Search results for: access control system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26960

Search results for: access control system

23030 Influence of Driving Strategy on Power and Fuel Consumption of Lightweight PEM Fuel Cell Vehicle Powertrain

Authors: Suhadiyana Hanapi, Alhassan Salami Tijani, W. A. N Wan Mohamed

Abstract:

In this paper, a prototype PEM fuel cell vehicle integrated with a 1 kW air-blowing proton exchange membrane fuel cell (PEMFC) stack as a main power sources has been developed for a lightweight cruising vehicle. The test vehicle is equipped with a PEM fuel cell system that provides electric power to a brushed DC motor. This vehicle was designed to compete with industrial lightweight vehicle with the target of consuming least amount of energy and high performance. Individual variations in driving style have a significant impact on vehicle energy efficiency and it is well established from the literature. The primary aim of this study was to assesses the power and fuel consumption of a hydrogen fuel cell vehicle operating at three difference driving technique (i.e. 25 km/h constant speed, 22-28 km/h speed range, 20-30 km/h speed range). The goal is to develop the best driving strategy to maximize performance and minimize fuel consumption for the vehicle system. The relationship between power demand and hydrogen consumption has also been discussed. All the techniques can be evaluated and compared on broadly similar terms. Automatic intelligent controller for driving prototype fuel cell vehicle on different obstacle while maintaining all systems at maximum efficiency was used. The result showed that 25 km/h constant speed was identified for optimal driving with less fuel consumption.

Keywords: prototype fuel cell electric vehicles, energy efficient, control/driving technique, fuel economy

Procedia PDF Downloads 429
23029 Influence of Social Media on Perceived Learning Outcome of Agricultural Students in Tertiary Institutions in Oyo State, Nigeria

Authors: Adedoyin Opeyemi Osokoya

Abstract:

The study assesses the influence of social media on perceived learning outcome of agricultural science students in tertiary institutions in Oyo state, Nigeria. The four-stage sampling procedure was used to select participants. All students in the seven tertiary institutions that offer agriculture science as a course of study in Oyo State was the population. A university, a college of agriculture and a college of education were sampled, and a department from each was randomly selected. Twenty percent of the students’ population in the respective selected department gave a sample size of 165. Questionnaire was used to collect information on respondents’ personal characteristics and information related to access to social media. Data were analysed using descriptive statistics, chi-square, correlation, and multiple regression at the 0.05 confidence level. Age and household size were 21.13 ± 2.64 years and 6 ± 2.1 persons respectively. All respondents had access to social media, majority (86.1%) owned Android phone, 57.6% and 52.7% use social media for course work and entertainment respectively, while the commonly visited sites were WhatsApp, Facebook, Google, Opera mini. Over half (53.9%) had an unfavourable attitude towards the use of social media for learning; benefits of the use of social media for learning was high (56.4%). Removal of information barrier created by distance (x̄=1.58) was the most derived benefit, while inadequate power supply (x̄=2.36), was the most severe constraints. Age (β=0.23), sex (β=0.37), ownership of Android phone (β=-1.29), attitude (β=0.37), constraints (β =-0.26) and use of social media (β=0.23) were significant predictors of influence on perceived learning outcomes.

Keywords: use of social media, agricultural science students, undergraduates of tertiary institutions, Oyo State of Nigeria

Procedia PDF Downloads 115
23028 Empowering Persons with Disabilities in Indonesia: Translating the Disability Law into Practice

Authors: Marthella Rivera Roidatua

Abstract:

Since the release of Convention on the Rights of Persons with Disabilities in 2006, disability became a mainstreamed global issue. Many developed countries have shown the continuous effort to improve their disability employment policy, for example, the US and the UK with their integrated support system through disability benefits. Relative little recent research on developing country is available. Surprisingly, Indonesia, just enacted the Law No.8/2016 on Disability that bravely highlighted on integrating disabled people into the workforce. It shows a positive progress shifting traditional perspective to what Tom Shakespeare’s concept of a social model of disability. But, the main question is how can this law support the disabled people to access and maintain paid work. Thus, besides the earlier literature reviews, interviews with leading sectors, Ministry of Social Affairs and Ministry of Manpower, was conducted to examine government’s attitude towards the disabled worker. Insights from two local social enterprises on disability were also engaged in building better perspective. The various source of data was triangulated then analysed with a thematic approach. Results were encouraging the Indonesian government to have a better collaboration with other impactful local organisations in promoting the disability employment. In the end, this paper also recommends the government to make a reasonable adjustment and practical guideline for companies in hiring disabled.

