Search results for: composite security index
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7926

Search results for: composite security index

7566 Nonlinear Static Analysis of Laminated Composite Hollow Beams with Super-Elliptic Cross-Sections

Authors: G. Akgun, I. Algul, H. Kurtaran

Abstract:

In this paper geometrically nonlinear static behavior of laminated composite hollow super-elliptic beams is investigated using generalized differential quadrature method. Super-elliptic beam can have both oval and elliptic cross-sections by adjusting parameters in super-ellipse formulation (also known as Lamé curves). Equilibrium equations of super-elliptic beam are obtained using the virtual work principle. Geometric nonlinearity is taken into account using von-Kármán nonlinear strain-displacement relations. Spatial derivatives in strains are expressed with the generalized differential quadrature method. Transverse shear effect is considered through the first-order shear deformation theory. Static equilibrium equations are solved using Newton-Raphson method. Several composite super-elliptic beam problems are solved with the proposed method. Effects of layer orientations of composite material, boundary conditions, ovality and ellipticity on bending behavior are investigated.

Keywords: generalized differential quadrature, geometric nonlinearity, laminated composite, super-elliptic cross-section

Procedia PDF Downloads 264
7565 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 198
7564 Paraffin/Expanded Perlite Composite as a Novel Form-Stable Phase Change Material for Latent Heat Energy Storage

Authors: Awni Alkhazaleh

Abstract:

Latent heat storage using Phase Change Materials (PCMs) has attracted growing attention recently in the renewable energy utilization and building energy efficiency. Paraffin (PA) of low melting temperature, which is close to human comfort temperature in the range of 24-28 °C has been considered to be used in building applications. A form-stable composite Paraffin/Expanded perlite (PA-EP) has been prepared by retaining PA into porous particles of EP. DSC (Differential scanning calorimeter) is used to measure the thermal properties of PA in the form-stable composite with/without building materials. TGA (Thermal gravimetric analysis) shows that the composite is thermally stable. SEM (Scanning electron microscope) demonstrates that the layer structure of the EP particles is uniformly absorbed by PA. The mechanical properties in flexural mode have been discussed. The thermal energy storage performance has been evaluated using a small test room (100 mm ×100 mm ×100 mm) with thickness 10 mm. The flammability test of modified sample has been discussed using a cone calorimeter. The results confirm that the form-stable composite PA has the function of reducing building energy consumption.

Keywords: flammability, latent heat storage, paraffin, plasterboard

Procedia PDF Downloads 193
7563 Multiscale Cohesive Zone Modeling of Composite Microstructure

Authors: Vincent Iacobellis, Kamran Behdinan

Abstract:

A finite element cohesive zone model is used to predict the temperature dependent material properties of a polyimide matrix composite with unidirectional carbon fiber arrangement. The cohesive zone parameters have been obtained from previous research involving an atomistic-to-continuum multiscale simulation of the fiber-matrix interface using the bridging cell multiscale method. The goal of the research was to both investigate the effect of temperature change on the composite behavior with respect to transverse loading as well as the validate the use of cohesive parameters obtained from atomistic-to-continuum multiscale modeling to predict fiber-matrix interfacial cracking. From the multiscale model cohesive zone parameters (i.e. maximum traction and energy of separation) were obtained by modeling the interface between the coarse-grained polyimide matrix and graphite based carbon fiber. The cohesive parameters from this simulation were used in a cohesive zone model of the composite microstructure in order to predict the properties of the macroscale composite with respect to changes in temperature ranging from 21 ˚C to 316 ˚C. Good agreement was found between the microscale RUC model and experimental results for stress-strain response, stiffness, and material strength at low and high temperatures. Examination of the deformation of the composite through localized crack initiation at the fiber-matrix interface also agreed with experimental observations of similar phenomena. Overall, the cohesive zone model was shown to be both effective at modeling the composite properties with respect to transverse loading as well as validated the use of cohesive zone parameters obtained from the multiscale simulation.

