Search results for: calcined technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7845

Search results for: calcined technology

4215 The Role of Social Media in Activating Youth Participation in the Community

Authors: Raya Hamed Hilal Al Maamari

Abstract:

The Gulf societies have been undergoing radical changes due to the technology transfer. It altered the humanities attitudes, especially, youth habits as they have become an addicted to using social media. This study aimed to find out the ratio of social media in guiding youth to participate with government’s institutions in decision-making and developing their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young from different gulf countries, using an electronic questionnaire, as well as, some interviews with famous leaders of youth groups. Finally, the researcher suggested some effective ways activate youth efforts using social media in an effective manner to plan for the development policy in the community. The findings illustrated that social media plays a vital role in encouraging youth to participate enthusiastically in providing services. Noticeably, social media contains large numbers of youth. Therefore, the influences will be widely and feasible. Moreover, the study indicated the fact that most of the youth teamwork started in social media. Then, it has been growing in the real society.

Keywords: community, participation, social media, youth

Procedia PDF Downloads 377
4214 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution

Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic

Abstract:

Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.

Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network

Procedia PDF Downloads 264
4213 ICT in Education – A Quest for Quality Learning in the 21st Century

Authors: Adam Johnbull

Abstract:

The paper discusses ICT in Education as a quest for quality learning in the 21st century. Education is the key that unlock the door to development, without adequate education of the citizenry, the development of a nation becomes a sham. Information Communication Technologies (ICTs) has revolutionized the way people work today and are now transforming education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be effective and fit in tomorrow’s world. This is a sufficient reason for ICT’s to win global recognition and attention and thus ensure desire quality in our school system. Thus, the purpose of the paper is to discuss amongst others, what is ICT. The roles of ICT’s in education, limitation and key challenges of integrating ICT to education in the enhancement of student learning and experiences in other to encourage policy makers, school administrators and teachers pay the required attention to integrate this technology in the education system. The paper concludes that regardless of all the limitation characterizing it. ICT benefit education system to provide quality education in the 21st century.

Keywords: ICTs, quest, information, global, sham, century

Procedia PDF Downloads 427
4212 Surfactant Improved Heavy Oil Recovery in Sandstone Reservoirs by Wettability Alteration

Authors: Rabia Hunky, Hayat Kalifa, Bai

Abstract:

The wettability of carbonate reservoirs has been widely recognized as an important parameter in oil recovery by flooding technology. Many surfactants have been studied for this application. However, the importance of wettability alteration in sandstone reservoirs by surfactant has been poorly studied. In this paper, our recent study of the relationship between rock surface wettability and cumulative oil recovery for sandstone cores is reported. In our research, it has been found there is a good agreement between the wettability and oil recovery. Nonionic surfactants, Tomadol® 25-12 and Tomadol® 45-13, are very effective in wettability alteration of sandstone core surface from highly oil-wet conditions to water-wet conditions. By spontaneous imbibition test, Interfacial tension, and contact angle measurement these two surfactants exhibit the highest recovery of the synthetic oil made with heavy oil. Based on these experimental results, we can further conclude that the contact angle measurement and imbibition test can be used as rapid screening tools to identify better EOR surfactants to increase heavy oil recovery from sandstone reservoirs.

Keywords: EOR, oil gas, IOR, WC, IF, oil and gas

Procedia PDF Downloads 105
4211 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 335
4210 A New Mechanical Architecture Design of a Multifunctional Bed for Bedridden Healthcare

Authors: Rogelio Portillo Vélez, Eduardo Vázquez-Santacruz, Mariano Gamboa-Zúñiga

Abstract:

In this paper a new mechanical architecture design of a multi functional robot bed, is presented. The importance of this design relies on the fact that in next years the need of assistive devices development will increase in such way that elderly patients will use this kind of devices. This mechanical design implies following specific mechanisms which attend Mexican hospital requirements. This design is the base of next step of this kind of development given that it shows all technical details of the mechanical systems which are needed in order to construct the bed. This is first hospital bed design which could responds to the Latin America hospital requirements. We have obtained these hospital requirements using our diagnosis methodology [14]. From these results we have designed the mechanical system. This is the mechanical base of the hospital robotic bed which is being developed in our robotics laboratory. It will be useful in different hospital environments for elderly and disabled patients.

