Search results for: privacy preservation scheme
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2370

Search results for: privacy preservation scheme

2010 Study on the Effect of Bolt Locking Method on the Deformation of Bipolar Plate in PEMFC

Authors: Tao Chen, ShiHua Liu, JiWei Zhang

Abstract:

Assembly of the proton exchange membrane fuel cells (PEMFC) has a very important influence on its performance and efficiency. The various components of PEMFC stack are usually locked and fixed by bolts. Locking bolt will cause the deformation of the bipolar plate and the other components, which will affect directly the deformation degree of the integral parts of the PEMFC as well as the performance of PEMFC. This paper focuses on the object of three-cell stack of PEMFC. Finite element simulation is used to investigate the deformation of bipolar plate caused by quantity and layout of bolts, bolt locking pressure, and bolt locking sequence, etc. Finally, we made a conclusion that the optimal combination packaging scheme was adopted to assemble the fuel cell stack. The scheme was in use of 3.8 MPa locking pressure imposed on the fuel cell stack, type Ⅱ of four locking bolts and longitudinal locking method. The scheme was obtained by comparatively analyzing the overall displacement contour of PEMFC stack, absolute displacement curve of bipolar plate along the given three paths in the Z direction and the polarization curve of fuel cell. The research results are helpful for the fuel cell stack assembly.

Keywords: bipolar plate, deformation, finite element simulation, fuel cell, locking bolt

Procedia PDF Downloads 396
2009 Ethics Can Enable Open Source Data Research

Authors: Dragana Calic

Abstract:

The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.

Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions

Procedia PDF Downloads 271
2008 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 231
2007 Pricing European Options under Jump Diffusion Models with Fast L-stable Padé Scheme

Authors: Salah Alrabeei, Mohammad Yousuf

Abstract:

The goal of option pricing theory is to help the investors to manage their money, enhance returns and control their financial future by theoretically valuing their options. Modeling option pricing by Black-School models with jumps guarantees to consider the market movement. However, only numerical methods can solve this model. Furthermore, not all the numerical methods are efficient to solve these models because they have nonsmoothing payoffs or discontinuous derivatives at the exercise price. In this paper, the exponential time differencing (ETD) method is applied for solving partial integrodifferential equations arising in pricing European options under Merton’s and Kou’s jump-diffusion models. Fast Fourier Transform (FFT) algorithm is used as a matrix-vector multiplication solver, which reduces the complexity from O(M2) into O(M logM). A partial fraction form of Pad`e schemes is used to overcome the complexity of inverting polynomial of matrices. These two tools guarantee to get efficient and accurate numerical solutions. We construct a parallel and easy to implement a version of the numerical scheme. Numerical experiments are given to show how fast and accurate is our scheme.

Keywords: Integral differential equations, , L-stable methods, pricing European options, Jump–diffusion model

Procedia PDF Downloads 133
2006 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives

Authors: Nawt Almutairi, Ramzi El-Haddadeh

Abstract:

With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.

Keywords: e-service, satisfaction, trust, loyalty

Procedia PDF Downloads 237
2005 Inter-Cell-Interference Mitigation Scheme in Wireless Communication System

Authors: Jae-Hyun Ro, Yong-Jun Kim, Eui-Hak Lee, Hyoung-Kyu Song

Abstract:

Mobile communication has been developing very rapidly since it appeared. However, although mobile communication market has been rapidly developing, many mobile users are not offered good quality of service (QoS) due to increment of the amount of data traffic. Recently, femtocell is very hot issue in mobile communication because femtocell can solve the problems of data traffic and offer better QoS to mobile users. However, the deployment of femtocell in existing macrocell coverage area is not so simple due to the influence of inter-cell-interference (ICI) with existing macrocell. Thus, this paper proposes femtocell scheme which is able to reduce the influence of ICI to deploy femtocell easily.

Keywords: CDD, femtocell, interference, macrocell, OFDM

Procedia PDF Downloads 488
2004 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations

Authors: Chechen Liao, Sheng Yi Lin

Abstract:

With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.

Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure

Procedia PDF Downloads 154
2003 Repair Workshop Queue System Modification Using Priority Scheme

Authors: C. Okonkwo Ugochukwu, E. Sinebe Jude, N. Odoh Blessing, E. Okafor Christian

Abstract:

In this paper, a modification on repair workshop queuing system using multi priority scheme was carried out. Chi square goodness of fit test was used to determine the random distribution of the inter arrival time and service time of crankshafts that come for maintenance in the workshop. The chi square values obtained for all the prioritized classes show that the distribution conforms to Poisson distribution. The mean waiting time in queue results of non-preemptive priority for 1st, 2nd and 3rd classes show 0.066, 0.09, and 0.224 day respectively, while preemptive priority show 0.007, 0.036 and 0.258 day. However, when non priority is used, which obviously has no class distinction it amounts to 0.17 days. From the results, one can observe that the preemptive priority system provides a very dramatic improvement over the non preemptive priority as it concerns arrivals that are of higher priority. However, the improvement has a detrimental effect on the low priority class. The trend of the results is similar to the mean waiting time in the system as a result of addition of the actual service time. Even though the mean waiting time for the queue and that of the system for no priority takes the least time when compared with the least priority, urgent and semi-urgent jobs will terribly suffer which will most likely result in reneging or balking of many urgent jobs. Hence, the adoption of priority scheme in this type of scenario will result in huge profit to the Company and more customer satisfaction.

Keywords: queue, priority class, preemptive, non-preemptive, mean waiting time

Procedia PDF Downloads 378
2002 A Novel Multi-Objective Park and Ride Control Scheme Using Renewable Energy Sources: Cairo Case Study

Authors: Mohammed Elsayed Lotfy Elsayed Abouzeid, Tomonobu Senjyu

Abstract:

A novel multi-objective park and ride control approach is presented in this research. Park and ride will encourage the owners of the vehicles to leave their cars in the nearest points (on the edges of the crowded cities) and use public transportation facilities (train, bus, metro, or mon-rail) to reach their work inside the crowded city. The proposed control scheme is used to design electric vehicle charging stations (EVCS) to charge 1000 electric vehicles (EV) during their owners' work time. Cairo, Egypt is used as a case study. Photovoltaic (PV) and battery energy storage system (BESS) are used to meet the EVCS demand. Two multi-objective optimization techniques (MOGA and epsilon-MOGA) are utilized to get the optimal sizes of PV and BESS so as to meet the load demand and minimize the total life cycle cost. Detailed analysis and comparison are held to investigate the performance of the proposed control scheme using MATLAB.

Keywords: Battery Energy Storage System, Electric Vehicle, Park and Ride, Photovoltaic, Multi-objective

Procedia PDF Downloads 121
2001 Enhanced Test Scheme based on Programmable Write Time for Future Computer Memories

Authors: Nor Zaidi Haron, Fauziyah Salehuddin, Norsuhaidah Arshad, Sani Irwan Salim

Abstract:

Resistive random access memories (RRAMs) are one of the main candidates for future computer memories. However, due to their tiny size and immature device technology, the quality of the outgoing RRAM chips is seen as a serious issue. Defective RRAM cells might behave differently than existing semiconductor memories (Dynamic RAM, Static RAM, and Flash), meaning that they are difficult to be detected using existing test schemes. This paper presents an enhanced test scheme, referred to as Programmable Short Write Time (PSWT) that is able to improve the detection of faulty RRAM cells. It is developed by applying multiple weak write operations, each with different time durations. The test circuit embedded in the RRAM chip is made programmable in order to supply different weak write times during testing. The RRAM electrical model is described using Verilog-AMS language and is simulated using HSPICE simulation tools. Simulation results show that the proposed test scheme offers better open-resistive fault detection compared to existing test schemes.

Keywords: memory fault, memory test, design-for-testability, resistive random access memory

Procedia PDF Downloads 369
2000 Dialogues of Medical Places and Health Care in Oporto City (20th Century)

Authors: Monique Palma, Isabel Amaral

Abstract:

This paper aims at mapping medical places in Oporto in the twentieth century in order to bring the urban history of medicine and healthcare in Portugal to a large audience, using Oporto as a case study. This analysis is consistent with the SDS's 2030 goals for policy guidance for heritage and development actors. As a result, it is critical to begin this research in order to place on the political agenda the preservation of Portuguese culture's history, memory, and heritage, particularly the medical culture, which is one of the most important drivers of civilizational development. To understand the evolution of medical care in urban history, we will conduct archive research (manuals, treatises, reports, periodic journals, newspapers, etc.) and interviews with key actors from medical institutions and medical museums. The findings of this study will be used to develop medical itineraries for inclusion in touristic agendas in Portugal and abroad, to include Portuguese medicine in global roadmaps, and to promote the preservation of the most iconic places of health care and medical heritage, as well as tools to promote social cohesion, dialogue among people, and "sense of place" globally.