Keywords: disability, employment, policy, Indonesia, collaboration, guidelines

Procedia PDF Downloads 224
23027 Analysis of a Damage-Control Target Displacement of Reinforced Concrete Bridge Pier for Seismic Design

Authors: Mohd Ritzman Abdul Karim, Zhaohui Huang

Abstract:

A current focus in seismic engineering practice is the development of seismic design approach that focuses on the performance-based design. Performance-based design aims to design the structures to achieve specified performance based on the damage limit states. This damage limit is more restrictive limit than life safety and needs to be carefully estimated to avoid damage in piers due to failure in transverse reinforcement. In this paper, a different perspective of damage limit states has been explored by integrating two damage control material limit state, concrete and reinforcement by introduced parameters such as expected yield stress of transverse reinforcement where peak tension strain prior to bar buckling is introduced in a recent study. The different perspective of damage limit states with modified yield displacement and the modified plastic-hinge length is used in order to predict damage-control target displacement for reinforced concreate (RC) bridge pier. Three-dimensional (3D) finite element (FE) model has been developed for estimating damage target displacement to validate proposed damage limit states. The result from 3D FE analysis was validated with experimental study found in the literature. The validated model then was applied to predict the damage target displacement for RC bridge pier and to validate the proposed study. The tensile strain on reinforcement and compression on concrete were used to determine the predicted damage target displacement and compared with the proposed study. The result shows that the proposed damage limit states were efficient in predicting damage-control target displacement consistent with FE simulations.

Keywords: damage-control target displacement, damage limit states, reinforced concrete bridge pier, yield displacement

Procedia PDF Downloads 141
23026 Families’ Entrepreneurial Background as a Moderator between Entrepreneurial Intentions and Its Antecedents among Undergraduate Students in Ethiopia

Authors: Messele Kumilachew Aga, Amanpreet Singh

Abstract:

This study investigates the effect of attitude toward entrepreneurship, subjective norm, and perceived behavioral control on entrepreneurial intentions and examines the moderating role of families’ entrepreneurial background in this causal relationship. Three hundred thirty-five undergraduate students from four universities in Ethiopia filled and returned a self-administrated questionnaire which was analyzed through independent sample t-test and process macro. The result obtained indicated that there was no mean difference in entrepreneurial intentions and its antecedents between students who have families with an entrepreneurial background and not. Besides, the study shows that families’ entrepreneurial background has no moderating effect on entrepreneurial intentions due to attitude toward entrepreneurship, subjective norm, and perceived behavioral control. Hence, the study suggests no need of considering families’ entrepreneurial background in nurturing entrepreneurship for undergraduate students in Ethiopian universities.

Keywords: attitude toward entrepreneurship, entrepreneurial intentions, families’ entrepreneurial background, perceived behavioral control, subjective norm

Procedia PDF Downloads 152
23025 Cluster Based Ant Colony Routing Algorithm for Mobile Ad-Hoc Networks

Authors: Alaa Eddien Abdallah, Bajes Yousef Alskarnah

Abstract:

Ant colony based routing algorithms are known to grantee the packet delivery, but they su ffer from the huge overhead of control messages which are needed to discover the route. In this paper we utilize the network nodes positions to group the nodes in connected clusters. We use clusters-heads only on forwarding the route discovery control messages. Our simulations proved that the new algorithm has decreased the overhead dramatically without affecting the delivery rate.

Keywords: ad-hoc network, MANET, ant colony routing, position based routing

Procedia PDF Downloads 408
23024 Analysis of The Effect about Different Automatic Sprinkler System Extinguishing The Scooter Fire in Underground Parking Space

Authors: Yu-Hsiu Li, Chun-Hsun Chen

Abstract:

Analysis of automatic sprinkler system protects the scooter in underground parking space, the current of general buildings is mainly equipped with foam fire-extinguishing equipment in Taiwan, the automatic sprinkling system has economic and environmental benefits, even high stability, China and the United States allow the parking space to set the automatic sprinkler system under certain conditions. The literature about scooter full-scale fire indicates that the average fire growth coefficient is 0.19 KW/sec2, it represents the scooter fire is classified as ultra-fast time square fire growth model, automatic sprinkler system can suppress the flame height and prevent extending burning. According to the computer simulation (FDS) literature, no matter computer simulation or full-scale experiments, the active order and trend about sprinkler heads are the same. This study uses the computer simulation program (FDS), the simulation scenario designed includes using a different system (enclosed wet type and open type), and different configurations. The simulation result demonstrates that the open type requires less time to extinguish the fire than the enclosed wet type if the horizontal distance between the sprinkler and the scooter ignition source is short, the sprinkler can act quickly, the heat release rate of fire can be suppressed in advance.