Keywords: cohesive zone model, fiber-matrix interface, microscale damage, multiscale modeling

Procedia PDF Downloads 455
7562 Studies on Mechanical Behavior of Kevlar/Kenaf/Graphene Reinforced Polymer Based Hybrid Composites

Authors: H. K. Shivanand, Ranjith R. Hombal, Paraveej Shirahatti, Gujjalla Anil Babu, S. ShivaPrakash

Abstract:

When it comes to the selection of materials the knowledge of materials science plays a vital role in selection and enhancements of materials properties. In the world of material science a composite material has the significant role based on its application. The composite materials are those in which two or more components having different physical and chemical properties are combined to create a new enhanced property substance. In this study three different materials (Kenaf, Kevlar and Graphene) been chosen based on their properties and a composite material is developed with help of vacuum bagging process. The fibers (Kenaf and Kevlar) and Resin(vinyl ester) ratio was maintained at 70:30 during the process and 0.5% 1% and 1.5% of Graphene was added during fabrication process. The material was machined to thedimension ofASTM standards(300×300mm and thickness 3mm)with help of water jet cutting machine. The composite materials were tested for Mechanical properties such as Interlaminar shear strength(ILSS) and Flexural strength. It is found that there is significant increase in material properties in the developed composite material.

Keywords: Kevlar, Kenaf, graphene, vacuum bagging process, Interlaminar shear strength test, flexural test

Procedia PDF Downloads 57
7561 Development and Characterization of a Composite Material for Ceiling Board Construction Applications in Ethiopia

Authors: Minase Yitbarek Mengistu, Abrham Melkamu, Dawit Yisfaw, Bisrat Belihu, Abdulhakim Lalega

Abstract:

This research was aimed at reducing and recycling waste paper and sawdust from our environment, thereby reducing environmental pollution resulting from the management/disposal of these waste materials. In this research, some mechanical properties of composite ceiling board materials made from waste paper, sawdust, and pineapple leaf fibers were investigated to determine their suitability for use in low-cost construction work. The ceiling board was obtained from the waste of paper, sawdust chips, and pineapple leaf fibers by manual mechanical bonding techniques using dissolved polystyrene films as a binding agent. The results obtained showed that the water absorption values of between 6 % and 8.1 %; as well as density values of 500 kg/mm3 and 611.1 kg/mm3.From our result, the better one is a ratio of pineapple leaf fiber 25%, sawdust 40%, binder 25%, and waste paper 10%. The composite ceiling boards were successfully nailed with firm grips. These values obtained were compared with those of the conventional ceiling boards and it was observed that these composite materials can be used for internal low-cost construction work and Insulation (acoustic and thermal) performance. It is highly recommended that small and medium enterprises be encouraged to venture into waste recycling and the production of these composite ceiling materials to create jobs for skilled and unskilled labor that are locally available.

Keywords: composite material, environment, textile, ceiling board

Procedia PDF Downloads 36
7560 Synthesis, Characterization and Impedance Analysis of Polypyrrole/La0.7Ca0.3MnO3 Nanocomposites

Authors: M. G. Smitha, M. V. Murugendrappa

Abstract:

Perovskite manganite La0.7Ca0.3MnO3 was synthesized by Sol-gel method. Polymerization of pyrrole was carried by in-situ polymerization method. The composite of pyrrole (Py)/La0.7Ca0.3MnO3 composite in the presence of oxidizing agent ammonium per sulphate to synthesize polypyrrole (PPy)/La0.7Ca0.3MnO3 (LCM) composite was carried out by the same in-situ polymerization method. The PPy/LCM composites were synthesized with varying compositions like 10, 20, 30, 40, and 50 wt.% of LCM in Py. The surface morphologies of these composites were analyzed by using scanning electron microscope (SEM). The images show that LCM particles are embedded in PPy chain. The impedance measurement of PPy/LCM at different temperature ranges from 30 to 180 °C was studied using impedance analyzer. The study shows that impedance is frequency and temperature dependent and it is found to decrease with increase in frequency and temperature.

Keywords: polypyrrole, sol gel, impedance, composites

Procedia PDF Downloads 354
7559 Damage Analysis in Open Hole Composite Specimens by Acoustic Emission: Experimental Investigation

Authors: Youcef Faci, Ahmed Mebtouche, Badredine Maalem

Abstract:

n the present work, an experimental study is carried out using acoustic emission and DIC techniques to analyze the damage of open hole woven composite carbon/epoxy under solicitations. Damage mechanisms were identified based on acoustic emission parameters such as amplitude, energy, and cumulative account. The findings of the AE measurement were successfully identified by digital image correlation (DIC) measurements. The evolution value of bolt angle inclination during tensile tests was studied and analyzed. Consequently, the relationship between the bolt inclination angles during tensile tests associated with failure modes of fastened joints of composite materials is determined. Moreover, there is an interaction between laminate pattern, laminate thickness, fastener size and type, surface strain concentrations, and out-of-plane displacement. Conclusions are supported by microscopic visualizations of the composite specimen.