Keywords: assistive robotics, methodology, feasibility analysis, robotics, operational feasibility, assistive technology, viability analysis matrix, social impact

Procedia PDF Downloads 398
4209 Virtual Reality Exposure Therapy for Post-Traumatic Stress Disorder: A Literature Review

Authors: Daniel Azizyan, Marina Vardanyan, Astghik Dallakyan

Abstract:

The objective of this literature review is to bring valuable and much-needed insight into Virtual Reality Exposure Therapy (VRET) for the treatment of Post-Traumatic Stress Disorder (PTSD) among military personnel. As the issues regarding war veterans who suffer from PTSD become more and more widespread, the task of finding possible solutions that would provide alternative approaches to existing methods being used today becomes more relevant than ever. By analyzing the previous applications of VRET, this literature review covers the state of the research done currently on the topic, reviews the known information while identifying the main problems, and aims to use missed opportunities and find potential solutions. It provides the answers to the most relevant questions concerning VRET and leads to important conclusions in the hope of making the technology more practical, widespread, and effective.

Keywords: military PTSD, post-traumatic stress disorder, prolonged exposure, virtual reality exposure therapy, VRE

Procedia PDF Downloads 122
4208 Biomass Waste-To-Energy Technical Feasibility Analysis: A Case Study for Processing of Wood Waste in Malta

Authors: G. A. Asciak, C. Camilleri, A. Rizzo

Abstract:

The waste management in Malta is a national challenge. Coupled with Malta’s recent economic boom, which has seen massive growth in several sectors, especially the construction industry, drastic actions need to be taken. Wood waste, currently being dumped in landfills, is one type of waste which has increased astronomically. This research study aims to carry out a thorough examination on the possibility of using this waste as a biomass resource and adopting a waste-to-energy technology in order to generate electrical energy. This study is composed of three distinct yet interdependent phases, namely, data collection from the local SMEs, thermal analysis using the bomb calorimeter, and generation of energy from wood waste using a micro biomass plant. Data collection from SMEs specializing in wood works was carried out to obtain information regarding the available types of wood waste, the annual weight of imported wood, and to analyse the manner in which wood shavings are used after wood is manufactured. From this analysis, it resulted that five most common types of wood available in Malta which would suitable for generating energy are Oak (hardwood), Beech (hardwood), Red Beech (softwood), African Walnut (softwood) and Iroko (hardwood). Subsequently, based on the information collected, a thermal analysis using a 6200 Isoperibol calorimeter on the five most common types of wood was performed. This analysis was done so as to give a clear indication with regards to the burning potential, which will be valuable when testing the wood in the biomass plant. The experiments carried out in this phase provided a clear indication that the African Walnut generated the highest gross calorific value. This means that this type of wood released the highest amount of heat during the combustion in the calorimeter. This is due to the high presence of extractives and lignin, which accounts for a slightly higher gross calorific value. This is followed by Red Beech and Oak. Moreover, based on the findings of the first phase, both the African Walnut and Red Beech are highly imported in the Maltese Islands for use in various purposes. Oak, which has the third highest gross calorific value is the most imported and common wood used. From the five types of wood, three were chosen for use in the power plant on the basis of their popularity and their heating values. The PP20 biomass plant was used to burn the three types of shavings in order to compare results related to the estimated feedstock consumed by the plant, the high temperatures generated, the time taken by the plant to produce gasification temperatures, and the projected electrical power attributed to each wood type. From the experiments, it emerged that whilst all three types reached the required gasification temperature and thus, are feasible for electrical energy generation. African Walnut was deemed to be the most suitable fast-burning fuel. This is followed by Red-beech and Oak, which required a longer period of time to reach the required gasification temperatures. The results obtained provide a clear indication that wood waste can not only be treated instead of being dumped in dumped in landfill but coupled.