Keywords: automatic sprinkler system, underground parking Spac, FDS, scooter fire extinguishing

Procedia PDF Downloads 126
23023 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 12
23022 Password Cracking on Graphics Processing Unit Based Systems

Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik

Abstract:

Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.

Keywords: GPGPU, password cracking, secret key, user authentication

Procedia PDF Downloads 269
23021 Relationship between Demographic Characteristics and Lifestyle among Indonesian Pregnant Women with Hypertension

Authors: Yosi Maria Wijaya, Florisma Arista Riti Tegu

Abstract:

Background: Hypertension in pregnancy can be prevented by controlling the lifestyle. However, the majority of research on this topic has been conducted on lifestyle in women with normal pregnancy. Few studies of lifestyle have focused on Indonesian pregnant women with hypertension. Aim: The purpose of this study is to determine the association of demographic characteristics and the lifestyle of pregnant women who have hypertension. Methods: In this cross-sectional study, 76 women with hypertension during pregnancy were recruited from primary health care, West Java, Indonesia. Inclusion criteria were gestational age ≥ 28 weeks with the blood pressure systole ≥ 140 mmHg and diastole ≥ 90 mmHg. Data were collected using two instruments: demographic data and Health Promoting Life Style Profile (HPLP II). Data were analyzed with descriptive statistic and linear regression analysis. Results: The majority of participants were married, mean age was 27.96 years old (SD=6.77) with the mean of gestational age 33.21 (SD=3.49), most of them unemployed (94.7%) and more than a half participants have an education less than twelve years (59.2%). The total score of lifestyle was 2.44 (SD=0.34), more than a half participants experience unhealthy lifestyle (59.2%). Lifestyle was predicted by income, education years, occupation, and access to health care services, accounting for 20.8% of the total variance. Conclusion: Pregnant women with hypertension with low income, low level of education, non-occupational and hard to access health care services were related to unhealthy lifestyle. Understanding the lifestyle and associated factors contributes to health care providers ability to design effective interventions intended to improve healthy lifestyle among pregnant women with hypertension.

Keywords: demographic characteristics, hypertension, lifestyle, pregnancy

Procedia PDF Downloads 175
23020 Investigation into Micro-Grids with Renewable Energy Sources for Use as High Reliability Electrical Power Supply in a Nuclear Facility

Authors: Gerard R. Lekhema, Willie A Cronje, Ian Korir

Abstract:

The objective of this research work is to investigate the use of a micro-grid system to improve the reliability and availability of emergency electrical power in a nuclear facility. The nuclear facility is a safety-critical application that requires reliable electrical power for safe startup, operation and normal or emergency shutdown conditions. The majority of the nuclear facilities around the world utilize diesel generators as emergency power supply during loss of offsite power events. This study proposes the micro-grid system with distributed energy sources and energy storage systems for use as emergency power supply. The systems analyzed include renewable energy sources, decay heat recovery system and large scale energy storage system. The configuration of the micro-grid system is realized with guidelines of nuclear safety standards and requirements. The investigation results presented include performance analysis of the micro-grid system in terms of reliability and availability.

Keywords: emergency power supply, micro-grid, nuclear facility, renewable energy sources

Procedia PDF Downloads 378
23019 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

Authors: Mohamad Khairi Ishak

Abstract:

Conventional public key crypto systems such as RSA (Ron Rivest, Adi Shamir and Leonard Adleman), DSA (Digital Signature Algorithm), and Elgamal are no longer efficient to be implemented in the small, memory constrained devices. Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key crypto systems, has thus become a very attractive choice for many applications. This paper describes implementation of an elliptic curve cryptography (ECC) encryption engine on a FPGA. The system has been implemented in 2 different key sizes, which are 131 bits and 163 bits. Area and timing analysis are provided for both key sizes for comparison. The crypto system, which has been implemented on Altera’s EPF10K200SBC600-1, has a hardware size of 5945/9984 and 6913/9984 of logic cells for 131 bits implementation and 163 bits implementation respectively. The crypto system operates up to 43 MHz, and performs point multiplication operation in 11.3 ms for 131 bits implementation and 14.9 ms for 163 bits implementation. In terms of speed, our crypto system is about 8 times faster than the software implementation of the same system.

Keywords: elliptic curve cryptography, FPGA, key sizes, memory

Procedia PDF Downloads 300
23018 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 337
23017 Leveraging NFT Secure and Decentralized Lending: A Defi Solution

Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.

