, stakeholders, land registration
Procedia PDF Downloads 7619703 The Role of Creative Entrepreneurship in the Development of Croatian Economy
Authors: Marko Kolakovic
Abstract:
Creative industries are an important sector of growth and development of knowledge economies. They have a positive impact on employment, economic growth, export and the quality of life in the areas where they are developed. Creative sectors include architecture, design, advertising, publishing, music, film, television and radio, video games, visual and performing arts and heritage. Following the positive trends of development of creative industries on the global and European level, this paper analyzes creative industries in general and specific characteristics of creative entrepreneurship. Special focus in this paper is put on the influence of the information communication technology on the development of new creative business models and protection of the intellectual property rights. One part of the paper is oriented on the analysis of the status of creative industries and creative entrepreneurship in Croatia. The main objective of the paper is by using the statistical analysis of creative industries in Croatia and information gained during the interviews with entrepreneurs, to make conclusions about potentials and development of creative industries in Croatia. Creative industries in Croatia are at the beginning of their development and growth strategy still does not exist at the national level. Statistical analysis pointed out that in 2015 creative enterprises made 9% of all enterprises in Croatia, employed 5,5% of employed people and their share in GDP was 4,01%. Croatian creative entrepreneurs are building competitive advantage using their creative resources and creating specific business models. The main obstacles they meet are lack of business experience and impossibility of focusing on the creative activities only. In their business, they use digital technologies and are focused on export. The conclusion is that creative industries in Croatia have development potential, but it is necessary to take adequate measures to use this potential in a right way.Keywords: creative entrepreneurship, knowledge economy, business models, intellectual property
Procedia PDF Downloads 21419702 An Adaptive CFAR Algorithm Based on Automatic Censoring in Heterogeneous Environments
Authors: Naime Boudemagh
Abstract:
In this work, we aim to improve the detection performances of radar systems. To this end, we propose and analyze a novel censoring technique of undesirable samples, of priori unknown positions, that may be present in the environment under investigation. Therefore, we consider heterogeneous backgrounds characterized by the presence of some irregularities such that clutter edge transitions and/or interfering targets. The proposed detector, termed automatic censoring constant false alarm (AC-CFAR), operates exclusively in a Gaussian background. It is built to allow the segmentation of the environment to regions and switch automatically to the appropriate detector; namely, the cell averaging CFAR (CA-CFAR), the censored mean level CFAR (CMLD-CFAR) or the order statistic CFAR (OS-CFAR). Monte Carlo simulations show that the AC-CFAR detector performs like the CA-CFAR in a homogeneous background. Moreover, the proposed processor exhibits considerable robustness in a heterogeneous background.Keywords: CFAR, automatic censoring, heterogeneous environments, radar systems
Procedia PDF Downloads 60319701 Reclaiming Properties of Bituminous Concrete Using Cold Mix Design Technology
Authors: Pradeep Kumar, Shalinee Shukla
Abstract:
Pavement plays a vital role in the socio-economic development of a country. Bituminous roads construction with conventional paving grade bitumen obtained from hot mix plant creates pollution and involves emission of greenhouse gases, also the construction of pavements at very high temperature is not feasible or desirable for high rainfall and snowfall areas. This problem of overheating can be eliminated by the construction of pavements with the usage of emulsified cold mixes which will eliminate emissions and help in the reduction of fuel requirement at mixing plant, which leads to energy conservation. Cold mix is a mixture of unheated aggregate and emulsion or cutback and filler. The primary objective of this research is to assess the volumetric mix design parameters of recycled aggregates with cold mixing technology and also to assess the impact of additives on volumetric mix characteristics. In this present study, bituminous pavement materials are reclaimed using cold mix technology, and Marshall specimens are prepared with the help of slow setting type 2 (SS-2) cationic bitumen emulsion as a binder for recycled aggregates. This technique of road construction is more environmentally friendly and can be done in adverse weather conditions.Keywords: cold mixes, bitumen emulsion, recycled aggregates, volumetric properties
Procedia PDF Downloads 13919700 Experimental Investigation on Utilization of Waste Materials in Fly Ash Brick
Authors: S. Southamirajan, D. Dhavashankaran
Abstract:
Fly ash is one of the major residues generated during combustion of coal in thermal power plants. Fly ash brick technology is the process of converting industrial waste materials into quality building material. Another issue in earth is dumping of the Bagasse ash, rice husk ash and copper slag waste. In a growing country like India a huge amount of fly ash waste materials are polluting the environment. The necessity of recycling the materials play a big role in the development of the safe and non- polluted earth. Fly ash, lime, gypsum and quarry dust are used as a replacement material for fly ash. The fly ash was replaced by the Bagasse ash and rice husk ash in the proportion of 2.5%, 5%, 7.5%, 10%, 12.5%, 15%, 17.5%, 20%, 22.5%, 25%27.5% and 30%. Two types of fly ash bricks were casted. One type is Bagasse ash replaced fly ash and another type is rice husk ash replaced fly ash bricks then copper slag are partially replaced in quarry dust. The prepared bricks are cured for 7 days and 28 days and dried in regular temperature. The mechanical and durability properties of optimum percentages of Bagasse ash and rice husk ash replaced fly ash bricks. The use of Bagasse ash and rice husk ash provides for considerable value – added utilization of Bagasse and rice husk in bricks and significant reductions in the production of greenhouse gases by the cement industry.Keywords: Bagasse Ash, Fly ash, bricks, mechanical & durability properties, Rice husk ash
Procedia PDF Downloads 19519699 Passengers’ Willingness to Use Soft Biometric at Airports
Authors: Jin-Ru Yen, Chi-Che Hsieh
Abstract:
Up to date, the automated border control system has been used at many airports, which features biometric technology to identify passengers. In spite of its efficiency, failures or extra time could occur sometimes. To improve recognition performance, some scholars proposed the idea of using soft biometrics to support facial recognition systems at checkpoints in airports. The result showed that the efficiency and accuracy are improved. This study aims to explore passengers’ acceptance of soft biometric technology (SBT). We developed a survey to discover factors that affect passengers’ acceptance. An online survey was conducted, and an ANOVA (Analysis of variances) was performed. Our results found that passengers of different genders, ages, education levels, and average monthly incomes do not have significant differences in usage attitude. However, in terms of preferred top style on board and average flying frequency per year, passengers with preferences for wearing T-shirts and less flying frequency tend to have better attitudes toward the SBT. On the other hand, factors such as performance expectancy, social influence, facilitating condition, and hedonic motivation have positive influences on either usage attitude or behavioral intention. Behavioral intention is driven by usage attitude as well.Keywords: smart airport, biometrics, soft biometric technology, willingness to use
Procedia PDF Downloads 1519698 Involving Children in Creating a Healthy Environment in Low Socioeconomic Position (SEP) Neighborhoods in the Netherlands: A Participatory Action Research (PAR) Project.