Keywords: tensile test, damage, acoustic emission, digital image correlation

Procedia PDF Downloads 48
7558 Study on the Controlled Growth of Lanthanum Hydroxide and Manganese Oxide Nano Composite under the Presence of Cationic Surfactant

Authors: Neeraj Kumar Verma

Abstract:

Lanthanum hydroxide and manganese oxide nanocomposite are synthesized by chemical routes. Physical characterization is done by TEM to look at the size and dispersion of the nanoparticles in the composite. Chemical characterization is done by X-ray diffraction technique and FTIR to ascertain the attachment of the functionalities and bond stretching. Further thermal analysis is done by thermogravimetric analysis to find the tendency of the thermal decomposition in the elevated temperature range of 0-1000°C. Proper analysis and correlation of the various results obtained suggested the controlled growth of crystalline without agglomeration and good stability in the various temperature ranges of the composite.

Keywords: nanoparticles, XRD, TEM, lanthanum hydroxide, manganese oxide

Procedia PDF Downloads 445
7557 Georgian Social Security System Compatibility with EU Requirements

Authors: Nino Grigolaia

Abstract:

Introduction: The article discusses the experience of the EU in the social field, analyzes the peculiarities of the functioning of the social system in Georgia, and reveals the priority and importance of social policy. Methodology: Different research methods are applied in the presented paper. There are used induction, deduction, analysis, synthesis, analogy, correlation, and statistical observation methodologies in the work. Main Findings: Based on the analysis of social security reforms in Georgia, the main systematic problems are detected, the recommendations on social security system components, integration of the social security field in the unified insurance system, the formation of the national social system, perfection of the legislative, regulatory framework of social protection, adoption of foreign experience are developed in the article. Conclusion: The article concludes that the social protection system in Georgia is at an early stage of development, with the significant impact of factors such as high level of unemployment, low pensions, a large number of families living under the poverty line, and other ones. Accordingly, it is well-established that the study of the social security problem in Georgia is still actual. Based on the analysis, appropriate suggestions in the field of social security are made, and relevant recommendations are proposed.

Keywords: social security, social system, social policy, social security models

Procedia PDF Downloads 121
7556 International Peace and Security: a Study in the Light of the Provisions of the Charter of the United Nations

Authors: Djehich Mohamed Yousri

Abstract:

As a result of the destruction and devastation left by the two world wars, the international community worked to establish a global organization based on a contractual basis, in which the Security Council was entrusted with the task of working to maintain international peace and security, and to achieve this, the United Nations Charter assigned the latter a wide authority to adapt everything It would threaten international peace and security, although the examiner of the Charter of the United Nations does not find the slightest definition of the concept of international peace and security, although these two principles are among the basic principles that the Charter stipulated the necessity of achieving, and perhaps this was also what was in the opposite case for them. And by that, we mean cases of a threat to peace, a breach of it, or an act of aggression. These terms were not dealt with in the Charter in explanation and detail, leaving ample room for the Security Council to assess each of these cases separately, and perhaps this is due to the fact that the framers of the Charter intended to set a flexible standard. It does not restrict the authority of the Security Council to carry out the adjustment process on the one hand and, on the other hand, to allow and enable the Security Council to keep pace with new developments and threats to which international peace and security are exposed. There is no doubt that the concept of international peace and security has undergone significant changes during the 70-year period that followed the establishment of the international organization. After the threat to peace and security focused - in the first stage - on cases of war or the threat of war, what distinguishes the post- The new world order is the emergence of other challenges and threats that find their source in economic, social, humanitarian, and environmental instability. Perhaps this is what the member states of the Security Council indicated during the preparation of the Peace Agenda. The expansion of the concept of peace and security is what paved the way for some permanent states to use the Security Council to legitimize and implement their decisions and take the council as a tool to implement their foreign policy and punish states instead of maintaining international peace and security, which prompted some states and jurisprudence to call for the establishment of oversight of the decisions of the Council Security on the one hand, and amending the UN Charter to make it more expressive of the aspirations of the international community, referring to the obstacles that prevent this amendment.