Keywords: medical itineraries, history of medicine, urban history, Oporto

Procedia PDF Downloads 212
1999 Fuzzy Vehicle Routing Problem for Extreme Environment

Authors: G. Sirbiladze, B. Ghvaberidze, B. Matsaberidze

Abstract:

A fuzzy vehicle routing problem is considered in the possibilistic environment. A new criterion, maximization of expectation of reliability for movement on closed routes is constructed. The objective of the research is to implement a two-stage scheme for solution of this problem. Based on the algorithm of preferences on the first stage, the sample of so-called “promising” routes will be selected. On the second stage, for the selected promising routes new bi-criteria problem will be solved - minimization of total traveled distance and maximization of reliability of routes. The problem will be stated as a fuzzy-partitioning problem. Two possible solutions of this scheme are considered.

Keywords: vehicle routing problem, fuzzy partitioning problem, multiple-criteria optimization, possibility theory

Procedia PDF Downloads 533
1998 A Robust Frequency Offset Estimator for Orthogonal Frequency Division Multiplexing

Authors: Keunhong Chae, Seokho Yoon

Abstract:

We address the integer frequency offset (IFO) estimation under the influence of the timing offset (TO) in orthogonal frequency division multiplexing (OFDM) systems. Incorporating the IFO and TO into the symbol set used to represent the received OFDM symbol, we investigate the influence of the TO on the IFO, and then, propose a combining method between two consecutive OFDM correlations, reducing the influence. The proposed scheme has almost the same complexity as that of the conventional schemes, whereas it does not need the TO knowledge contrary to the conventional schemes. From numerical results it is confirmed that the proposed scheme is insensitive to the TO, consequently, yielding an improvement of the IFO estimation performance over the conventional schemes when the TO exists.

Keywords: estimation, integer frequency offset, OFDM, timing offset

Procedia PDF Downloads 455
1997 A Cooperative Transmission Scheme Using Two Sources Based on OFDM System

Authors: Bit-Na Kwon, Dong-Hyun Ha, Hyoung-Kyu Song

Abstract:

In wireless communication, space-time block code (STBC), cyclic delay diversity (CDD) and space-time cyclic delay diversity (STCDD) are used as the spatial diversity schemes and have been widely studied for the reliable communication. If these schemes are used, the communication system can obtain the improved performance. However, the quality of the system is degraded when the distance between a source and a destination is distant in wireless communication system. In this paper, the cooperative transmission scheme using two sources is proposed and improves the performance of the wireless communication system.

Keywords: OFDM, Cooperative communication, CDD, STBC, STCDD

Procedia PDF Downloads 458
1996 Impact Study on a Load Rich Island and Development of Frequency Based Auto-Load Shedding Scheme to Improve Service Reliability of the Island

Authors: Md. Shafiullah, M. Shafiul Alam, Bandar Suliman Alsharif

Abstract:

Electrical quantities such as frequency, voltage, current are being fluctuated due to abnormalities in power system. Most of the abnormalities cause fluctuation in system frequency and sometimes extreme abnormalities lead to system blackout. To protect the system from complete blackout planned and proper islanding plays a very important role even in case of extreme abnormalities. Islanding operation not only helps stabilizing a faulted system but also supports power supplies to critical and important loads, in extreme emergency. But the islanding systems are weaker than integrated system so the stability of islands is the prime concern when an integrated system is disintegrated. In this paper, different impacts on a load rich island have been studied and a frequency based auto-load shedding scheme has been developed for sudden load addition, generation outage and combined effect of both to the island. The developed scheme has been applied to Khulna-Barisal Island to validate the effectiveness of the developed technique. Various types of abnormalities to the test system have been simulated and for the simulation purpose CYME PSAF (Power System Analysis Framework) has been used.

Keywords: auto load shedding, FS&FD relay, impact study, island, PSAF, ROCOF

Procedia PDF Downloads 441
1995 Stochastic Energy and Reserve Scheduling with Wind Generation and Generic Energy Storage Systems

Authors: Amirhossein Khazali, Mohsen Kalantar

Abstract:

Energy storage units can play an important role to provide an economic and secure operation of future energy systems. In this paper, a stochastic energy and reserve market clearing scheme is presented considering storage energy units. The approach is proposed to deal with stochastic and non-dispatchable renewable sources with a high level of penetration in the energy system. A two stage stochastic programming scheme is formulated where in the first stage the energy market is cleared according to the forecasted amount of wind generation and demands and in the second stage the real time market is solved according to the assumed scenarios.