Authors: Lisa Wilderink, Ingrid Bakker, Albertine J. Schuit, Jacob C. Seidell, Carry M. Renders
Abstract:
To ensure that health behavior interventions for children living in low socioeconomic position (SEP) neighborhoods are in line with children’s wishes and needs, participation of the children in the development, implementation, and evaluation is crucial. In this paper, we show how children living in three low-SEP neighborhoods in the Netherlands can be involved in Participatory Action Research (PAR) and what influences this participation process. The Photovoice method was used and provided comprehensive information from the children’s perspectives. With the help of the community workers, the children identified feasible actions. This paper shows that it is possible to involve children from low SEP neighborhoods in a meaningful way. We found that it is important to constantly discuss the process with participants, start with a concrete question or problem and adapt the project to the local context and skills of participantsKeywords: children, healthy behavior, participatory action research, socioeconomic health inequalities
Procedia PDF Downloads 28519697 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 4119696 The Phenomenon of the Seawater Intrusion with Fresh Groundwater in the Arab Region
Authors: Kassem Natouf, Ihab Jnad
Abstract:
In coastal aquifers, the interface between fresh groundwater and salty seawater may shift inland, reaching coastal wells and causing an increase in the salinity of the water they pump, putting them out of service. Many Arab coastal sites suffer from this phenomenon due to the increased pumping of coastal groundwater. This research aims to prepare a comprehensive study describing the common characteristics of the phenomenon of seawater intrusion with coastal freshwater aquifers in the Arab region, its general and specific causes and negative effects, in a way that contributes to overcoming this phenomenon, and to exchanging expertise between Arab countries in studying and analyzing it, leading to overcoming it. This research also aims to build geographical and relational databases for data, information and studies available in Arab countries about seawater intrusion with freshwater so as to provide the data and information necessary for managing groundwater resources on Arab coasts, including studying the effects of climate change on these resources and helping decision-makers in developing executive programs to overcome the seawater intrusion with groundwater. The research relied on the methodology of analysis and comparison, where the available information and data about the phenomenon in the Arab region were collected. After that, the information and data collected were studied and analyzed, and the causes of the phenomenon in each case, its results, and solutions for prevention were stated. Finally, the different cases were compared, and the common causes, results, and methods of treatment between them were deduced, and a technical report summarizing that was prepared. To overcome the phenomenon of seawater intrusion with fresh groundwater: (1) It is necessary to develop efforts to monitor the quantity and quality of groundwater on the coasts and to develop mathematical models to predict the impact of climate change, sea level rise, and human activities on coastal groundwater. (2) Over-pumping of coastal aquifers is an important cause of seawater intrusion. To mitigate this problem, Arab countries should reduce groundwater pumping and promote rainwater harvesting, surface irrigation, and water recycling practices. (3) Artificial recharge of coastal groundwater with various forms of water, whether fresh or treated, is a promising technology to mitigate the effects of seawater intrusion.Keywords: coastal aquifers, seawater intrusion, fresh groundwater, salinity increase, Arab region, groundwater management, climate change effects, sustainable water practices, over-pumping, artificial recharge, monitoring and modeling, data databases, groundwater resources, negative effects, comparative analysis, technical report, water scarcity, groundwater quality, decision-making, environmental impact, agricultural practices
Procedia PDF Downloads 4119695 NFTs, between Opportunities and Absence of Legislation: A Study on the Effect of the Rulings of the OpenSea Case
Authors: Andrea Ando
Abstract:
The development of the blockchain has been a major innovation in the technology field. It opened the door to the creation of novel cyberassets and currencies. In more recent times, the non-fungible tokens have started to be at the centre of media attention. Their popularity has been increasing since 2021, and they represent the latest in the world of distributed ledger technologies and cryptocurrencies. It seems more and more likely that NFTs will play a more important role in our online interactions. They are indeed increasingly taking part in the arts and technology sectors. Their impact on society and the market is still very difficult to define, but it is very likely that there will be a turning point in the world of digital assets. There are some examples of their peculiar behaviour and effect in our contemporary tech-market: the former CEO of the famous social media site Twitter sold an NFT of his first tweet for around £2,1 million ($2,5 million), or the National Basketball Association has created a platform to sale unique moment and memorabilia from the history of basketball through the non-fungible token technology. Their growth, as imaginable, paved the way for civil disputes, mostly regarding their position under the current intellectual property law in each jurisdiction. In April 2022, the High Court of England and Wales ruled in the OpenSea case that non-fungible tokens can be considered properties. The judge, indeed, concluded that the cryptoasset had all the indicia of property under common law (National Provincial Bank v. Ainsworth). The research has demonstrated that the ruling of the High Court is not providing enough answers to the dilemma of whether minting an NFT is a violation or not of intellectual property and/or property rights. Indeed, if, on the one hand, the technology follows the framework set by the case law (e.g., the 4 criteria of Ainsworth), on the other hand, the question that arises is what is effectively protected and owned by both the creator and the purchaser. Then the question that arises is whether a person has ownership of the cryptographed code, that it is indeed definable, identifiable, intangible, distinct, and has a degree of permanence, or what is attached to this block-chain, hence even a physical object or piece of art. Indeed, a simple code would not have any financial importance if it were not attached to something that is widely recognised as valuable. This was demonstrated first through the analysis of the expectations of intellectual property law. Then, after having laid the foundation, the paper examined the OpenSea case, and finally, it analysed whether the expectations were met or not.Keywords: technology, technology law, digital law, cryptoassets, NFTs, NFT, property law, intellectual property law, copyright law
Procedia PDF Downloads 9319694 i2kit: A Tool for Immutable Infrastructure Deployments
Authors: Pablo Chico De Guzman, Cesar Sanchez
Abstract:
Microservice architectures are increasingly in distributed cloud applications due to the advantages on the software composition, development speed, release cycle frequency and the business logic time to market. On the other hand, these architectures also introduce some challenges on the testing and release phases of applications. Container technology solves some of these issues by providing reproducible environments, easy of software distribution and isolation of processes. However, there are other issues that remain unsolved in current container technology when dealing with multiple machines, such as networking for multi-host communication, service discovery, load balancing or data persistency (even though some of these challenges are already solved by traditional cloud vendors in a very mature and widespread manner). Container cluster management tools, such as Kubernetes, Mesos or Docker Swarm, attempt to solve these problems by introducing a new control layer where the unit of deployment is the container (or the pod — a set of strongly related containers that must be deployed on the same machine). These tools are complex to configure and manage and they do not follow a pure immutable infrastructure approach since servers are reused between deployments. Indeed, these tools introduce dependencies at execution time for solving networking or service discovery problems. If an error on the control layer occurs, which would affect running applications, specific expertise is required to perform ad-hoc troubleshooting. As a consequence, it is not surprising that container cluster support is becoming a source of revenue for consulting services. This paper presents i2kit, a deployment tool based on the immutable infrastructure pattern, where the virtual machine is the unit of deployment. The input for i2kit is a declarative definition of a set of microservices, where each microservice is defined as a pod of containers. Microservices are built into machine images using linuxkit —- a tool for creating minimal linux distributions specialized in running containers. These machine images are then deployed to one or more virtual machines, which are exposed through a cloud vendor load balancer. Finally, the load balancer endpoint is set into other microservices using an environment variable, providing service discovery. The toolkit i2kit reuses the best ideas from container technology to solve problems like reproducible environments, process isolation, and software distribution, and at the same time relies on mature, proven cloud vendor technology for networking, load balancing and persistency. The result is a more robust system with no learning curve for troubleshooting running applications. We have implemented an open source prototype that transforms i2kit definitions into AWS cloud formation templates, where each microservice AMI (Amazon Machine Image) is created on the fly using linuxkit. Even though container cluster management tools have more flexibility for resource allocation optimization, we defend that adding a new control layer implies more important disadvantages. Resource allocation is greatly improved by using linuxkit, which introduces a very small footprint (around 35MB). Also, the system is more secure since linuxkit installs the minimum set of dependencies to run containers. The toolkit i2kit is currently under development at the IMDEA Software Institute.Keywords: container, deployment, immutable infrastructure, microservice