Abstract:

In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.

Keywords: blockchain, defi, NFT, ethereum, marketplace

Procedia PDF Downloads 32
23016 Evaluating the Seismic Stress Distribution in the High-Rise Structures Connections with Optimal Bracing System

Authors: H. R. Vosoughifar, Seyedeh Zeinab. Hosseininejad, Nahid Shabazi, Seyed Mohialdin Hosseininejad

Abstract:

In recent years, structure designers advocate further application of energy absorption devices for lateral loads damping. The Un-bonded Braced Frame (UBF) system is one of the efficient damping systems, which is made of a smart combination of steel and concrete or mortar. In this system, steel bears the earthquake-induced axial force as compressive or tension forces without loss of strength. Concrete or mortar around the steel core acts as a constraint for brace and prevents brace buckling during seismic axial load. In this study, the optimal bracing system in the high-rise structures has been evaluated considering the seismic stress distribution in the connections. An actual 18-story structure was modeled using the proper Finite Element (FE) software where braced with UBF, Eccentrically Braced Frames (EBF) and Concentrically Braced Frame (CBF) systems. Nonlinear static pushover and time-history analyses are then performed so that the acquired results demonstrate that the UBF system reduces drift values in the high-rise buildings. Further statistical analyses show that there is a significant difference between the drift values of UBF system compared with those resulted from the EBF and CBF systems. Hence, the seismic stress distribution in the connections of the proposed structure which braced with UBF system was investigated.

Keywords: optimal bracing system, high-rise structure, finite element analysis (FEA), seismic stress

Procedia PDF Downloads 416
23015 The Exploitation of the MOSES Project Outcomes on Supply Chain Optimisation

Authors: Reza Karimpour

Abstract:

Ports play a decisive role in the EU's external and internal trade, as about 74% of imports and exports and 37% of exchanges go through ports. Although ports, especially Deep Sea Shipping (DSS) ports, are integral nodes within multimodal logistic flows, Short Sea Shipping (SSS) and inland waterways are not so well integrated. The automated vessels and supply chain optimisations for sustainable shortsea shipping (MOSES) project aims to enhance the short sea shipping component of the European supply chain by addressing the vulnerabilities and strains related to the operation of large containerships. The MOSES concept can be shortly described as a large containership (mother-vessel) approaching a DSS port (or a large container terminal). Upon her arrival, a combined intelligent mega-system consisting of the MOSES Autonomous tugboat swarm for manoeuvring and the MOSES adapted AutoMoor system. Then, container handling processes are ready to start moving containers to their destination via hinterland connections (trucks and/or rail) or to be shipped to destinations near small ports (on the mainland or island). For the first case, containers are stored in a dedicated port area (Storage area), waiting to be moved via trucks and/or rail. For the second case, containers are stacked by existing port equipment near-dedicated berths of the DSS port. They then are loaded on the MOSES Innovative Feeder Vessel, equipped with the MOSES Robotic Container-Handling System that provides (semi-) autonomous (un) feeding of the feeder. The Robotic Container-Handling System is remotely monitored through a Shore Control Centre. When the MOSES innovative Feeder vessel approaches the small port, where her docking is achieved without tugboats, she automatically unloads the containers using the Robotic Container-Handling System on the quay or directly on trucks. As a result, ports with minimal or no available infrastructure may be effectively integrated with the container supply chain. Then, the MOSES innovative feeder vessel continues her voyage to the next small port, or she returns to the DSS port. MOSES exploitation activity mainly aims to exploit research outcomes beyond the project, facilitate utilisation of the pilot results by others, and continue the pilot service after the project ends. By the mid-lifetime of the project, the exploitation plan introduces the reader to the MOSES project and its key exploitable results. It provides a plan for delivering the MOSES innovations to the market as part of the overall exploitation plan.