Keywords: energy and reserve market, energy storage device, stochastic programming, wind generation

Procedia PDF Downloads 556
1994 A Novel Computer-Generated Hologram (CGH) Achieved Scheme Generated from Point Cloud by Using a Lens Array

Authors: Wei-Na Li, Mei-Lan Piao, Nam Kim

Abstract:

We proposed a novel computer-generated hologram (CGH) achieved scheme, wherein the CGH is generated from a point cloud which is transformed by a mapping relationship of a series of elemental images captured from a real three-dimensional (3D) object by using a lens array. This scheme is composed of three procedures: mapping from elemental images to point cloud, hologram generation, and hologram display. A mapping method is figured out to achieve a virtual volume date (point cloud) from a series of elemental images. This mapping method consists of two steps. Firstly, the coordinate (x, y) pairs and its appearing number are calculated from the series of sub-images, which are generated from the elemental images. Secondly, a series of corresponding coordinates (x, y, z) are calculated from the elemental images. Then a hologram is generated from the volume data that is calculated by the previous two steps. Eventually, a spatial light modulator (SLM) and a green laser beam are utilized to display this hologram and reconstruct the original 3D object. In this paper, in order to show a more auto stereoscopic display of a real 3D object, we successfully obtained the actual depth data of every discrete point of the real 3D object, and overcame the inherent drawbacks of the depth camera by obtaining point cloud from the elemental images.

Keywords: elemental image, point cloud, computer-generated hologram (CGH), autostereoscopic display

Procedia PDF Downloads 568
1993 Analysis of the Effect of Food Veils on the Preservation of Button and Oyster Mushrooms, Case Study: Zein Corn Coating

Authors: Mohamad Javad Shakouri, Hamid Tavakkolipour, Mahdis Jamshidi Tehranian

Abstract:

The inclination toward using food coatings is increasing daily, due to containing natural elements and not producing environmental pollution. Food coatings are uniform and thin layers of natural substances that cover the food product and act as a barrier against moisture, oxygen, and substances dissolved in food. Using food coatings on fruits and vegetables can delay water dissipation, losing aroma, decolorization, and improve the appearance of the product, and in general, preserve and protect the quality of fresh produce. When fruits and vegetables grow, they are equipped with a natural shield, called cuticle– a layer of wax. Washing the products, after harvest, the cuticle – this protective coating – is removed. In order to replace the cuticle, we can use an edible protective coating. This coating delays dehydration and deterioration and hence increases the life of the product while keeping its moisture. In this study, it was concluded that using food coatings, such as corn zein, carrageenan, and starch can have a substantial effect on the quantitative and qualitative preservation of food products, such as fruits, vegetables, and mushrooms.

Keywords: food coating, corn zein, button and oyster mushrooms, ascorbic and citric acids

Procedia PDF Downloads 283
1992 Congestion Control in Mobile Network by Prioritizing Handoff Calls

Authors: O. A. Lawal, O. A Ojesanmi

Abstract:

The demand for wireless cellular services continues to increase while the radio resources remain limited. Thus, network operators have to continuously manage the scarce radio resources in order to have an improved quality of service for mobile users. This paper proposes how to handle the problem of congestion in the mobile network by prioritizing handoff call, using the guard channel allocation scheme. The research uses specific threshold value for the time of allocation of the channel in the algorithm. The scheme would be simulated by generating various data for different traffics in the network as it would be in the real life. The result would be used to determine the probability of handoff call dropping and the probability of the new call blocking as a way of measuring the network performance.

