Search results for: Three dimensional Optical Code Division Multiple Access (3-D OCDMA)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12788

Search results for: Three dimensional Optical Code Division Multiple Access (3-D OCDMA)

12428 Optimization of Spatial Light Modulator to Generate Aberration Free Optical Traps

Authors: Deepak K. Gupta, T. R. Ravindran

Abstract:

Holographic Optical Tweezers (HOTs) in general use iterative algorithms such as weighted Gerchberg-Saxton (WGS) to generate multiple traps, which produce traps with 99% uniformity theoretically. But in experiments, it is the phase response of the spatial light modulator (SLM) which ultimately determines the efficiency, uniformity, and quality of the trap spots. In general, SLMs show a nonlinear phase response behavior, and they may even have asymmetric phase modulation depth before and after π. This affects the resolution with which the gray levels are addressed before and after π, leading to a degraded trap performance. We present a method to optimize the SLM for a linear phase response behavior along with a symmetric phase modulation depth around π. Further, we optimize the SLM for its varying phase response over different spatial regions by optimizing the brightness/contrast and gamma of the hologram in different subsections. We show the effect of the optimization on an array of trap spots resulting in improved efficiency and uniformity. We also calculate the spot sharpness metric and trap performance metric and show a tightly focused spot with reduced aberration. The trap performance is compared by calculating the trap stiffness of a trapped particle in a given trap spot before and after aberration correction. The trap stiffness is found to improve by 200% after the optimization.

Keywords: spatial light modulator, optical trapping, aberration, phase modulation

Procedia PDF Downloads 187
12427 Static Analysis Deployment Model for Code Quality on Research and Development Projects of Software Development

Authors: Jeong-Hyun Park, Young-Sik Park, Hyo-Teag Jung

Abstract:

This paper presents static analysis deployment model for code quality on R&D Projects of SW Development. The proposed model includes the scope of R&D projects and index for static analysis of source code, operation model and execution process, environments and infrastructure system for R&D projects of SW development. There is the static analysis result of pilot project as case study based on the proposed deployment model and environment, and strategic considerations for success operation of the proposed static analysis deployment model for R&D Projects of SW Development. The proposed static analysis deployment model in this paper will be adapted and improved continuously for quality upgrade of R&D projects, and customer satisfaction of developed source codes and products.

Keywords: static analysis, code quality, coding rules, automation tool

Procedia PDF Downloads 520
12426 Two Dimensional Numerical Analysis for the Seismic Response of the Geosynthetic-Reinforced Soil Integral Abutments

Authors: Dawei Shen, Ming Xu, Pengfei Liu

Abstract:

The joints between simply supported bridge decks and abutments need to be regularly repaired, which would greatly increase the cost during the service life of the bridge. Simply supported girder bridges suffered the most severe damage during earthquakes. Another type of bridge, the integral bridge, of which the superstructure and abutment are rigidly connected, was also used in some European countries. Because no bearings or joints exit in the integral bridge, this type of bridge could significantly reduce maintenance requirements and costs. However, conventional integral bridge usually result in high earth pressure on the abutment and surface settlement in the backfill. To solve these problems, a new type of integral bridge, geosynthetic-reinforced soil (GRS) integral bridge, was come up in recent years. This newly invented bridge has not been used in engineering practices. There was a lack of research on the seismic behavior of the conventional and new type of integral abutments. In addition, no common design code could be found for the calculation of seismic pressure of soil behind the abutment. This paper developed a dynamic constitutive model, which can consider the soil behaviors under cyclic loading. Numerical analyses of the seismic response of a full height integral bridge and GRS integral bridge were carried out using the two-dimensional numerical code, FLAC. A parametric study was also performed to investigate the soil-structure interaction. The results are presented below. The seismic responses of GRS integral bridge together with conventional simply supported bridge, GRS conventional bridge and conventional integral bridge were investigated. The results show that the GRS integral bridge holds the highest seismic stability, followed by conventional integral bridge, GRS simply supported bridge and conventional simply supported bridge. Compared with the integral bridge with 1 m thick abutments, the GRS integral bridge with 0.4 m thick abutments is subjected to a smaller bending moment, and the natural frequency and horizontal displacement remains almost the same. Geosynthetic-reinforcement will be more effective when the abutment becomes thinner or the abutment is higher.