Keywords: peace, security, united nations charter, security council, united nations organization

Procedia PDF Downloads 51
7555 Some Conjectures and Programs about Computing the Detour Index of Molecular Graphs of Nanotubes

Authors: Shokofeh Ebrtahimi

Abstract:

Let G be the chemical graph of a molecule. The matrix D = [dij ] is called the detour matrix of G, if dij is the length of longest path between atoms i and j. The sum of all entries above the main diagonal of D is called the detour index of G.Chemical graph theory is the topology branch of mathematical chemistry which applies graph theory to mathematical modelling of chemical phenomena.[1] The pioneers of the chemical graph theory are Alexandru Balaban, Ante Graovac, Ivan Gutman, Haruo Hosoya, Milan Randić and Nenad TrinajstićLet G be the chemical graph of a molecule. The matrix D = [dij ] is called the detour matrix of G, if dij is the length of longest path between atoms i and j. The sum of all entries above the main diagonal of D is called the detour index of G. In this paper, a new program for computing the detour index of molecular graphs of nanotubes by heptagons is determineded. Some Conjectures about detour index of Molecular graphs of nanotubes is included.

Keywords: chemical graph, detour matrix, Detour index, carbon nanotube

Procedia PDF Downloads 261
7554 Valorisation of Mango Seed: Response Surface Methodology Based Optimization of Starch Extraction from Mango Seeds

Authors: Tamrat Tesfaye, Bruce Sithole

Abstract:

Box-Behnken Response surface methodology was used to determine the optimum processing conditions that give maximum extraction yield and whiteness index from mango seed. The steeping time ranges from 2 to 12 hours and slurring of the steeped seed in sodium metabisulphite solution (0.1 to 0.5 w/v) was carried out. Experiments were designed according to Box-Behnken Design with these three factors and a total of 15 runs experimental variables of were analyzed. At linear level, the concentration of sodium metabisulphite had significant positive influence on percentage yield and whiteness index at p<0.05. At quadratic level, sodium metabisulphite concentration and sodium metabisulphite concentration2 had a significant negative influence on starch yield; sodium metabisulphite concentration and steeping time*temperature had significant (p<0.05) positive influence on whiteness index. The adjusted R2 above 0.8 for starch yield (0.906465) and whiteness index (0.909268) showed a good fit of the model with the experimental data. The optimum sodium metabisulphite concentration, steeping hours, and temperature for starch isolation with maximum starch yield (66.428%) and whiteness index (85%) as set goals for optimization with the desirability of 0.91939 was 0.255w/v concentration, 2hrs and 50 °C respectively. The determined experimental value of each response based on optimal condition was statistically in accordance with predicted levels at p<0.05. The Mango seeds are the by-products obtained during mango processing and possess disposal problem if not handled properly. The substitution of food based sizing agents with mango seed starch can contribute as pertinent resource deployment for value-added product manufacturing and waste utilization which might play significance role of food security in Ethiopia.

Keywords: mango, synthetic sizing agent, starch, extraction, textile, sizing

Procedia PDF Downloads 205
7553 Diffusive Transport of VOCs Through Composite Liners

Authors: Christina Jery, R. K. Anjana, D. N. Arnepalli, R. Sobha

Abstract:

Modern landfills employ a composite liner consisting of a geomembrane overlying a compacted clay liner (CCL) or a geosynthetic clay liner (GCL) as a barrier system. The primary function of a barrier system is to control the contaminant transport from the leachate (dissolved phase) and landfill gas (vapour phase) out of the landfill thereby minimizing the environmental impact. This study is undertaken to investigate the diffusive migration of VOCs through composite liners. VOCs are known hazardous air pollutants were often existing in both the vapour phase and dissolved phase. These compounds are known to diffuse readily through the polymeric geomembranes. The objective of the research is to develop a comprehensive data set of diffusive parameters involved in the diffusion of VOCs in the composite liner (1.5 mm HDPE geomembrane overlying a 30mm compacted clay layer). For this purpose, the study aims to develop a new experimental setup for determining the diffusion characteristics. The key parameters of diffusion (partitioning, diffusion and permeation coefficients) are examined. The diffusion tests are carried out both in aqueous and vapor phase. Finally, an attempt is also made to study the effect of low temperature on the diffusion characteristics.