Keywords: automated vessels, exploitation, shortsea shipping, supply chain

Procedia PDF Downloads 93
23014 Foundation Phase Teachers' Experiences of School Based Support Teams: A Case of Selected Schools in Johannesburg

Authors: Ambeck Celyne Tebid, Harry S. Rampa

Abstract:

The South African Education system recognises the need for all learners including those experiencing learning difficulties, to have access to a single unified system of education. For teachers to be pedagogically responsive to an increasingly diverse learner population without appropriate support has been proven to be unrealistic. As such, this has considerably hampered interest amongst teachers, especially those at the foundation phase to work within an Inclusive Education (IE) and training system. This qualitative study aimed at investigating foundation phase teachers’ experiences of school-based support teams (SBSTs) in two Full-Service (inclusive schools) and one Mainstream public primary school in the Gauteng province of South Africa; with particular emphasis on finding ways to supporting them, since teachers claimed they were not empowered in their initial training to teach learners experiencing learning difficulties. Hence, SBSTs were created at school levels to fill this gap thereby, supporting teaching and learning by identifying and addressing learners’, teachers’ and schools’ needs. With the notion that IE may be failing because of systemic reasons, this study uses Bronfenbrenner’s (1979) ecosystemic as well as Piaget’s (1980) maturational theory to examine the nature of support and experiences amongst teachers taking individual and systemic factors into consideration. Data was collected using in-depth, face-to-face interviews, document analysis and observation with 6 foundation phase teachers drawn from 3 different schools, 3 SBST coordinators, and 3 school principals. Data was analysed using the phenomenological data analysis method. Amongst the findings of the study is that South African full- service and mainstream schools have functional SBSTs which render formal and informal support to the teachers; this support varies in quality depending on the socio-economic status of the relevant community where the schools are situated. This paper, however, argues that what foundation phase teachers settled for as ‘support’ is flawed; as well as how they perceive the SBST and its role is problematic. The paper conclude by recommending that, the SBST should consider other approaches at foundation phase teacher support such as, empowering teachers with continuous practical experiences on how to deal with real classroom scenarios, as well as ensuring that all support, be it on academic or non-academic issues should be provided within a learning community framework where the teacher, family, SBST and where necessary, community organisations should harness their skills towards a common goal.

Keywords: foundation phase, full- service schools, inclusive education, learning difficulties, school-based support teams, teacher support

Procedia PDF Downloads 216
23013 Fault Detection and Isolation in Sensors and Actuators of Wind Turbines

Authors: Shahrokh Barati, Reza Ramezani

Abstract:

Due to the countries growing attention to the renewable energy producing, the demand for energy from renewable energy has gone up among the renewable energy sources; wind energy is the fastest growth in recent years. In this regard, in order to increase the availability of wind turbines, using of Fault Detection and Isolation (FDI) system is necessary. Wind turbines include of various faults such as sensors fault, actuator faults, network connection fault, mechanical faults and faults in the generator subsystem. Although, sensors and actuators have a large number of faults in wind turbine but have discussed fewer in the literature. Therefore, in this work, we focus our attention to design a sensor and actuator fault detection and isolation algorithm and Fault-tolerant control systems (FTCS) for Wind Turbine. The aim of this research is to propose a comprehensive fault detection and isolation system for sensors and actuators of wind turbine based on data-driven approaches. To achieve this goal, the features of measurable signals in real wind turbine extract in any condition. The next step is the feature selection among the extract in any condition. The next step is the feature selection among the extracted features. Features are selected that led to maximum separation networks that implemented in parallel and results of classifiers fused together. In order to maximize the reliability of decision on fault, the property of fault repeatability is used.

Keywords: FDI, wind turbines, sensors and actuators faults, renewable energy

Procedia PDF Downloads 386
23012 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 73
23011 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance

Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug

Abstract:

Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.

Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk

Procedia PDF Downloads 208
23010 Optimizing Performance of Tablet's Direct Compression Process Using Fuzzy Goal Programming

Authors: Abbas Al-Refaie

Abstract:

This paper aims at improving the performance of the tableting process using statistical quality control and fuzzy goal programming. The tableting process was studied. Statistical control tools were used to characterize the existing process for three critical responses including the averages of a tablet’s weight, hardness, and thickness. At initial process factor settings, the estimated process capability index values for the tablet’s averages of weight, hardness, and thickness were 0.58, 3.36, and 0.88, respectively. The L9 array was utilized to provide experimentation design. Fuzzy goal programming was then employed to find the combination of optimal factor settings. Optimization results showed that the process capability index values for a tablet’s averages of weight, hardness, and thickness were improved to 1.03, 4.42, and 1.42, respectively. Such improvements resulted in significant savings in quality and production costs.