Keywords: geosynthetic-reinforced soil integral bridge, nonlinear hysteretic model, numerical analysis, seismic response

Procedia PDF Downloads 463
12425 Software Development to Empowering Digital Libraries with Effortless Digital Cataloging and Access

Authors: Abdul Basit Kiani

Abstract:

The software for the digital library system is a cutting-edge solution designed to revolutionize the way libraries manage and provide access to their vast collections of digital content. This advanced software leverages the power of technology to offer a seamless and user-friendly experience for both library staff and patrons. By implementing this software, libraries can efficiently organize, store, and retrieve digital resources, including e-books, audiobooks, journals, articles, and multimedia content. Its intuitive interface allows library staff to effortlessly manage cataloging, metadata extraction, and content enrichment, ensuring accurate and comprehensive access to digital materials. For patrons, the software offers a personalized and immersive digital library experience. They can easily browse the digital catalog, search for specific items, and explore related content through intelligent recommendation algorithms. The software also facilitates seamless borrowing, lending, and preservation of digital items, enabling users to access their favorite resources anytime, anywhere, on multiple devices. With robust security features, the software ensures the protection of intellectual property rights and enforces access controls to safeguard sensitive content. Integration with external authentication systems and user management tools streamlines the library's administration processes, while advanced analytics provide valuable insights into patron behavior and content usage. Overall, this software for the digital library system empowers libraries to embrace the digital era, offering enhanced access, convenience, and discoverability of their vast collections. It paves the way for a more inclusive and engaging library experience, catering to the evolving needs of tech-savvy patrons.

Keywords: software development, empowering digital libraries, digital cataloging and access, management system

Procedia PDF Downloads 82
12424 Optical Board as an Artificial Technology for a Peer Teaching Class in a Nigerian University

Authors: Azidah Abu Ziden, Adu Ifedayo Emmanuel

Abstract:

This study investigated the optical board as an artificial technology for peer teaching in a Nigerian university. A design and development research (DDR) design was adopted, which entailed the planning and testing of instructional design models adopted to produce the optical board. This research population involved twenty-five (25) peer-teaching students at a Nigerian university consisting of theatre arts, religion, and language education-related disciplines. Also, using a random sampling technique, this study selected eight (8) students to work on the optical board. Besides, this study introduced a research instrument titled lecturer assessment rubric containing 30-mark metrics for evaluating students’ teaching with the optical board. In this study, it was discovered that the optical board affords students acquisition of self-employment skills through their exposure to the peer teaching course, which is a teacher training module in Nigerian universities. It is evident in this study that students were able to coordinate their design and effectively develop the optical board without lecturer’s interference. This kind of achievement in this research shows that the Nigerian university curriculum had been designed with contents meant to spur students to create jobs after graduation, and effective implementation of the readily available curriculum contents is enough to imbue students with the needed entrepreneurial skills. It was recommended that the Federal Government of Nigeria (FGN) must discourage the poor implementation of Nigerian university curriculum and invest more in the betterment of the readily available curriculum instead of considering a synonymously acclaimed new curriculum for regurgitated teaching and learning process.

Keywords: optical board, artificial technology, peer teaching, educational technology, Nigeria, Malaysia, university, glass, wood, electrical, improvisation

Procedia PDF Downloads 67
12423 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 503
12422 SPBAC: A Semantic Policy-Based Access Control for Database Query

Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage

Abstract:

Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.

Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML

Procedia PDF Downloads 90
12421 Magnetohydrodynamic Flows in a Conduit with Multiple Channels under a Magnetic Field Applied Perpendicular to the Plane of Flow

Authors: Yang Luo, Chang Nyung Kim

Abstract:

This study numerically analyzes a steady-state, three-dimensional liquid-metal magnetohydrodynamic flows in a conduit with multiple channels under a uniform magnetic field. The geometry of the conduit is of a four-parallel-channels system including one inflow channel and three outflow channels. The liquid-metal flows in the inflow channel, then turns 1800 in the transition segment, finally flows into three different outflow channels simultaneously. This kind of channel system can induce counter flow and co-flow, which is rarely investigated before. The axial velocity in the side layer near the first partitioning wall, which is located between the inflow channel and the first outflow channel, is the highest. ‘M-shaped’ velocity profiles are obtained in the side layers of the inflow and outflow channels. The interdependency of the current, fluid velocity, pressure, electric potential is examined in order to describe the electromagnetic characteristics of the liquid-metal flows.