Keywords: diffusion, sorption, organic compounds, composite liners, geomembrane

Procedia PDF Downloads 342
7552 Computationally Efficient Stacking Sequence Blending for Composite Structures with a Large Number of Design Regions Using Cellular Automata

Authors: Ellen Van Den Oord, Julien Marie Jan Ferdinand Van Campen

Abstract:

This article introduces a computationally efficient method for stacking sequence blending of composite structures. The computational efficiency makes the presented method especially interesting for composite structures with a large number of design regions. Optimization of composite structures with an unequal load distribution may lead to locally optimized thicknesses and ply orientations that are incompatible with one another. Blending constraints can be enforced to achieve structural continuity. In literature, many methods can be found to implement structural continuity by means of stacking sequence blending in one way or another. The complexity of the problem makes the blending of a structure with a large number of adjacent design regions, and thus stacking sequences, prohibitive. In this work the local stacking sequence optimization is preconditioned using a method found in the literature that couples the mechanical behavior of the laminate, in the form of lamination parameters, to blending constraints, yielding near-optimal easy-to-blend designs. The preconditioned design is then fed to the scheme using cellular automata that have been developed by the authors. The method is applied to the benchmark 18-panel horseshoe blending problem to demonstrate its performance. The computational efficiency of the proposed method makes it especially suited for composite structures with a large number of design regions.

Keywords: composite, blending, optimization, lamination parameters

Procedia PDF Downloads 195
7551 The Clarification of Palm Oil Wastewater Treatment by Coagulant Composite from Palm Oil Ash

Authors: Rewadee Anuwattana, Narumol Soparatana, Pattamaphorn Phuangngamphan, Worapong Pattayawan, Atiporn Jinprayoon, Saroj Klangkongsap, Supinya Sutthima

Abstract:

In this work focus on clarification in palm oil wastewater treatment by using coagulant composite from palm oil ash. The design of this study was carried out by two steps; first, synthesis of new coagulant composite from palm oil ash which was fused by using Al source combined with Fe source and form to the crystal by the hydrothermal crystallization process. The characterization of coagulant composite from palm oil ash was analyzed by advanced instruments, and The pattern was analyzed by X-ray Diffraction (XRD), chemical composition by X-Ray Fluorescence (XRFS) and morphology characterized by SEM. The second step, the clarification wastewater treatment efficiency of synthetic coagulant composite, was evaluated by coagulation/flocculation process based on the COD, turbidity, phosphate and color removal of wastewater from palm oil factory by varying the coagulant dosage (1-8 %w/v) with no adjusted pH and commercial coagulants (Alum, Ferric Chloride and poly aluminum chloride) which adjusted the pH (6). The results found that the maximum removal of 6% w/v of synthetic coagulant from palm oil ash can remove COD, turbidity, phosphate and color was 88.44%, 93.32%, 93.32% and 93.32%, respectively. The experiments were compared using 6% w/v of commercial coagulants (Alum, Ferric Chloride and Polyaluminum Chloride) can remove COD of 74.29%, 71.43% and 57.14%, respectively.

Keywords: coagulation, coagulant, wastewater treatment, waste utilization, palm oil ash

Procedia PDF Downloads 160
7550 Analysis of the Reaction to the Fire of a Composite Material the Base of Scrapes of Tires and Latex for Thermal Isolation in Vehicles

Authors: Elmo Thiao Lins Cöuras Ford, Valentina Alessandra Carvalho do Vale, R. M. Nascimento, J. U. L. Mendes

Abstract:

Now the great majority of the applications of thermal isolation in the strip of drops and averages temperatures (up to 200ºC), it is made being used from aggressive materials to the nature such an as: glass wool, rock wool, polystyrene, EPS among others. Such materials, in spite of the effectiveness in the retention of the flow of heat, possess considerable cost and when discarded they are long years to be to decompose. In that context, trying to adapt the world politics the about of the preservation of the environment, a study began with intention of developing a material composite, with properties of thermal, originating from insulating industrial residues. In this research, the behavior of the composite was analyzed, as submitted the fire. For this, the reaction rehearsals were accomplished to the fire for the composites 2:1; 1:1; 1:2 and for the latex, based in the "con" experiment in agreement with the norm ASTM–E 1334-90. As consequence, in function of the answers of the system, was possible to observe to the acting of each mixture proportion.