Keywords: call block, channel, handoff, mobile cellular network

Procedia PDF Downloads 382
1991 Maximum Likelihood Estimation Methods on a Two-Parameter Rayleigh Distribution under Progressive Type-Ii Censoring

Authors: Daniel Fundi Murithi

Abstract:

Data from economic, social, clinical, and industrial studies are in some way incomplete or incorrect due to censoring. Such data may have adverse effects if used in the estimation problem. We propose the use of Maximum Likelihood Estimation (MLE) under a progressive type-II censoring scheme to remedy this problem. In particular, maximum likelihood estimates (MLEs) for the location (µ) and scale (λ) parameters of two Parameter Rayleigh distribution are realized under a progressive type-II censoring scheme using the Expectation-Maximization (EM) and the Newton-Raphson (NR) algorithms. These algorithms are used comparatively because they iteratively produce satisfactory results in the estimation problem. The progressively type-II censoring scheme is used because it allows the removal of test units before the termination of the experiment. Approximate asymptotic variances and confidence intervals for the location and scale parameters are derived/constructed. The efficiency of EM and the NR algorithms is compared given root mean squared error (RMSE), bias, and the coverage rate. The simulation study showed that in most sets of simulation cases, the estimates obtained using the Expectation-maximization algorithm had small biases, small variances, narrower/small confidence intervals width, and small root of mean squared error compared to those generated via the Newton-Raphson (NR) algorithm. Further, the analysis of a real-life data set (data from simple experimental trials) showed that the Expectation-Maximization (EM) algorithm performs better compared to Newton-Raphson (NR) algorithm in all simulation cases under the progressive type-II censoring scheme.

Keywords: expectation-maximization algorithm, maximum likelihood estimation, Newton-Raphson method, two-parameter Rayleigh distribution, progressive type-II censoring

Procedia PDF Downloads 145
1990 A Differential Detection Method for Chip-Scale Spin-Exchange Relaxation Free Atomic Magnetometer

Authors: Yi Zhang, Yuan Tian, Jiehua Chen, Sihong Gu

Abstract:

Chip-scale spin-exchange relaxation free (SERF) atomic magnetometer makes use of millimeter-scale vapor cells micro-fabricated by Micro-electromechanical Systems (MEMS) technique and SERF mechanism, resulting in the characteristics of high spatial resolution and high sensitivity. It is useful for biomagnetic imaging including magnetoencephalography and magnetocardiography. In a prevailing scheme, circularly polarized on-resonance laser beam is adapted for both pumping and probing the atomic polarization. And the magnetic-field-sensitive signal is extracted by transmission laser intensity enhancement as a result of atomic polarization increase on zero field level crossing resonance. The scheme is very suitable for integration, however, the laser amplitude modulation (AM) noise and laser frequency modulation to amplitude modulation (FM-AM) noise is superimposed on the photon shot noise reducing the signal to noise ratio (SNR). To suppress AM and FM-AM noise the paper puts forward a novel scheme which adopts circularly polarized on-resonance light pumping and linearly polarized frequency-detuning laser probing. The transmission beam is divided into transmission and reflection beams by a polarization analyzer, the angle between the analyzer's transmission polarization axis and frequency-detuning laser polarization direction is set to 45°. The magnetic-field-sensitive signal is extracted by polarization rotation enhancement of frequency-detuning laser which induces two beams intensity difference increase as the atomic polarization increases. Therefore, AM and FM-AM noise in two beams are common-mode and can be almost entirely canceled by differential detection. We have carried out an experiment to study our scheme. The experiment reveals that the noise in the differential signal is obviously smaller than that in each beam. The scheme is promising to be applied for developing more sensitive chip-scale magnetometer.

Keywords: atomic magnetometer, chip scale, differential detection, spin-exchange relaxation free

Procedia PDF Downloads 158
1989 Economic Analysis of Policy Instruments for Energy Efficiency

Authors: Etidel Labidi

Abstract:

Energy efficiency improvement is one of the means to reduce energy consumption and carbon emissions. Recently, some developed countries have implemented the tradable white certificate scheme (TWC) as a new policy instrument based on market approach to support energy efficiency improvements. The major focus of this paper is to compare the White Certificates (TWC) scheme as an innovative policy instrument for energy efficiency improvement to other policy instruments: energy taxes and regulations setting a minimum level of energy efficiency. On the basis of our theoretical discussion and numerical simulation, we show that the white certificates system is the most interesting policy instrument for saving energy because it generates the most important level of energy savings and the least increase in energy service price.