Keywords: liquid-metal, multiple channels, magnetic field, magnetohydrodynamic

Procedia PDF Downloads 281
12420 Nonlinear Absorption and Scattering in Wide Band Gap Silver Sulfide Nanoparticles Colloid and Their Effects on the Optical Limiting

Authors: Hoda Aleali, Nastran Mansour, Maryam Mirzaie

Abstract:

In this paper, we study the optical nonlinearities of Silver sulfide (Ag2S) nanostructures dispersed in the Dimethyl sulfoxide (DMSO) under exposure to 532 nm, 15 nanosecond (ns) pulsed laser irradiation. Ultraviolet–visible absorption spectrometry (UV-Vis), X-ray diffraction (XRD), and transmission electron microscopy (TEM) are used to characterize the obtained nanocrystal samples. The band gap energy of colloid is determined by analyzing the UV–Vis absorption spectra of the Ag2S NPs using the band theory of semiconductors. Z-scan technique is used to characterize the optical nonlinear properties of the Ag2S nanoparticles (NPs). Large enhancement of two photon absorption effect is observed with increase in concentration of the Ag2S nanoparticles using open Z-scan measurements in the ns laser regime. The values of the nonlinear absorption coefficients are determined based on the local nonlinear responses including two photon absorption. The observed aperture dependence of the Ag2S NP limiting performance indicates that the nonlinear scattering plays an important role in the limiting action of the sample.The concentration dependence of the optical liming is also investigated. Our results demonstrate that the optical limiting threshold decreases with increasing the silver sulfide NPs in DMSO.

Keywords: nanoscale materials, silver sulfide nanoparticles, nonlinear absorption, nonlinear scattering, optical limiting

Procedia PDF Downloads 396
12419 Electronic and Optical Properties of Li₂S Antifluorite Material

Authors: Brahim Bahloul, Khatir Babesse, Azzedine Dkhira, Yacine Bahloul, Dalila Hammoutene

Abstract:

In this paper, we investigate with ab initio calculations some structural and optoelectronic properties of Li₂S compound. The structural and electronic properties of the Li₂S antifluorite structure have been studied by first-principles calculations within the density functional theory (DFT), whereas the optical properties have been obtained using empirical relationships such as the modified Moss relation. Our calculated lattice parameters are in good agreement with the experimental data and other theoretical calculations. The electronic band structures and density of states were obtained. The anti-fluorite Li₂S present an indirect band gap of 3.388 eV at equilibrium. The top of the valence bands reflects the p electronic character for both structures. The calculated energy gaps and optical constants are in good agreement with experimental measurements.

Keywords: Ab initio calculations, antifluorite, electronic properties, optical properties

Procedia PDF Downloads 290
12418 Temperature-Stable High-Speed Vertical-Cavity Surface-Emitting Lasers with Strong Carrier Confinement

Authors: Yun Sun, Meng Xun, Jingtao Zhou, Ming Li, Qiang Kan, Zhi Jin, Xinyu Liu, Dexin Wu

Abstract:

Higher speed short-wavelength vertical-cavity surface-emitting lasers (VCSELs) working at high temperature are required for future optical interconnects. In this work, the high-speed 850 nm VCSELs are designed, fabricated and characterized. The temperature dependent static and dynamic performance of devices are investigated by using current-power-voltage and small signal modulation measurements. Temperature-stable high-speed properties are obtained by employing highly strained multiple quantum wells and short cavity length of half wavelength. The temperature dependent photon lifetimes and carrier radiative times are determined from damping factor and resonance frequency obtained by fitting the intrinsic optical bandwidth with the two-pole transfer function. In addition, an analytical theoretical model including the strain effect is development based on model-solid theory. The calculation results indicate that the better high temperature performance of VCSELs can be attributed to the strong confinement of holes in the quantum wells leading to enhancement of the carrier transit time.

Keywords: vertical cavity surface emitting lasers, high speed modulation, optical interconnects, semiconductor lasers

Procedia PDF Downloads 126
12417 Localization Problem in Optical Fiber Sensors

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The security industry is making many efforts to lower the costs of system installation. However, the dominant technique is the application of fiber optic sensors. It is necessary to determine the location of the disorder of long optical fiber cables. For a number of years, many research centers developed their own solutions. The article presents the construction of the sensor systems with the possibility of disorder location. We present a methodology for determining location of the disorder. The aim of investigations is to answer the question of which of optical sensor configuration offer the best performance for location of the disorder.