Procedia PDF Downloads 18119693 Evaluation of Mechanical Behavior of Gas Turbine Blade at High Temperature
Authors: Sung-Uk Wee, Chang-Sung Seok, Jae-Mean Koo, Jeong-Min Lee
Abstract:
Gas turbine blade is important part of power plant, so it is necessary to evaluate gas turbine reliability. For better heat efficiency, inlet temperature of gas turbine has been elevated more and more so gas turbine blade is exposed to high-temperature environment. Then, higher inlet temperature affects mechanical behavior of the gas turbine blade, so it is necessary that evaluation of mechanical property of gas turbine blade at high-temperature environment. In this study, tensile test and fatigue test were performed at various high temperature, and fatigue life was predicted by Coffin-Manson equation at each temperature. The experimental results showed that gas turbine blade has a lower elastic modulus and shorter fatigue life at higher temperature.Keywords: gas turbine blade, tensile test, fatigue life, stress-strain
Procedia PDF Downloads 48219692 Mineralogical and Geochemical Constraints on the Origin and Environment of Numidian Siliceous Sedimentary Rocks of the Extreme Northwest Tunisia
Authors: Ben Yahia Nouha, Harris Chris, Sebei Abdelaziz, Boussen Slim, Chaabani Fredj
Abstract:
The present work has set itself the objective of studying non-detritic siliceous rocks of the extreme northwest Tunisia. It aims to examine the origin and their sedimentary depositional environment based on mineralogical and geochemical characteristics. The different sections were located in the area of Babouch and the area of Tabarka. The collected samples were subjected to mineralogical and geochemical characterization using different analytical methods: X-ray diffraction (XRD), geochemical analysis (ICP- AES), isotopic geochemistry (δ18O), to assess their suitability for industrial use. X-ray powder diffraction of the pure siliceous rock indicates quartz as the major mineral, with the total lack of amorphous silica. Trace impurities, such as carbonate and clay minerals, are concealed in the analytical results. The petrographic examination revealed allowed us to deduce that this rock was deriving from tests of siliceous organisms (the radiolarians). The chemical composition shows that SiO2, Al2O3, and Fe2O3 represent the most abundant oxides. The other oxides are present in negligible quantities. Geochemical data support a biogenic and non-hydrothermal origin of babouchite silica. Oxygen isotopic has shown that babouchites were formed in an environment with a high temperature ranging from 56 °C to 73 °C.Keywords: biogenic silica, babouchite formation, XRD, chemical analysis, oxygen isotopic, northwest tunisia
Procedia PDF Downloads 15119691 Design and Implementation of Remote Application Virtualization in Cloud Environments
Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang
Abstract:
Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.Keywords: cloud computing, IaaS, virtualization, application delivery
Procedia PDF Downloads 28319690 Living by the Maramataka: Mahi Maramataka, Indigenous Environmental Knowledge Systems and Wellbeing
Authors: Ayla Hoeta
Abstract:
The focus of this research is mahi Maramataka, ‘the practices of Maramataka’ as a traditional and evolving knowledge system and its connection to whaanau oranga (wellbeing) and healing. Centering kaupapa Maaori methods and knowledge this research will explore how Maramataka can be used as a tool for oranga and healing for whaanau to engage with different environments aligned with Maramataka flow and optimal time based on the environment. Maramataka is an ancestral lunar environmental knowledge system rooted within korero tuku iho, Maaori creation stories, dating back to the beginning of time. The significance of Maramataka is the ancient environmental knowledge and the connecting energy flow of mauri (life force) between whenua (land), moana (ocean) and rangi (sky). The lunar component of the Maramataka is widely understood and highlights the different phases of the moon. Each moon phase is named with references to puurakau stories and environmental and ecological information. Marama, meaning moon and taka, meaning cycle, is used as a lunar and environmental calendar. There are lunar phases that are optimal for specific activities, such as