Keywords: biomass, isoperibol calorimeter, waste-to-energy technology, wood

Procedia PDF Downloads 244
4207 Process Integration: Mathematical Model for Contaminant Removal in Refinery Process Stream

Authors: Wasif Mughees, Malik Al-Ahmad

Abstract:

This research presents the graphical design analysis and mathematical programming technique to dig out the possible water allocation distribution to minimize water usage in process units. The study involves the mass and property integration in its core methodology. Tehran Oil Refinery is studied to implement the focused water pinch technology for regeneration, reuse and recycling of water streams. Process data is manipulated in terms of sources and sinks, which are given in terms of properties. Sources are the streams to be allocated. Sinks are the units which can accept the sources. Suspended Solids (SS) is taken as a single contaminant. The model minimizes the mount of freshwater from 340 to 275m3/h (19.1%). Redesigning and allocation of water streams was built. The graphical technique and mathematical programming shows the consistency of results which confirms mass transfer dependency of water streams.

Keywords: minimization, water pinch, process integration, pollution prevention

Procedia PDF Downloads 321
4206 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS

Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili

Abstract:

Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.

Keywords: construction, debris flow, geoinformatics systems, program RAMMS

Procedia PDF Downloads 148
4205 Real-Time Pothole Detection Using YOLOv11

Authors: Kosuri Harshitha Durga, Ritesh Yaduwanshi

Abstract:

Potholes are one of the most significant problems that affect road safety and the quality of infrastructure. The aim of pothole detection using OpenCV is to design an automated system that will detect and create a map of potholes on the road surfaces to improve the safety of roads and ease the maintenance process. This system is based on high-powered computer vision methods that use still images or video footage taken by cameras located in cars or drones. This paper presents an analysis of the implementation of the YOLOv11 model in pedestrian detection and demonstrates greater effectiveness of this method in regards to accuracy, speed, and efficiency of inference. The improved system now supports enhanced prompt diagnosis and timely repair leaving little or no damage on the infrastructure and also ensuring that enhanced road safety is achieved. This technology can also be used as a safety feature for the car itself by being installed in ADAS systems that would alert drivers in real-time while driving to avoid driving over potholes.

Keywords: deep learning, Potholes, segmentation, object detection, YOLO

Procedia PDF Downloads 8
4204 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 317
4203 Research on the Construction of Fair Use of Copyright and Compensation System for Artificial Intelligence Creation

Authors: Shen Xiaoyun

Abstract:

The AI-generated works must intersect with the right holder’s work, thus having a certain impact on the rights and interests of the right holder’s work. The law needs to explore and improve the regulation of the fair use of AI creations and build a compensation system to adapt to the development of the times. The development of AI technology has brought about problems such as the unclear relationship between fair use and infringement of copyright, the unclear general terms and conditions of application, and the incomplete criteria for judging at different stages. Through different theoretical methods, the legitimacy of the rational use of the system can be demonstrated. The compensation standard for fair use of copyright in AI creation can refer to the market pricing of the right holder's work, and the compensation can construct a formula for the amount of damages for AI copyright infringement, and construct the compensation standard based on the main factors affecting the market value of the work, so as to provide a reference for the construction of a compensation system for fair use of works generated by AI.

Keywords: artificial intelligence, creative acts, fair use of copyright, copyright compensation system

Procedia PDF Downloads 28
4202 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 296
4201 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 67
4200 Automatic Facial Skin Segmentation Using Possibilistic C-Means Algorithm for Evaluation of Facial Surgeries

Authors: Elham Alaee, Mousa Shamsi, Hossein Ahmadi, Soroosh Nazem, Mohammad Hossein Sedaaghi

Abstract:

Human face has a fundamental role in the appearance of individuals. So the importance of facial surgeries is undeniable. Thus, there is a need for the appropriate and accurate facial skin segmentation in order to extract different features. Since Fuzzy C-Means (FCM) clustering algorithm doesn’t work appropriately for noisy images and outliers, in this paper we exploit Possibilistic C-Means (PCM) algorithm in order to segment the facial skin. For this purpose, first, we convert facial images from RGB to YCbCr color space. To evaluate performance of the proposed algorithm, the database of Sahand University of Technology, Tabriz, Iran was used. In order to have a better understanding from the proposed algorithm; FCM and Expectation-Maximization (EM) algorithms are also used for facial skin segmentation. The proposed method shows better results than the other segmentation methods. Results include misclassification error (0.032) and the region’s area error (0.045) for the proposed algorithm.

Keywords: facial image, segmentation, PCM, FCM, skin error, facial surgery

Procedia PDF Downloads 586
4199 Development of Solar Poly House Tunnel Dryer (STD) for Medicinal Plants

Authors: N. C. Shahi, Anupama Singh, E. Kate

Abstract:

Drying is practiced to enhance the storage life, to minimize losses during storage, and to reduce transportation costs of agricultural products. Drying processes range from open sun drying to industrial drying. In most of the developing countries, use of fossil fuels for drying of agricultural products has not been practically feasible due to unaffordable costs to majority of the farmers. On the other hand, traditional open sun drying practiced on a large scale in the rural areas of the developing countries suffers from high product losses due to inadequate drying, fungal growth, encroachment of insects, birds and rodents, etc. To overcome these problems a middle technology dryer having low cost need to be developed for farmers. In case of mechanical dryers, the heated air is the main driving force for removal of moisture. The air is heated either electrically or by burning wood, coal, natural gas etc. using heaters. But, all these common sources have finite supplies. The lifetime is estimated to range from 15 years for a natural gas to nearly 250 years for coal. So, mankind must turn towards its safe and reliable utilization and may have undesirable side effects. The mechanical drying involves higher cost of drying and open sun drying deteriorates the quality. The solar tunnel dryer is one of promising option for drying various agricultural and agro-industrial products on large scale. The advantage of Solar tunnel dryer is its relatively cheaper cost of construction and operation. Although many solar dryers have been developed, still there is a scope of modification in them. Therefore, an attempt was made to develop Solar tunnel dryer and test its performance using highly perishable commodity i.e. leafy vegetables (spinach). The effect of air velocity, loading density and shade net on performance parameters namely, collector efficiency, drying efficiency, overall efficiency of dryer and specific heat energy consumption were also studied. Thus, the need for an intermediate level technology was realized and an effort was made to develop a small scale Solar Tunnel Dryer . A dryer consisted of base frame, semi cylindrical drying chamber, solar collector and absorber, air distribution system with chimney and auxiliary heating system, and wheels for its mobility were the main functional components. Drying of fenugreek was carried out to analyze the performance of the dryer. The Solar Tunnel Dryer temperature was maintained using the auxiliary heating system. The ambient temperature was in the range of 12-33oC. The relative humidity was found inside and outside the Solar Tunnel Dryer in the range of 21-75% and 35-79%, respectively. The solar radiation was recorded in the range of 350-780W/m2 during the experimental period. Studies revealed that total drying time was in range of 230 to 420 min. The drying time in Solar Tunnel Dryer was considerably reduced by 67% as compared to sun drying. The collector efficiency, drying efficiency, overall efficiency and specific heat consumption were determined and were found to be in the range of 50.06- 38.71%, 15.53-24.72%, 4.25 to 13.34% and 1897.54-3241.36 kJ/kg, respectively.