Keywords: fiber optic sensor, security sensor, fiber cables, system instillation

Procedia PDF Downloads 635
12416 Three-Dimensional Generalized Thermoelasticity with Variable Thermal Conductivity

Authors: Hamdy M. Youssef, Mowffaq Oreijah, Hunaydi S. Alsharif

Abstract:

In this paper, a three-dimensional model of the generalized thermoelasticity with one relaxation time and variable thermal conductivity has been constructed. The resulting non-dimensional governing equations together with the Laplace and double Fourier transforms techniques have been applied to a three-dimensional half-space subjected to thermal loading with rectangular pulse and traction free in the directions of the principle co-ordinates. The inverses of double Fourier transforms, and Laplace transforms have been obtained numerically. Numerical results for the temperature increment, the invariant stress, the invariant strain, and the displacement are represented graphically. The variability of the thermal conductivity has significant effects on the thermal and the mechanical waves.

Keywords: thermoelasticity, thermal conductivity, Laplace transforms, Fourier transforms

Procedia PDF Downloads 228
12415 Access to the Forest Ecosystem Services: Understanding the Interaction between Livelihood Capitals and Access

Authors: Abu S. M. G. Kibria, Alison M. Behie, Robert Costanza, Colin Groves, Tracy Farrell

Abstract:

This study is aimed to understand the level of access and the influence of livelihood capitals in maintaining access and control of ecosystem services (ESS) in the Sundarbans, Bangladesh. Besides the villagers, we consider other stakeholders including the forest department, coast guard, police, merchants, pirates and villagers who ‘controlled’ or ‘maintained’ access to ESS (crab catching, shrimp fry, honey, shrimp, mixed fish, fuel wood) in this region. Villagers used human, physical, natural and social capitals to gain access to ESS. The highest level of access was observed in crab catching and the lowest was found in honey collection, both of which were done when balancing the costs and benefits of accessing one ESS against another. The outcomes of these ongoing access negotiations were determined by livelihood capitals of the households. In addition, it was often found that the certain variables could have a positive effect on one ESS and a negative effect on another. For instance, human, social and natural capitals (eldest daughter’s education and No. of livelihood group membership and) had significant positive effects on honey collection while two components of human and social capitals including ‘eldest son’s education’ and ‘severity of pirate problem’ had exactly the opposite impact. These complex interactions were also observed in access to other ESS. It thus seems that access to ESS is not anything which is provided, but rather it is achieved by using livelihood capitals. Protecting any ecosystem from over exploitation and improve wellbeing can be achieved by properly balancing the livelihood capital-access nexus.

Keywords: provisioning services, access level, livelihood capital, interaction, access gain

Procedia PDF Downloads 282
12414 Experimental Demonstration of an Ultra-Low Power Vertical-Cavity Surface-Emitting Laser for Optical Power Generation

Authors: S. Nazhan, Hassan K. Al-Musawi, Khalid A. Humood

Abstract:

This paper reports on an experimental investigation into the influence of current modulation on the properties of a vertical-cavity surface-emitting laser (VCSEL) with a direct square wave modulation. The optical output power response, as a function of the pumping current, modulation frequency, and amplitude, is measured for an 850 nm VCSEL. We demonstrate that modulation frequency and amplitude play important roles in reducing the VCSEL’s power consumption for optical generation. Indeed, even when the biasing current is below the static threshold, the VCSEL emits optical power under the square wave modulation. The power consumed by the device to generate light is significantly reduced to > 50%, which is below the threshold current, in response to both the modulation frequency and amplitude. An operating VCSEL device at low power is very desirable for less thermal effects, which are essential for a high-speed modulation bandwidth.