Keywords: energy savings, energy efficiency, energy policy, white certificates

Procedia PDF Downloads 315
1988 Ethically Integrating Robots to Assist Elders and Patients with Dementia

Authors: Suresh Lokiah

Abstract:

The emerging trend of integrating robots into elderly care, particularly for assisting patients with dementia, holds the potential to greatly transform the sector. Assisted living facilities, which house a significant number of elderly individuals and dementia patients, constantly strive to engage their residents in stimulating activities. However, due to staffing shortages, they often rely on volunteers to introduce new activities. Despite the availability of social interaction, these residents, frequently overlooked in society, are in desperate need of additional support. Robots designed for elder care are categorized based on their design and functionality. These categories include companion robots, telepresence robots, health monitoring robots, and rehab robots. However, the integration of such robots raises significant ethical concerns, notably regarding privacy, autonomy, and the risk of dehumanization. Privacy issues arise as these robots may need to continually monitor patient activities. There is also a risk of patients becoming overly dependent on these robots, potentially undermining their autonomy. Furthermore, the replacement of human touch with robotic interaction may lead to the dehumanization of care. This paper delves into the ethical considerations of incorporating robotic assistance in eldercare. It proposes a series of guidelines and strategies to ensure the ethical deployment of these robots. These guidelines suggest involving patients in the design and development process of the robots and emphasize the critical need for human oversight to respect the dignity and rights of the elderly and dementia patients. The paper also recommends implementing robust privacy measures, including secure data transmission and data anonymization. In conclusion, this paper offers a thorough examination of the ethical implications of using robotic assistance in elder care. It provides a strategic roadmap to ensure this technology is utilized ethically, thereby maximizing its potential benefits and minimizing any potential harm.

Keywords: human-robot interaction, robots for eldercare, ethics, health, dementia

Procedia PDF Downloads 66
1987 Control of Chaotic Behaviour in Parallel-Connected DC-DC Buck-Boost Converters

Authors: Ammar Nimer Natsheh

Abstract:

Chaos control is used to design a controller that is able to eliminate the chaotic behaviour of nonlinear dynamic systems that experience such phenomena. The paper describes the control of the bifurcation behaviour of a parallel-connected DC-DC buck-boost converter used to provide an interface between energy storage batteries and photovoltaic (PV) arrays as renewable energy sources. The paper presents a delayed feedback control scheme in a module converter comprises two identical buck-boost circuits and operates in the continuous-current conduction mode (CCM). MATLAB/SIMULINK simulation results show the effectiveness and robustness of the scheme.

Keywords: chaos, bifurcation, DC-DC Buck-Boost Converter, Delayed Feedback Control

Procedia PDF Downloads 419
1986 New Fourth Order Explicit Group Method in the Solution of the Helmholtz Equation

Authors: Norhashidah Hj Mohd Ali, Teng Wai Ping

Abstract:

In this paper, the formulation of a new group explicit method with a fourth order accuracy is described in solving the two-dimensional Helmholtz equation. The formulation is based on the nine-point fourth-order compact finite difference approximation formula. The complexity analysis of the developed scheme is also presented. Several numerical experiments were conducted to test the feasibility of the developed scheme. Comparisons with other existing schemes will be reported and discussed. Preliminary results indicate that this method is a viable alternative high accuracy solver to the Helmholtz equation.

Keywords: explicit group method, finite difference, Helmholtz equation, five-point formula, nine-point formula

Procedia PDF Downloads 483
1985 An Efficient Traceability Mechanism in the Audited Cloud Data Storage

Authors: Ramya P, Lino Abraham Varghese, S. Bose

Abstract:

By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.

Keywords: data integrity, dynamic group, group signature, public auditing

Procedia PDF Downloads 375
1984 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 403
1983 Arbitrarily Shaped Blur Kernel Estimation for Single Image Blind Deblurring

Authors: Aftab Khan, Ashfaq Khan

Abstract:

The research paper focuses on an interesting challenge faced in Blind Image Deblurring (BID). It relates to the estimation of arbitrarily shaped or non-parametric Point Spread Functions (PSFs) of motion blur caused by camera handshake. These PSFs exhibit much more complex shapes than their parametric counterparts and deblurring in this case requires intricate ways to estimate the blur and effectively remove it. This research work introduces a novel blind deblurring scheme visualized for deblurring images corrupted by arbitrarily shaped PSFs. It is based on Genetic Algorithm (GA) and utilises the Blind/Reference-less Image Spatial QUality Evaluator (BRISQUE) measure as the fitness function for arbitrarily shaped PSF estimation. The proposed BID scheme has been compared with other single image motion deblurring schemes as benchmark. Validation has been carried out on various blurred images. Results of both benchmark and real images are presented. Non-reference image quality measures were used to quantify the deblurring results. For benchmark images, the proposed BID scheme using BRISQUE converges in close vicinity of the original blurring functions.