Keywords: fuzzy goal programming, control charts, process capability, tablet optimization

Procedia PDF Downloads 255
23009 Factors Influencing Adoption of Climate-Smart Agricultural Practices among Maize Farmers in Ondo State, Nigeria

Authors: Oduntan Oluwakemi, Obisesan Adekemi Adebisola, Ayo-Bello Taofeeq Ayodeji

Abstract:

The study examined the factors influencing the adoption of climate-smart agricultural practices among maize farmers in Ondo State, Nigeria. A Multi-stage sampling procedure was used to randomly select one hundred respondents for the study. Primary data were collected from the respondents with the aid of a structured questionnaire and analysed using descriptive statistics and a probit regression model. The results of this study showed that crop diversification was the most adopted climate-smart agricultural practice by the respondents, and adoption of Climate Smart Agricultural practices is still very low among the respondents. Results of probit regression revealed that marital status, access to extension services, farming experience, membership of farmers’ association, and access to credit had a positive influence on the adoption of climate-smart agricultural practices, while age, farm size, and total income had a negative influence. Based on the findings of the study, it was recommended that government should develop suitable policies that will encourage farmers, especially rural farmers, to adopt and utilize Climate Smart Agricultural Practices (CSAP). Equally, the study also recommended government should be geared towards supporting improved extension services, providing on-farm demonstration training, disseminating information about climate-smart agricultural practices, and providing credit facilities through the Agricultural Credit Guarantee Scheme Fund and bank credit to farmers in order to enhance the adoption.

Keywords: adoption, agriculture, climate-smart, farmers, maize, Nigeria

Procedia PDF Downloads 108
23008 Effects of the Supplementary for Understanding and Preventing Plagiarism on EFL Students’ Writing

Authors: Surichai Butcha, Dararat Khampusaen

Abstract:

As the Internet is recognized as a high potential and powerful educational tool to access sources of knowledge, plagiarism is an increasing unethical issue found in students’ writing. This paper is deriving from the 1st phase of an on-going study investigating the effects of the supplementary on citing sources on undergraduate students’ writing. The 40 participants were divided into 1 experimental group and 1 control group. Both groups were administered with a questionnaire on knowledge and an interview on attitude related to using sources in writing. Only the experimental group undertook the 4 lessons focusing on using outside sources and citing the original work (quoting, synthesizing, summarizing and paraphrasing) were delivered to them via e-learning tools throughout a semester. Participants were required to produce 4 writing tasks after each lesson. The results were concerned with types and factors on using outside sources in writing of Thai undergraduate EFL students from the survey. The interview results supported and clarified the survey result. In addition, the writing rubrics confirmed the types of plagiarism frequently occurred in students’ writing. The results revealed the types and factors on plagiarism including their perceptions on using the outside sources in their writing from the interview. The discussion shed the lights on cultural dimensions of plagiarism in student writing, roles of teachers, library, and university policy on the rate of plagiarism. Also, the findings promoted the awareness on ethics in writing and prevented the rate of potential unintentional plagiarism. Additionally, the results of this phase of study could lead to the appropriate contents to be considered for inclusion in the supplementary on using sources for writing for future research.

Keywords: citing source, EFL writing, e-learning, Internet, plagiarism

Procedia PDF Downloads 137
23007 Family Carers' Experiences in Striving for Medical Care and Finding Their Solutions for Family Members with Mental Illnesses

Authors: Yu-Yu Wang, Shih-Hua Hsieh, Ru-Shian Hsieh

Abstract:

Wishes and choices being respected, and the right to be supported rather than coerced, have been internationally recognized as the human rights of persons with mental illness. In Taiwan, ‘coerced hospitalization’ has become difficult since the revision of the mental health legislation in 2007. Despite trend towards human rights, the real problem families face when their family members are in mental health crisis is the lack of alternative services. This study aims to explore: 1) When is hospitalization seen as the only solution by family members? 2) What are the barriers for arranging hospitalization, and how are they managed? 3) What have family carers learned, in their experiences of caring for their family members with mental illness? To answer these questions, qualitative approach was adopted, and focus group interviews were taken to collect data. This study includes 24 family carers. The main findings of this research include: First, hospital is the last resort for carers in helplessness. Family carers tend to do everything they could to provide care at home for their family members with mental illness. Carers seek hospitalization only when a patient’s behavior is too violent, weird, and/or abnormal, and beyond their ability to manage. Hospitalization, nevertheless, is never an easy choice. Obstacles emanate from the attitudes of the medical doctors, the restricted areas of ambulance service, and insufficient information from the carers’ part. On the other hand, with some professionals’ proactive assistance, access to medical care while in crisis becomes possible. Some family carers obtained help from the medical doctor, nurse, therapist and social workers. Some experienced good help from policemen, taxi drivers, and security guards at the hospital. The difficulty in accessing medical care prompts carers to work harder on assisting their family members with mental illness to stay in stable states. Carers found different ways of helping the ‘person’ to get along with the ‘illness’ and have better quality of life. Taking back ‘the right to control’ in utilizing medication, from passiveness to negotiating with medical doctors and seeking alternative therapies, are seen in many carers’ efforts. Besides, trying to maintain regular activities in daily life and play normal family roles are also experienced as important. Furthermore, talking with the patient as a person is also important. The authors conclude that in order to protect the human rights of persons with mental illness, it is crucial to make the medical care system more flexible and to make the services more humane: sufficient information should be provided and communicated, and efforts should be made to maintain the person’s social roles and to support the family.