Keywords: vertical-cavity surface-emitting lasers, VCSELs, optical power generation, power consumption, square wave modulation

Procedia PDF Downloads 165
12413 Simulation of 140 Kv X– Ray Tube by MCNP4C Code

Authors: Amin Sahebnasagh, Karim Adinehvand, Bakhtiar Azadbakht

Abstract:

In this study, we used Monte Carlo code (MCNP4C) that is a general method, for simulation, electron source and electric field, a disc source with 0.05 cm radius in direct of anode are used, radius of disc source show focal spot of x-ray tube that here is 0.05 cm. In this simulation, anode is from tungsten with 18.9 g/cm3 density and angle of anode is 180. we simulated x-ray tube for 140 kv. For increasing of speed data acquisition we use F5 tally. With determination the exact position of F5 tally in program, outputs are acquired. In this spectrum the start point is about 0.02 Mev, the absorption edges are about 0.06 Mev and 0.07 Mev and average energy is about 0.05 Mev.

Keywords: x-spectrum, simulation, Monte Carlo, MCNP4C code

Procedia PDF Downloads 646
12412 The Application of Article 111 of the Constitution of Bangladesh in the Criminal Justice System as a Sentencing Guideline

Authors: Sadiya S. Silvee

Abstract:

Generally, the decision of the higher court is binding on its subordinate courts. As provided in Article 111 of the Constitution, 'the law declared by the Appellate Division (AD) shall be binding on the High Court Division (HCD) and the law declared by either division of the Supreme Court shall be binding on all courts subordinate to it.' This means the judicial discipline requires the HCD to follow the decision of the AD and that it is necessary for the lower tiers of courts to accept the decision of the higher tiers as a binding precedent. Analyzing the application of Article 111 of the Constitution in the criminal justice system as a sentencing guideline, the paper, by examining whether there is any consistency in decision between one HC Bench and another HC Bench, explores whether HCD can per incuriam its previous decision. In doing so, the Death Reference (DR) Cases are contemplated. Furthermore, the paper shall examine whether the Court of Session follows the decision of the HCD while using their discretion to make the choice between death and imprisonment for life under section 302 of PC. The paper argues due to the absence of any specific direction for sentencing and inconsistency in jurisprudence among the HCD; the subordinate courts are in a dilemma.

Keywords: death reference, sentencing factor, sentencing guideline, criminal justice system and constitution

Procedia PDF Downloads 176
12411 Four Phase Methodology for Developing Secure Software

Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García

Abstract:

A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.

Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis

Procedia PDF Downloads 398
12410 Application of Electro-Optical Hybrid Cables in Horizontal Well Production Logging

Authors: Daofan Guo, Dong Yang

Abstract:

For decades, well logging with coiled tubing has relied solely on surface data such as pump pressure, wellhead pressure, depth counter, and weight indicator readings. While this data serves the oil industry well, modern smart logging utilizes real-time downhole information, which automatically increases operational efficiency and optimizes intervention qualities. For example, downhole pressure, temperature, and depth measurement data can be transmitted through the electro-optical hybrid cable in the coiled tubing to surface operators on a real-time base. This paper mainly introduces the unique structural features and various applications of the electro-optical hybrid cables which were deployed into downhole with the help of coiled tubing technology. Fiber optic elements in the cable enable optical communications and distributed measurements, such as distributed temperature and acoustic sensing. The electrical elements provide continuous surface power for downhole tools, eliminating the limitations of traditional batteries, such as temperature, operating time, and safety concerns. The electrical elements also enable cable telemetry operation of cable tools. Both power supply and signal transmission were integrated into an electro-optical hybrid cable, and the downhole information can be captured by downhole electrical sensors and distributed optical sensing technologies, then travels up through an optical fiber to the surface, which greatly improves the accuracy of measurement data transmission.

Keywords: electro-optical hybrid cable, underground photoelectric composite cable, seismic cable, coiled tubing, real-time monitoring

Procedia PDF Downloads 142
12409 Attenuation Scale Calibration of an Optical Time Domain Reflectometer

Authors: Osama Terra, Hatem Hussein

Abstract:

Calibration of Optical Time Domain Reflectometer (OTDR) is crucial for the accurate determination of loss budget for long optical fiber links. In this paper, the calibration of the attenuation scale of an OTDR using two different techniques is discussed and implemented. The first technique is the external modulation method (EM). A setup is proposed to calibrate an OTDR over a dynamic range of around 15 dB based on the EM method. Afterwards, the OTDR is calibrated using two standard reference fibers (SRF). Both SRF are calibrated using cut-back technique; one of them is calibrated at our home institute (the National Institute of Standards – NIS) while the other at the National Physical Laboratory (NPL) of the United Kingdom to confirm our results. In addition, the parameters contributing the calibration uncertainty are thoroughly investigated. Although the EM method has several advantages over the SRF method, the uncertainties in the SRF method is found to surpass that of the EM method.