the Tangaroa phase, a time of abundance and productivity and ocean-based activities like fishing. Other periods in the Maramataka, such as Rakaunui (full moon), connect the highest tides and highest energy of the lunar cycle, ideal for social, physical activity and particularly planting. Other phases like Tamatea are unpredictable whereas Whiro (new moon/s) is reflective, deep and cautious during the darkest nights. Whaanau, particularly in urban settings have become increasingly disconnected from the natural environment, the Maramataka has become a tool that they can connect to which offers an alternative to dominant perspectives of health and is an approach that is uniquely Maaori. In doing so, this research will raise awareness of oranga or lack of oranga, and lived experience of whaanau in Tamaki Makaurau - Aotearoa, on a journey to revival of Maramataka and healing. The research engages Hautu Waka as a methodology using the methods of ancient kaupapa Māori practises based on wayfinding and attunement with the natural environment. Using ancient ways of being, knowing, seeing and doing the Hautu Waka will centre kaupapa Maaori perspectives to process design, reflection and evaluation. The methods of Hautu Waka consists of five interweaving phases, 1) Te Rapunga (the search) in infinite potential, 2) Te Kitenga (the seeing), observations of and attunement to tohu 3) te whainga (the pursuit) and deeply exploring key tohu 4) te whiwhinga (the acquiring), of knowledge and clearer ideas, 5) Te Rawenga (the celebration), reflection and acknowledgement of the journey and achievements. This research is an expansion from my creative practices across whaanau-centred inquiry, to understand the benefits of Maramataka and how it can be embodied and practised in a modern-day context to support oranga and healing. Thus, the goal is to work with kaupapa Maaori methodologies to authenticate as a Maaori practitioner and researcher and allow an authentic indigenous approach to the exploration of Maramataka and through a kaupapa Maaori lens.Keywords: maramataka (Maaori calendar), tangata (people), taiao (environment), whenua (land), whaanau (family), hautu waka (navigation framework)
Procedia PDF Downloads 7619689 Impact of Applying Bag House Filter Technology in Cement Industry on Ambient Air Quality - Case Study: Alexandria Cement Company
Authors: Haggag H. Mohamed, Ghatass F. Zekry, Shalaby A. Elsayed
Abstract:
Most sources of air pollution in Egypt are of anthropogenic origin. Alexandria Governorate is located at north of Egypt. The main contributing sectors of air pollution in Alexandria are industry, transportation and area source due to human activities. Alexandria includes more than 40% of the industrial activities in Egypt. Cement manufacture contributes a significant amount to the particulate pollution load. Alexandria Portland Cement Company (APCC) surrounding was selected to be the study area. APCC main kiln stack Total Suspended Particulate (TSP) continuous monitoring data was collected for assessment of dust emission control technology. Electro Static Precipitator (ESP) was fixed on the cement kiln since 2002. The collected data of TSP for first quarter of 2012 was compared to that one in first quarter of 2013 after installation of new bag house filter. In the present study, based on these monitoring data and metrological data a detailed air dispersion modeling investigation was carried out using the Industrial Source Complex Short Term model (ISC3-ST) to find out the impact of applying new bag house filter control technology on the neighborhood ambient air quality. The model results show a drastic reduction of the ambient TSP hourly average concentration from 44.94μg/m3 to 5.78μg/m3 which assures the huge positive impact on the ambient air quality by applying bag house filter technology on APCC cement kilnKeywords: air pollution modeling, ambient air quality, baghouse filter, cement industry
Procedia PDF Downloads 27219688 Wearable Heart Rate Sensor Based on Wireless System for Heart Health Monitoring
Authors: Murtadha Kareem, Oliver Faust
Abstract:
Wearable biosensor systems can be designed and developed for health monitoring. There is much interest in both scientific and industrial communities established since 2007. Fundamentally, the cost of healthcare has increased dramatically and the world population is aging. That creates the need to harvest technological improvements with small bio-sensing devices, wireless-communication, microelectronics and smart textiles, that leads to non-stop developments of wearable sensor based systems. There has been a significant demand to monitor patient's health status while the patient leaves the hospital in his/her personal environment. To address this need, there are numerous system prototypes which has been launched in the medical market recently, the aim of that is to provide real time information feedback about patient's health status, either to the patient himself/herself or direct to the supervising medical centre station, while