Keywords: blind deconvolution, blind image deblurring, genetic algorithm, image restoration, image quality measures

Procedia PDF Downloads 429
1982 Assessment on the Collective Memory after Alteration of Urban Heritage: Case Study of Hengshan Mansions in Shanghai

Authors: Yueying Chen

Abstract:

A city can be developed through memory, and memory is one of the most important elements for urban contexts. Collective memory is a collection of personal memories that can be preserved with objects, places, and events of heritage, expressing culture through spatial changes. These preserved forms can evoke a sense of community and certain emotions. Collective memory in cities reflects urban spatial alterations and historical developments. It can be preserved and reflected by revitalisation projects. A major current focus in collective memory research is how to identify and preserve memory in an intangible way. The influential elements within the preservation of collective memory mainly include institutions and objects. However, current research lacks the assessment of the collective memory after alterations of urban heritage. The assessment of urban heritage lacks visualization and qualitative methods. The emergence of the application of space syntax can fill in this gap. Hengshan Mansions was a new project in 2015. The original residential area has been replaced with a comprehensive commercial area integrating boutique shopping, upscale restaurants, and creative offices. Hengshan Mansions is located in the largest historic area in Shanghai, and its development is the epitome of the traditional culture in Shanghai. Its alteration is the newest project in this area and presents the new concept of revitalisation of urban heritage. For its physical parts, modern vitality is created, and historical information is preserved at the same time. However, most of the local people are moved away, and its functions are altered a lot. The preservation of its collective memory needs to discuss furtherly. Thus, the article builds a framework to assess the collective memory of urban heritage, including spatial configuration, spatial interaction, and cultural cognition. Then, it selects Hengshan Mansions in Shanghai as a case to analyse the assessed framework. Space syntax can be applied to visualize the assessment. Based on the analysis, the article will explore the influential reasons for the collective memory after alterations and proposes relevant advice for the preservation of the collective memory of urban heritage.

Keywords: collective memory, alternation of urban heritage, space syntax, Hengshan Mansions

Procedia PDF Downloads 110
1981 Inducing Cryptobiosis State of Tardigrades in Cyanobacteria Synechococcus elongatus for Effective Preservation

Authors: Nilesh Bandekar, Sumita Dasgupta, Luis Alberto Allcahuaman Huaya, Souvik Manna

Abstract:

Cryptobiosis is a dormant state where all measurable metabolic activities are at a halt, allowing an organism to survive in extreme conditions like low temperature (cryobiosis), extreme drought (anhydrobiosis), etc. This phenomenon is observed especially in tardigrades that can retain this state for decades depending on the abiotic environmental conditions. On returning to favorable conditions, tardigrades re-attain a metabolically active state. In this study, cyanobacteria as a model organism are being chosen to induce cryptobiosis for its effective preservation over a long period of time. Preserving cyanobacteria using this strategy will have multiple space applications because of its ability to produce oxygen. In addition, research has shown the survivability of this organism in space for a certain period of time. Few species of cyanobacterial residents of the soil such as Microcoleus, are able to survive in extreme drought as well. This work specifically focuses on Synechococcus elongatus, an endolith cyanobacteria with multiple benefits. It has the capability to produce 25% oxygen in water bodies. It utilizes carbon dioxide to produce oxygen via photosynthesis and also uses carbon dioxide as an energy source to form glucose via the Calvin cycle. There is a fair possibility of initiating cryptobiosis in such an organism by inducing certain proteins extracted from tardigrades such as Heat Shock Proteins (Hsp27 and Hsp30c) and/or hydrophilic Late Embryogenesis Abundant proteins (LEA). Existing methods like cryopreservation are difficult to execute in space keeping in mind their cost and heavy instrumentation. Also, extensive freezing may cause cellular damage. Therefore, cryptobiosis-induced cyanobacteria for its transportation from Earth to Mars as a part of future terraforming missions on Mars will save resources and increase the effectiveness of preservation. Finally, Cyanobacteria species like Synechococcus elongatus can also produce oxygen and glucose on Mars in favorable conditions and holds the key to terraforming Mars.

Keywords: cryptobiosis, cyanobacteria, glucose, mars, Synechococcus elongatus, tardigrades

Procedia PDF Downloads 181