Keywords: optical time domain reflectometer, fiber attenuation measurement, OTDR calibration, external source method

Procedia PDF Downloads 465
12408 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 123
12407 Isothermal Crystallization Kinetics of Lauric Acid Methyl Ester from DSC Measurements

Authors: Charine Faith H. Lagrimas, Rommel N. Galvan, Rizalinda L. de Leon

Abstract:

An ongoing study, methyl laurate to be used as a refrigerant in an HVAC system, requires the crystallization kinetics of the said substance. Step-wise and normal forms of Avrami model parameters were used to describe the isothermal crystallization kinetics of methyl laurate at different temperatures from Differential Scanning Calorimetry (DSC) measurements. At 3 °C, parameters showed that methyl laurate exhibits a secondary crystallization. The primary crystallization occurred with instantaneous nuclei and spherulitic growth; followed by a secondary instantaneous nucleation with a lower growth of dimensionality, rod-like. At 4 °C to 6 °C, the exotherms from DSC implied that the system was under the isokinetic range. The kinetics behavior is the same which is instantaneous nucleation with one-dimensional growth. The differences for the isokinetic range temperatures are the activation energies (directly proportional to T) and nucleation rates (inversely proportional to T). From the images obtained during the crystallization of methyl laurate using an optical microscope, it is confirmed that the nucleation and crystal growth modes obtained from the optical microscope are consistent with the parameters from Avrami model.

Keywords: Avrami model, isothermal crystallization, lipids kinetics, methyl laurate

Procedia PDF Downloads 342
12406 A New Scheme for Chain Code Normalization in Arabic and Farsi Scripts

Authors: Reza Shakoori

Abstract:

This paper presents a structural correction of Arabic and Persian strokes using manipulation of their chain codes in order to improve the rate and performance of Persian and Arabic handwritten word recognition systems. It collects pure and effective features to represent a character with one consolidated feature vector and reduces variations in order to decrease the number of training samples and increase the chance of successful classification. Our results also show that how the proposed approaches can simplify classification and consequently recognition by reducing variations and possible noises on the chain code by keeping orientation of characters and their backbone structures.

Keywords: Arabic, chain code normalization, OCR systems, image processing

Procedia PDF Downloads 404
12405 Probabilistic Modeling Laser Transmitter

Authors: H. S. Kang

Abstract:

Coupled electrical and optical model for conversion of electrical energy into coherent optical energy for transmitter-receiver link by solid state device is presented. Probability distribution for travelling laser beam switching time intervals and the number of switchings in the time interval is obtained. Selector function mapping is employed to regulate optical data transmission speed. It is established that regulated laser transmission from PhotoActive Laser transmitter follows principal of invariance. This considerably simplifies design of PhotoActive Laser Transmission networks.

Keywords: computational mathematics, finite difference Markov chain methods, sequence spaces, singularly perturbed differential equations

Procedia PDF Downloads 431
12404 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 42
12403 Lateral Torsional Buckling Investigation on Welded Q460GJ Structural Steel Unrestrained Beams under a Point Load

Authors: Yue Zhang, Bo Yang, Gang Xiong, Mohamed Elchalakanic, Shidong Nie

Abstract:

This study aims to investigate the lateral torsional buckling of I-shaped cross-section beams fabricated from Q460GJ structural steel plates. Both experimental and numerical simulation results are presented in this paper. A total of eight specimens were tested under a three-point bending, and the corresponding numerical models were established to conduct parametric studies. The effects of some key parameters such as the non-dimensional member slenderness and the height-to-width ratio, were investigated based on the verified numerical models. Also, the results obtained from the parametric studies were compared with the predictions calculated by different design codes including the Chinese design code (GB50017-2003, 2003), the new draft version of Chinese design code (GB50017-201X, 2012), Eurocode 3 (EC3, 2005) and the North America design code (ANSI/AISC360-10, 2010). These comparisons indicated that the sectional height-to-width ratio does not play an important role to influence the overall stability load-carrying capacity of Q460GJ structural steel beams with welded I-shaped cross-sections. It was also found that the design methods in GB50017-2003 and ANSI/AISC360-10 overestimate the overall stability and load-carrying capacity of Q460GJ welded I-shaped cross-section beams.