being capable to give a notification for the patient in case of possible imminent health threatening conditions. Furthermore, wearable health monitoring systems comprise new techniques to address the problem of managing and monitoring chronic heart diseases for elderly people. Wearable sensor systems for health monitoring include various types of miniature sensors, either wearable or implantable. To be specific, our proposed system able to measure essential physiological parameter, such as heart rate signal which could be transmitted through Bluetooth to the cloud server in order to store, process, analysis and visualise the data acquisition. The acquired measurements are connected through internet of things to a central node, for instance an android smart phone or tablet used for visualising the collected information on application or transmit it to a medical centre.Keywords: Wearable sensor, Heart rate, Internet of things, Chronic heart disease
Procedia PDF Downloads 16819687 Indicators of Radicalization in Prisons Facilities: Identification and Assessment
Authors: David Kramsky, Barbora Vegrichtova
Abstract:
The prison facility is generally considered as an environment having a corrective purpose. Besides the social sense of remedy, prison is also an environment that potentially determines and affects socially dangerous behavior. The authors, based on long-term empirical research, present the significant indicators that are directly related to the transformation of personality attitudes, motivations and behavior associating with a process of radicalization. One of the most significant symptoms of radicalization is a particular social moral decision making. Individuals in the radicalism process primarily prefer utilitarian manners of decision-making more than personal aspects like empathy for others. The authors will present the method of social moral profiling of the subject in radicalization process as an effective prevention system reducing security risks in society.Keywords: indicators, moral decision, radicalism, social profile
Procedia PDF Downloads 21919686 The Implementation of Teaching and Learning Quality Assurance System at the Chaoyang University of Technology for Academic Year 2013-2015
Authors: Ting Hsiang Chang
Abstract:
Nowadays in Taiwan, higher education, which was previously more emphasized on teaching-oriented approaches, has gradually shifted to an approach more focusing on students learning outcomes. With student employment rate as an important indicator for University Program Evaluation periodically held by the Ministry of Education, it becomes extremely critical for a university to build up a teaching and learning quality assurance system to bridge the gap between learning and practice. Teaching and Learning Quality Assurance System has been built and implemented at Chaoyang University of Technology for years and has received substantial results. By employing various forms of evaluation and performance appraisals, the effectiveness of teaching and learning can consistently be tracked as a means of ensuring teaching and learning quality. This study aims to explore the evaluation system of teaching and learning quality assurance system at the Chaoyang University of Technology by means of content analysis. The study contents the evaluation reports on the teaching and learning quality assurance at the Chaoyang University of Technology in the Academic Year 2013-2015. The quantitative results of the assessment were analyzed using the five-point Likert Scale. Quality assurance Committee meetings were further held for examining and discussions on the results. To the end, the annual evaluation report is to be produced as references used to improve approaches in both teaching and learning. The findings indicate that there is a respective relationship between the overall teaching evaluation items and the teaching goals and core competencies. In addition, graduates’ feedbacks were also collected for further analysis to examine if the current educational planning is able to achieve the university’s teaching goal and cultivation of core competencies.Keywords: core competencies, teaching and learning quality assurance system, teaching goals, university program evaluation
Procedia PDF Downloads 29619685 National Project 'Environment' of Russian Federation as a Management Tool in Achieving SDGs
Authors: Ekaterina Posokhova, Boris Gavrilov
Abstract:
Priority national projects have become an essential phenomenon in the Russian Federation. Both regional and local government institutions and a significant part of the society have been involved in their implementation. The scale and multispectricity of the national projects give a reason to believe that their concept is beyond the scope of the individual state programs. The national project “environment” contains federal projects on waste management, water, and air quality, ecotourism development, and biodiversity conservation highlights the importance of the preservation and restoration of Volga River and Lake Baikal ecosystems. This study assesses the national projects according to their relativeness with the current SDGs (i.e., SGD 14 and 15), evaluates the methodology of the projects. The paper considers the peculiarities of the national projects as strategic management tools as well as the possibility of amending the project objective indicators. Conclusion on the effectiveness of NP in terms of achieving SDGs is provided.Keywords: management, SDP, russia, conservation, law