Keywords: overall efficiency, solar tunnel dryer, specific heat consumption, sun drying

Procedia PDF Downloads 314
4198 Application of the MOOD Technique to the Steady-State Euler Equations

Authors: Gaspar J. Machado, Stéphane Clain, Raphael Loubère

Abstract:

The goal of the present work is to numerically study steady-state nonlinear hyperbolic equations in the context of the finite volume framework. We will consider the unidimensional Burgers' equation as the reference case for the scalar situation and the unidimensional Euler equations for the vectorial situation. We consider two approaches to solve the nonlinear equations: a time marching algorithm and a direct steady-state approach. We first develop the necessary and sufficient conditions to obtain the existence and unicity of the solution. We treat regular examples and solutions with a steady shock and to provide very-high-order finite volume approximations we implement a method based on the MOOD technology (Multi-dimensional Optimal Order Detection). The main ingredient consists in using an 'a posteriori' limiting strategy to eliminate non physical oscillations deriving from the Gibbs phenomenon while keeping a high accuracy for the smooth part.

Keywords: Euler equations, finite volume, MOOD, steady-state

Procedia PDF Downloads 278
4197 An Invertebrate-Type Lysozyme from Chinese Mitten Crab Eriocheir Sinensis: Cloning and Characterization

Authors: Fengmei Li, Li Xu, Guoliang Xia

Abstract:

Lysozyme is a catalytic enzyme that performs bacterial cell lysis by cleaving the β-1,4-glycosidic bond between N-acetylmuramic acid and N-acetylglucosamine of peptidoglycan in cell walls. In the present study, an invertebrate-type (i-type) lysozyme gene was cloned from Chinese mitten crab Eriocheir sinensis (designated as EsLysozyme) based on PCR-based rapid amplification of cDNA ends (RACE) technology. The full-length cDNA of EsLysozyme was of 831 bp. SMART and SIGNALP 3.0 program analysis revealed that EsLysozyme contained a signal peptide and a destabilase domain. The five amino acid residues (Tyr63, Trp64, Tyr91, His110, Pro114) and the conserved motif GSLSCG(P/Y)FQI and CL(E/L/R/H)C(I/M)C in i-type lysozymes were also found in EsLysozyme. The high similarity of EsLysozyme with L. vannamei lysozymes and phylogenetic analysis suggested that EsLysozyme should be a new member of i-type lysozyme family.

Keywords: i-type lysozyme, Eriocheir sinensis, cloning, characterization

Procedia PDF Downloads 298
4196 Methodology of Choosing Technology and Sizing of the Hybrid Energy Storage Based on Cost-benefit Analysis

Authors: Krzysztof Rafał, Weronika Radziszewska, Hubert Biedka, Oskar Grabowski, Krzysztof Mik

Abstract:

We present a method to choose energy storage technologies and their parameters for the economic operation of a microgrid. A grid-connected system with local loads and PV generation is assumed, where an energy storage system (ESS) is attached to minimize energy cost by providing energy balancing and arbitrage functionalities. The ESS operates in a hybrid configuration and consists of two unique technologies operated in a coordinated way. Based on given energy profiles and economical data a model calculates financial flow for ESS investment, including energy cost and ESS depreciation resulting from degradation. The optimization strategy proposes a hybrid set of two technologies with their respective power and energy ratings to minimize overall system cost in a given timeframe. Results are validated through microgrid simulations using real-life input profiles.

Keywords: energy storage, hybrid energy storage, cost-benefit analysis, microgrid, battery sizing

Procedia PDF Downloads 221
4195 A Technology of Hot Stamping and Welding of Carbon Reinforced Plastic Sheets Using High Electric Resistance

Authors: Tomofumi Kubota, Mitsuhiro Okayasu

Abstract:

In recent years, environmental problems and energy problems typified by global warming are intensifying, and transportation devices are required to reduce the weight of structural materials from the viewpoint of strengthening fuel efficiency regulations and energy saving. Carbon fiber reinforced plastic (CFRP) used in this research is attracting attention as a structural material to replace metallic materials. Among them, thermoplastic CFRP is expected to expand its application range in terms of recyclability and cost. High formability and weldability of the unidirectional CFRP sheets conducted by a proposed hot stamping process were proposed, in which the carbon fiber reinforced plastic sheets are heated by a designed technique. In this case, the CFRP sheets are heated by the high electric voltage applied through carbon fibers. In addition, the electric voltage was controlled by the area ratio of exposed carbon fiber on the sample surfaces. The lower exposed carbon fiber on the sample surface makes high electric resistance leading to the high sample temperature. In this case, the CFRP sheets can be heated to more than 150 °C. With the sample heating, the stamping and welding technologies can be carried out. By changing the sample temperature, the suitable stamping condition can be detected. Moreover, the proper welding connection of the CFRP sheets was proposed. In this study, we propose a fusion bonding technique using thermoplasticity, high current flow, and heating caused by electrical resistance. This technology uses the principle of resistance spot welding. In particular, the relationship between the carbon fiber exposure rate and the electrical resistance value that affect the bonding strength is investigated. In this approach, the mechanical connection using rivet is also conducted to make a comparison of the severity of welding. The change of connecting strength is reflected by the fracture mechanism. The low and high connecting strength are obtained for the separation of two CFRP sheets and fractured inside the CFRP sheet, respectively. In addition to the two fracture modes, micro-cracks in CFRP are also detected. This approach also includes mechanical connections using rivets to compare the severity of the welds. The change in bond strength is reflected by the destruction mechanism. Low and high bond strengths were obtained to separate the two CFRP sheets, each broken inside the CFRP sheets. In addition to the two failure modes, micro cracks in CFRP are also detected. In this research, from the relationship between the surface carbon fiber ratio and the electrical resistance value, it was found that different carbon fiber ratios had similar electrical resistance values. Therefore, we investigated which of carbon fiber and resin is more influential to bonding strength. As a result, the lower the carbon fiber ratio, the higher the bonding strength. And this is 50% better than the conventional average strength. This can be evaluated by observing whether the fracture mode is interface fracture or internal fracture.

Keywords: CFRP, hot stamping, weliding, deforamtion, mechanical property

Procedia PDF Downloads 127
4194 Nanostructure Antireflective Sol-Gel Silica Coatings for Solar Collectors

Authors: Najme Lari, Shahrokh Ahangarani, Ali Shanaghi

Abstract:

Sol-gel technology is a promising manufacturing method to produce anti reflective silica thin films for solar energy applications. So to improve the properties of the films, controlling parameter of the sol - gel method is very important. In this study, soaking treatment effect on optical properties of silica anti reflective thin films was investigated. UV-Visible Spectroscopy, Fourier-Transformed Infrared Spectrophotometer and Field Emission Scanning Electron Microscopy was used for the characterization of silica thin films. Results showed that all nanoporous silica layers cause to considerable reduction of light reflections compared with uncoated glasses. With single layer deposition, the amount of reduction depends on the dipping time of coating and has an optimal time. Also, it was found that solar transmittance increased from 91.5% for the bare slide up to 97.5% for the best made sample corresponding to two deposition cycles.

Keywords: sol–gel, silica thin films, anti reflective coatings, optical properties, soaking treatment

Procedia PDF Downloads 456
4193 Sustainability Model for Rural Telecenter Using Business Intelligence Technique

Authors: Razak Rahmat, Azizah Ahmad, Rafidah Razak, Roshidi Din, Azizi Abas

Abstract:

Telecenter is a place where communities can access computers, the Internet, and other digital technologies to enable them to gather information, create, learn, and communicate with others. However, previous studies found that sustainability issues related to economic, political and institutional, social and technology is one of the major problem faced by the telecenter. Based on that problem, this research is planning to design a possible solution on rural telecenters sustainability with the support of business intelligence (BI). The empirical study will be conducted through the qualitative and quantitative method including interviews and observations with a range of stakeholders including ministry officers, telecenters managers and operators. Result from the data collection will be analyze using the causal modeling approach of SEM SmartPLS for the validity. The expected finding from this research is the Business Intelligent Requirement Model as a guild for sustainability of the rural telecenters.