Keywords: family carers, independent living, mental health crisis, persons with mental illness

Procedia PDF Downloads 290
23006 Design and Development of Wind Turbine Emulator to Operate with 1.5 kW Induction Generator

Authors: Himani Ratna Dahiya

Abstract:

This paper contributes to design a Wind Emulator coupled to 1.5 kW Induction generator for Wind Energy Conversion System. A wind turbine emulator (WTE) is important equipment for developing wind energy conversion systems. It offers a controllable test environment that allows the evaluation and improvement of control schemes for electric generators that is hard to achieve with an actual wind turbine since the wind speed varies randomly. In this paper a wind emulator is modeled and simulated using MATLAB. Verification of the simulation results is done by experimental setup using DC motor-Induction generator set, LABVIEW and data acquisition card.

Keywords: Wind Turbine Emulator, LABVIEW, matlab, induction generator

Procedia PDF Downloads 579
23005 The Cost-Effectiveness of Pancreatic Surgical Cancer Care in the US vs. the European Union: Results of a Review of the Peer-Reviewed Scientific Literature

Authors: Shannon Hearney, Jeffrey Hoch

Abstract:

While all cancers are costly to treat, pancreatic cancer is a notoriously costly and deadly form of cancer. Across the world there are a variety of treatment centers ranging from small clinics to large, high-volume hospitals as well as differing structures of payment and access. It has been noted that centers that treat a high volume of pancreatic cancer patients have higher quality of care, it is unclear if that care is cost-effective. In the US there is no clear consensus on the cost-effectiveness of high-volume centers for the surgical care of pancreatic cancer. Other European countries, like Finland and Italy have shown that high-volume centers have lower mortality rates and can have lower costs, there however, is still a gap in knowledge about these centers cost-effectiveness globally. This paper seeks to review the current literature in Europe and the US to gain a better understanding of the state of high-volume pancreatic surgical centers cost-effectiveness while considering the contextual differences in health system structure. A review of major reference databases such as Medline, Embase and PubMed will be conducted for cost-effectiveness studies on the surgical treatment of pancreatic cancer at high-volume centers. Possible MeSH terms to be included, but not limited to, are: “pancreatic cancer”, “cost analysis”, “cost-effectiveness”, “economic evaluation”, “pancreatic neoplasms”, “surgical”, “Europe” “socialized medicine”, “privatized medicine”, “for-profit”, and “high-volume”. Studies must also have been available in the English language. This review will encompass European scientific literature, as well as those in the US. Based on our preliminary findings, we anticipate high-volume hospitals to provide better care at greater costs. We anticipate that high-volume hospitals may be cost-effective in different contexts depending on the national structure of a healthcare system. Countries with more centralized and socialized healthcare may yield results that are more cost-effective. High-volume centers may differ in their cost-effectiveness of the surgical care of pancreatic cancer internationally especially when comparing those in the United States to others throughout Europe.

Keywords: cost-effectiveness analysis, economic evaluation, pancreatic cancer, scientific literature review

Procedia PDF Downloads 77
23004 Assessment of Drinking Water Quality in Relation to Arsenic Contamination in Drinking Water in Liberia: Achieving the Sustainable Development Goal of Ensuring Clean Water and Sanitation

Authors: Victor Emery David Jr., Jiang Wenchao, Daniel Mmereki, Yasinta John

Abstract:

The fundamentals of public health are access to safe and clean drinking water. The presence of arsenic and other contaminants in drinking water leads to the potential risk to public health and the environment particularly in most developing countries where there’s inadequate access to safe and clean water and adequate sanitation. Liberia has taken steps to improve its drinking water status so as to achieve the Sustainable Development Goals (SDGs) target of ensuring clean water and effective sanitation but there is still a lot to be done. The Sustainable Development Goals are a United Nation initiative also known as transforming our world: The 2030 agenda for sustainable development. It contains seventeen goals with 169 targets to be met by respective countries. Liberia is situated within in the gold belt region where there exist the presence of arsenic and other contaminants in the underground water due to mining and other related activities. While there are limited or no epidemiological studies conducted in Liberia to confirm illness or death as a result of arsenic contamination in Liberia, it remains a public health concern. This paper assesses the drinking water quality, the presence of arsenic in groundwater/drinking water in Liberia, and proposes strategies for mitigating contaminants in drinking water and suggests options for improvement with regards to achieving the Sustainable Development Goals of ensuring clean water and effective sanitation in Liberia by 2030.