Keywords: composite, Latex, reacion to the fire, thermal isolation

Procedia PDF Downloads 415
7549 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 146
7548 The Effects of Big 6+6 Skill Training on Daily Living Skills for an Adolescent with Intellectual Disability

Authors: Luca Vascelli, Silvia Iacomini, Giada Gueli, Francesca Cavallini, Carlo Cavallini, Federica Berardo

Abstract:

The study was conducted to evaluate the effect of training on Big 6 + 6 motor skills to promote daily living skills. Precision teaching (PT) suggests that improved speed of the component behaviors can lead to better performance of composite skills. This study assessed the effects of the repeated timed practice of component motor skills on speed and accuracy of composite skills related to daily living skills. An 18 years old adolescent with intellectual disability participated. A pre post probe single-subject design was used. The results suggest that the participant was able to perform the component skills at his individual aims (endurance was assessed). The speed and accuracy of composite skills were increased; stability and retention were also measured for the composite skill after the training.

Keywords: big 6+6, daily living skills, intellectual disability, precision teaching

Procedia PDF Downloads 127
7547 A Three Tier Secure KQML Interface with Novel Performatives

Authors: Dimple Juneja, Aarti Singh, Renu Hooda

Abstract:

Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.

Keywords: multiagent systems, KQML, FIPA ACL, performatives

Procedia PDF Downloads 390
7546 Shear Buckling of a Large Pultruded Composite I-Section under Asymmetric Loading

Authors: Jin Y. Park, Jeong Wan Lee

Abstract:

An experimental and analytical research on shear buckling of a comparably large polymer composite I-section is presented. It is known that shear buckling load of a large span composite beam is difficult to determine experimentally. In order to sensitively detect shear buckling of the tested I-section, twenty strain rosettes and eight displacement sensors were applied and attached on the web and flange surfaces. The tested specimen was a pultruded composite beam made of vinylester resin, E-glass, carbon fibers and micro-fillers. Various coupon tests were performed before the shear buckling test to obtain fundamental material properties of the I-section. An asymmetric four-point bending loading scheme was utilized for the shear test. The loading scheme resulted a high shear and almost zeros moment condition at the center of the web panel. The shear buckling load was successfully determined after analyzing the obtained test data from strain rosettes and displacement sensors. An analytical approach was also performed to verify the experimental results and to support the discussed experimental program.

Keywords: strain sensor, displacement sensor, shear buckling, polymer composite I-section, asymmetric loading

Procedia PDF Downloads 427
7545 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 56
7544 Numerical Prediction of Bearing Strength on Composite Bolted Joint Using Three Dimensional Puck Failure Criteria

Authors: M. S. Meon, M. N. Rao, K-U. Schröder

Abstract:

Mechanical fasteners especially bolting is commonly used in joining carbon-fiber reinforced polymer (CFRP) composite structures due to their good joinability and easy for maintenance characteristics. Since this approach involves with notching, a proper progressive damage model (PDM) need to be implemented and verified to capture existence of damages in the structure. A three dimensional (3D) failure criteria of Puck is established to predict the ultimate bearing failure of such joint. The failure criteria incorporated with degradation scheme are coded based on user subroutine executed in Abaqus. Single lap joint (SLJ) of composite bolted joint is used as target configuration. The results revealed that the PDM adopted here could sufficiently predict the behaviour of composite bolted joint up to ultimate bearing failure. In addition, mesh refinement near holes increased the accuracy of predicted strength as well as computational effort.

Keywords: bearing strength, bolted joint, degradation scheme, progressive damage model

Procedia PDF Downloads 473
7543 Fatigue-Induced Debonding Propagation in FM300 Adhesive

Authors: Reza Hedayati, Meysam Jahanbakhshi

Abstract:

Fracture Mechanics is used to predict debonding propagation in adhesive joint between aluminum and composite plates. Three types of loadings and two types of glass-epoxy composite sequences: [0/90]2s and [0/45/-45/90]s are considered for the composite plate and their results are compared. It was seen that generally the cases with stacking sequence of [0/45/-45/90]s have much shorter lives than cases with [0/90]2s. It was also seen that in cases with λ=0 the ends of the debonding front propagates forward more than its middle, while in cases with λ=0.5 or λ=1 it is vice versa. Moreover, regardless of value of λ, the difference between the debonding propagations of the ends and the middle of the debonding front is very close in cases λ=0.5 and λ=1. Another main conclusion was the non-dimensionalized debonding front profile is almost independent of sequence type or the applied load value.