Keywords: Rural ICT Telecenter(RICTT), business intelligence, sustainability, requirement analysis modal

Procedia PDF Downloads 485
4192 Adopting English as a Language of Instruction of STEM in Tunisian Higher Education Institutions: Promises and Challenges

Authors: Mimoun Melliti

Abstract:

This research paper investigates the promises, challenges, and perspectives associated with teaching STEM subjects in English within Tunisian higher education institutions. The study explores the potential benefits of English-medium instruction in Science, Technology, Engineering, and Mathematics (henceforth STEM) education, with a special focus on enhanced global competitiveness, improved English language proficiency, and increased access to international resources and collaborations. Additionally, it examines the various challenges faced by educators and students, such as language shift/barriers, curriculum adaptation, faculty training, and student support. Through a comprehensive analysis of promises and challenges, this paper aims to provide insights and recommendations for effectively implementing English medium instruction (henceforth EMI) of STEM in Tunisian higher education institutions. The paper concludes with a recommended action plan for the proper introduction of EMI of STEM in Tunisia.

Keywords: EMI;, STEM education, EFL, language reforms

Procedia PDF Downloads 78
4191 Carbon Footprint Assessment and Application in Urban Planning and Geography

Authors: Hyunjoo Park, Taehyun Kim, Taehyun Kim

Abstract:

Human life, activity, and culture depend on the wider environment. Cities offer economic opportunities for goods and services, but cannot exist in environments without food, energy, and water supply. Technological innovation in energy supply and transport speeds up the expansion of urban areas and the physical separation from agricultural land. As a result, division of urban agricultural areas causes more energy demand for food and goods transport between the regions. As the energy resources are leaking all over the world, the impact on the environment crossing the boundaries of cities is also growing. While advances in energy and other technologies can reduce the environmental impact of consumption, there is still a gap between energy supply and demand by current technology, even in technically advanced countries. Therefore, reducing energy demand is more realistic than relying solely on the development of technology for sustainable development. The purpose of this study is to introduce the application of carbon footprint assessment in fields of urban planning and geography. In urban studies, carbon footprint has been assessed at different geographical scales, such as nation, city, region, household, and individual. Carbon footprint assessment for a nation and a city is available by using national or city level statistics of energy consumption categories. By means of carbon footprint calculation, it is possible to compare the ecological capacity and deficit among nations and cities. Carbon footprint also offers great insight on the geographical distribution of carbon intensity at a regional level in the agricultural field. The study shows the background of carbon footprint applications in urban planning and geography by case studies such as figuring out sustainable land-use measures in urban planning and geography. For micro level, footprint quiz or survey can be adapted to measure household and individual carbon footprint. For example, first case study collected carbon footprint data from the survey measuring home energy use and travel behavior of 2,064 households in eight cities in Gyeonggi-do, Korea. Second case study analyzed the effects of the net and gross population densities on carbon footprint of residents at an intra-urban scale in the capital city of Seoul, Korea. In this study, the individual carbon footprint of residents was calculated by converting the carbon intensities of home and travel fossil fuel use of respondents to the unit of metric ton of carbon dioxide (tCO₂) by multiplying the conversion factors equivalent to the carbon intensities of each energy source, such as electricity, natural gas, and gasoline. Carbon footprint is an important concept not only for reducing climate change but also for sustainable development. As seen in case studies carbon footprint may be measured and applied in various spatial units, including but not limited to countries and regions. These examples may provide new perspectives on carbon footprint application in planning and geography. In addition, additional concerns for consumption of food, goods, and services can be included in carbon footprint calculation in the area of urban planning and geography.

Keywords: carbon footprint, case study, geography, urban planning

Procedia PDF Downloads 290
4190 Data Poisoning Attacks on Federated Learning and Preventive Measures

Authors: Beulah Rani Inbanathan

Abstract:

In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.