Keywords: arsenic, action plan, contaminants, environment, groundwater, sustainable development goals (SDGs), Monrovia, Liberia, public health, drinking water

Procedia PDF Downloads 242
23003 An Algorithm to Compute the State Estimation of a Bilinear Dynamical Systems

Authors: Abdullah Eqal Al Mazrooei

Abstract:

In this paper, we introduce a mathematical algorithm which is used for estimating the states in the bilinear systems. This algorithm uses a special linearization of the second-order term by using the best available information about the state of the system. This technique makes our algorithm generalizes the well-known Kalman estimators. The system which is used here is of the bilinear class, the evolution of this model is linear-bilinear in the state of the system. Our algorithm can be used with linear and bilinear systems. We also here introduced a real application for the new algorithm to prove the feasibility and the efficiency for it.

Keywords: estimation algorithm, bilinear systems, Kakman filter, second order linearization

Procedia PDF Downloads 472
23002 Effects of Achillea millefolium L. Extract on Rat Spermatogenesis

Authors: Nasrin Takzaree, Gholamreza Hassanzadeh, Abbas Hadjiakhoondi, Mohammadreza Rouini

Abstract:

Introduction: Today herbal medicine are extensively used for various therapeutic reasons. Whereas Achillea millefolium L. comprises different chemical compounds it is used in classic and modern medicine for different purposes. Concerning the family planning as a principle matter, the idea of using specific herbal medicine is of great importance. Purpose: To investigate the effects of Achillea millefolium L. extract on fertility power and spermatogenesis process in male mature Wistar rats and the anti-fertility effects of this extract in male genital system. Material and methods: In this study 32 male mature Wistar rats were randomly divided in to 4 experimental groups. 1st experimental group included 8 rats receiving Achillea millefolium extract at the dose of 200 mg/kg intraperitoneally. Second and third groups received the extract the same at the doses of 400 and 800 mg/kg respectively. 4th group was considered as control group in which the parenteral distilled water was administered. after 20 days, rats were sacrificed and the spermatogenesis process was histologically examined. Results: In experimental groups receiving high doses of extract comparing with control group, thickness in seminiferous tubules basal membrane, decrease in germinal epithelium cells, congestion in testicular tissue, disarrangement in germinal epithelium cells as well as decrease in cellular condense were observed (p<0.001). Conclusion: Findings suggest that alcoholic extract of Achillea millefolium at high concentrations lead to the structural alterations and changes in spermatogenesis in testicular tissue.

Keywords: spermatogenesis, alcoholic extract of Achillea millefolium L., testis, Wistar rat

Procedia PDF Downloads 567
23001 Pyelography by Intraosseous Injection of Iodixanol in Persian Squirrel

Authors: Mehdi Tavana, Seyedeh Zeinab Peighambarzadeh

Abstract:

Pyelography is used for morphologic and especially functional studies of the urinary tracts. There are many indications for excretory Pyelography in humans and animals. Intravenous Pyelography is the most practical method; other Pyelography techniques were manipulated because of difficulties for finding veins in small size of the patients. At the best of times, the combination of small veins and abundant subcutaneous tissue makes vascular access difficult or impossible, therefore, another methods of administration of contrast media is desired. This study was performed to evaluate the feasibility of intraosseous injection of iodixanol in providing a safe and diagnostic urogram in Persian squirrel. Fourteen hundred mg iodine per kilogram body weight of iodixanol was injected subcutaneously over tibial tuberosity on ten clinically healthy adult Persian squirrels with no signs of urinary system disorder. Lateral and ventrodorsal radiographs were taken every 2 minutes until the pyelogram was finished. Intraosseous injection of iodixanol was successful to show nephrogram, pyelogram, uretrogram and cystogram clearly. There were no abnormal clinical signs after one week of experiments. Biochemical and hematological profiles were in normal ranges. It is concluded that intraosseous Pyelography is an effective and reliable method for Pyelography studies in squirrel. Microscopic examinations of the kidneys and the site of injection after one week were normal.

Keywords: pyelography, intraosseous injection, iodixanol, persian squirrel

Procedia PDF Downloads 512