Keywords: adhesive joint, debonding, fracture, LEFM, APDL

Procedia PDF Downloads 334
7542 Micromechanical Analysis of Interface Properties Effects on Transverse Tensile Response of Fiber-Reinforced Composites

Authors: M. Naderi, N. Iyyer, K. Goel, N. Phan

Abstract:

A micromechanical analysis of the influence of fiber-matrix interface fracture properties on the transverse tensile response of fiber-reinforced composite is investigated. Augmented finite element method (AFEM) is used to provide high-fidelity damage initiation and propagation along the micromechanical analysis. Effects of fiber volume fraction and fiber shapes are also studies in representative volume elements (RVE) to capture the stochastic behavior of the composite under loading. In addition, defects and voids influence on the composite response are investigated in micromechanical analysis. The results reveal that the response of RVE with constant interface properties overestimates the composite transverse strength. It is also seen that the damage initiation and propagation locations are controlled by the distributions of fracture properties, fibers’ shapes, and defects.

Keywords: cohesive model, fracture, computational mechanics, micromechanics

Procedia PDF Downloads 270
7541 The Awareness of Computer Science Students Regarding the Security of Location Based Games

Authors: Jacques Barnard, Magda Huisman, Gunther R. Drevin

Abstract:

Rapid expansion and development in die mobile technology market has created an opportunity for users to participate in location based games. As a consequence of this fast expanding market and new technology, it is important to be aware of the implications this has on security. This paper measures the impact on the security awareness of games’ participants, as well as on that of students at university level with regards to their various stages of input in years of studying and gamer classification. This serves to provide insight into the matter as to discernible differences in the awareness of the security implications concerning these technologies. The data was accumulated via a web questionnaire that was to be completed yearly by students from respective year groups. Results signify a meaningful disparity in security awareness among students completing the varying study years and research. This awareness, however, does not always impact on gamers.

Keywords: gamer classifications, location based games, location based data, security awareness

Procedia PDF Downloads 274
7540 Design and Optimization of Composite Canopy Structure

Authors: Prakash Kattire, Rahul Pathare, Nilesh Tawde

Abstract:

A canopy is an overhead roof structure generally used at the entrance of a building to provide shelter from rain and sun and may also be used for decorative purposes. In this paper, the canopy structure to cover the conveyor line has been studied. Existing most of the canopy structures are made of steel and glass, which makes a heavier structure, so the purpose of this study is to weight and cost optimization of the canopy. To achieve this goal, the materials of construction considered are Polyvinyl chloride (PVC) natural composite, Fiber Reinforced Plastic (FRP), and Structural steel Fe250. Designing and modeling were done in Solid works, whereas Altair Inspire software was used for the optimization of the structure. Through this study, it was found that there is a total 10% weight reduction in the structure with sufficient reserve for structural strength.

Keywords: canopy, composite, FRP, PVC

Procedia PDF Downloads 121
7539 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 443
7538 Flexural Behavior for Prefabricated Angle Truss Composite Beams Using Precast Concrete

Authors: Jo Kwang-Won, Lee Ho-Jun, Choi In-Rak, Park Hong-Gun

Abstract:

Prefabricated angle truss composited beam is a kind of concrete encased composite beam. It is prefabricated at factory as Pratt truss with steel members. Double angle is used for top, bottom chords and vertical web member. Moreover, diagonal web member is steel plate. Its sectional shape looks like I-shape. This beam system has two stages. The first is construction stage in which the beam is directly connected to the column for resist construction load. This stage beam consists of Pratt truss and precast concrete. The stability of the beam is verified. The second is service stage. After the connection, cast-in-place concrete is used for composite action. Ultimate flexural capacity is verified and show advantage than RC and steel. In this paper, the beam flexural capacity is verified in both stages. And examined the flexural behavior of the beam.

Keywords: composite beam, prefabrication, angle, precast concrete, pratt truss

Procedia PDF Downloads 272
7537 The Creep Analysis of a Varying Thickness on a Rotating Composite Disk with Different Particle Size by Using Sherby’s Law

Authors: Rupinder Kaur, Harjot Kaur

Abstract:

The objective of this paper is to present the study of the effect of varying thickness on rotating composite disks made from Al-SiC_P having different particle sizes. Mathematical modeling is used to calculate the effect of varying thickness with different particle sizes on rotating composite disks in radial as well as tangential directions with thermal gradients. In comparison to various particle sizes with varied thicknesses, long-term deformation occurs. The results are displayed visually, demonstrating how creep deformation decreases with changing particle size and thickness.

Keywords: creep, varying thickness, particle size, stresses and strain rates

Procedia PDF Downloads 56