Keywords: experimental study, finite element analysis, global stability, lateral torsional buckling, Q460GJ structural steel

Procedia PDF Downloads 327
12402 Flying Women in Chinese Folklore – Male Narrator’s Rejection of Gender Role Division in Patriarchal Societies

Authors: Emma H. Zhang

Abstract:

In Women Who Fly (2018), Serinity Young connects tales and legends of flying women in Greco-Roman, Indo-European, Mesopotamian, and Asian cultures with ancient matriarchal bird goddesses and argues that tales of flying women are reminiscent of the rituals and rites related to the worship of goddesses in pre-patriarchal times and that flying women, including swan maidens, harpies, fairies, and witches are “abnormal women” because they reject patriarchal order, defy, and desert their domestic roles. Tales of flying women in Chinese folklore, exemplified by the story of The Cowherd and the Weaver Girl, replicated in countless tales that depicts the courtship between a mortal man and a divine or magical woman suggest otherwise. In these tales, the divine woman exhibits idealized Confucian femininity and fulfills the needs of the male protagonist by providing him with marriage, children, social status, and financial affluence. This paper argues that the flying women in Chinese folklores are not a symbol of defiance but are exemplars that embodyideal Confucian femininity. These tales are instead a reflection of male rejection of gender division in patriarchal societies. The male protagonists, like the male storytellers, reject the necessity to pursue and provide for women in courtship and marriage. Though these tales show their authors’ and readers’ discontent with gender role division, they do not subvert the patriarchal social order but rather offers an escape through fantasy.

Keywords: bird goddess, folklore, gender role division, patriarchy

Procedia PDF Downloads 165
12401 Component Lifecycle and Concurrency Model in Usage Control (UCON) System

Authors: P. Ghann, J. Shiguang, C. Zhou

Abstract:

Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: Authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON.

Keywords: access control, concurrency, digital container, usage control

Procedia PDF Downloads 320
12400 Applying Multiple Intelligences to Teach Buddhist Doctrines in a Classroom

Authors: Phalaunnnaphat Siriwongs

Abstract:

The classroom of the 21st century is an ever changing forum for new and innovative thoughts and ideas. With increasing technology and opportunity, students have rapid access to information that only decades ago would have taken weeks to obtain. Unfortunately, new techniques and technology are not the cure for the fundamental problems that have plagued the classroom ever since education was established. Class size has been an issue long debated in academia. While it is difficult to pin point an exact number, it is clear that in this case more does not mean better. By looking into the success and pitfalls of classroom size the true advantages of smaller classes will become clear. Previously, one class was comprised of 50 students. Being seventeen and eighteen- year- old students, sometimes it was quite difficult for them to stay focused. To help them understand and gain much knowledge, a researcher introduced “The Theory of Multiple Intelligence” and this, in fact, enabled students to learn according to their own learning preferences no matter how they were being taught. In this lesson, the researcher designed a cycle of learning activities involving all intelligences so that everyone had equal opportunities to learn.

Keywords: multiple intelligences, role play, performance assessment, formative assessment

Procedia PDF Downloads 275
12399 Effect of Temperature on the Structural and Optical Properties of ZnS Thin Films Obtained by Chemical Bath Deposition in Acidic Medium

Authors: Hamid Merzouk, Dajhida Talantikite, Amel Tounsi

Abstract:

Thin films of ZnS have been deposited by chemical route into acidic medium. The deposition time fixed at 5 hours, and the bath temperature varied from 80° C to 95°C with an interval of 5°C. The X-ray diffraction (XRD), UV/ visible spectrophotometry, Fourier Transform Infrared spectroscopy (FTIR) have been used to study the effect of temperature on the structural and optical properties of ZnS thin films. The XRD spectrum of the ZnS layer obtained shows an increase of peaks intensity of ZnS with increasing bath temperature. The study of optical properties exhibit good transmittance (60–80% in the visible region), and the band gap energy of the ZnS thin film decrease from 3.71 eV to 3.64 eV while the refractive index (n) increase with increasing temperature bath. The FTIR analyze confirm our studies and show characteristics bands of vibration of Zn-S.

Keywords: ZnS thin films, XRD spectra, optical gap, XRD

Procedia PDF Downloads 155