Keywords: data poisoning, federated learning, Internet of Things, edge computing

Procedia PDF Downloads 88
4189 Design of Intelligent Scaffolding Learning Management System for Vocational Education

Authors: Seree Chadcham, Niphon Sukvilai

Abstract:

This study is the research and development which is intended to: 1) design of the Intelligent Scaffolding Learning Management System (ISLMS) for vocational education, 2) assess the suitability of the Design of Intelligent Scaffolding Learning Management System for Vocational Education. Its methods are divided into 2 phases. Phase 1 is the design of the ISLMS for Vocational Education and phase 2 is the assessment of the suitability of the design. The samples used in this study are work done by 15 professionals in the field of Intelligent Scaffolding, Learning Management System, Vocational Education, and Information and Communication Technology in education selected using the purposive sampling method. Data analyzed by arithmetic mean and standard deviation. The results showed that the ISLMS for vocational education consists of 2 main components which are: 1) the Intelligent Learning Management System for Vocational Education, 2) the Intelligent Scaffolding Management System. The result of the system suitability assessment from the professionals is in the highest range.

Keywords: intelligent, scaffolding, learning management system, vocational education

Procedia PDF Downloads 797
4188 Analysis of Transmedia Storytelling in Pokémon GO

Authors: Iva Nedelcheva

Abstract:

This study is part of a doctoral thesis on the topic of Hyperfiction: Past, Present and Future of Storytelling through Hypertext. It explores in depth the impact of transmedia storytelling and the role of hypertext in the realm of the currently popular social media phenomenon Pokémon GO. Storytelling is a powerful method to engage and unite people. Moreover, the technology progress adds a whole new angle to the method, with hypertext and cross-platform sharing that enhance the traditional storytelling so much that transmedia storytelling gives unlimited opportunities to affect the everyday life of people across the globe. This research aims at examining the transmedia storytelling approach in Pokémon GO, and explaining how that contributed to its establishment as a massive worldwide hit in less than a week. The social engagement is investigated in all major media platforms, including traditional and online media channels. Observation and content analyses are reported in this paper to form the conclusion that transmedia storytelling with the input of hypertext has a promising future as a method of establishing a productive and rewarding communication strategy.

Keywords: communication, hypertext, Pokemon Go, storytelling, transmedia

Procedia PDF Downloads 171
4187 Prioritizing The Evaluation factors of Hospital Information System with The Analytical Hierarchy Process

Authors: F.Sadoughi, A. Sarsarshahi, L, Eerfannia, S.M.A. Khatami

Abstract:

Hospital information systems with lots of ability would lead to health care quality improvement. Evaluation of this system has done according different method and criteria. The main goal of present study is to prioritize the most important factors which are influence these systems evaluation. At the first step, according relevant literature, three main factor and 29 subfactors extracted. Then, study framework was designed. Based on analytical hierarchical process (AHP), 28 paired comparisons with Saaty range, in a questionnaire format obtained. Questionnaires were filled by 10 experts in health information management and medical informatics field. Human factors with weight of 0.55 were ranked as the most important. Organization (0.25) and technology (0.14) were in next place. It seems MADM methods such as AHP have enough potential to use in health research and provide positive opportunities for health domain decision makers.

Keywords: Analytical hierarchy process, Multiple criteria decision-making (MCDM), Hospital information system, Evaluation factors

Procedia PDF Downloads 455
4186 Optimizing Quantum Machine Learning with Amplitude and Phase Encoding Techniques

Authors: Om Viroje

Abstract:

Quantum machine learning represents a frontier in computational technology, promising significant advancements in data processing capabilities. This study explores the significance of data encoding techniques, specifically amplitude and phase encoding, in this emerging field. By employing a comparative analysis methodology, the research evaluates how these encoding techniques affect the accuracy, efficiency, and noise resilience of quantum algorithms. Our findings reveal that amplitude encoding enhances algorithmic accuracy and noise tolerance, whereas phase encoding significantly boosts computational efficiency. These insights are crucial for developing robust quantum frameworks that can be effectively applied in real-world scenarios. In conclusion, optimizing encoding strategies is essential for advancing quantum machine learning, potentially transforming various industries through improved data processing and analysis.

Keywords: quantum machine learning, data encoding, amplitude encoding, phase encoding, noise resilience

Procedia PDF Downloads 25