Procedia PDF Downloads 14719684 Neighbor Caring Environment System (NCE) Using Parallel Replication Mechanism
Authors: Ahmad Shukri Mohd Noor, Emma Ahmad Sirajudin, Rabiei Mamat
Abstract:
Pertaining to a particular Marine interest, the process of data sampling could take years before a study can be concluded. Therefore, the need for a robust backup system for the data is invariably implicit. In recent advancement of Marine applications, more functionalities and tools are integrated to assist the work of the researchers. It is anticipated that this modality will continue as research scope widens and intensifies and at the same to follow suit with current technologies and lifestyles. The convenience to collect and share information these days also applies to the work in Marine research. Therefore, Marine system designers should be aware that high availability is a necessary attribute in Marine repository applications as well as a robust backup system for the data. In this paper, the approach to high availability is related both to hardware and software but the focus is more on software. We consider a NABTIC repository system that is primitively built on a single server and does not have replicated components. First, the system is decomposed into separate modules. The modules are placed on multiple servers to create a distributed system. Redundancy is added by placing the copies of the modules on different servers using Neighbor Caring Environment System(NCES) technique. NCER is utilizing parallel replication components mechanism. A background monitoring is established to check servers’ heartbeats to confirm their aliveness. At the same time, a critical adaptive threshold is maintained to make sure a failure is timely detected using Adaptive Fault Detection (AFD). A confirmed failure will set the recovery mode where a selection process will be done before a fail-over server is instructed. In effect, the Marine repository service is continued as the fail-over masks a recent failure. The performance of the new prototype is tested and is confirmed to be more highly available. Furthermore, the downtime is not noticeable as service is immediately restored automatically. The Marine repository system is said to have achieved fault tolerance.Keywords: availability, fault detection, replication, fault tolerance, marine application
Procedia PDF Downloads 32519683 Experimental Analyses of Thermoelectric Generator Behavior Using Two Types of Thermoelectric Modules for Marine Application
Authors: A. Nour Eddine, D. Chalet, L. Aixala, P. Chessé, X. Faure, N. Hatat
Abstract:
Thermal power technology such as the TEG (Thermo-Electric Generator) arouses significant attention worldwide for waste heat recovery. Despite the potential benefits of marine application due to the permanent heat sink from sea water, no significant studies on this application were to be found. In this study, a test rig has been designed and built to test the performance of the TEG on engine operating points. The TEG device is built from commercially available materials for the sake of possible economical application. Two types of commercial TEM (thermo electric module) have been studied separately on the test rig. The engine data were extracted from a commercial Diesel engine since it shares the same principle in terms of engine efficiency and exhaust with the marine Diesel engine. An open circuit water cooling system is used to replicate the sea water cold source. The characterization tests showed that the silicium-germanium alloys TEM proved a remarkable reliability on all engine operating points, with no significant deterioration of performance even under sever variation in the hot source conditions. The performance of the bismuth-telluride alloys was 100% better than the first type of TEM but it showed a deterioration in power generation when the air temperature exceeds 300 °C. The temperature distribution on the heat exchange surfaces revealed no useful combination of these two types of TEM with this tube length, since the surface temperature difference between both ends is no more than 10 °C. This study exposed the perspective of use of TEG technology for marine engine exhaust heat recovery. Although the results suggested non-sufficient power generation from the low cost commercial TEM used, it provides valuable information about TEG device optimization, including the design of heat exchanger and the types of thermo-electric materials.Keywords: internal combustion engine application, Seebeck, thermo-electricity, waste heat recovery
Procedia PDF Downloads 248