Search results for: privacy preserving mechanisms
2914 Understanding Evolutionary Algorithms through Interactive Graphical Applications
Authors: Javier Barrachina, Piedad Garrido, Manuel Fogue, Julio A. Sanguesa, Francisco J. Martinez
Abstract:
It is very common to observe, especially in Computer Science studies that students have difficulties to correctly understand how some mechanisms based on Artificial Intelligence work. In addition, the scope and limitations of most of these mechanisms are usually presented by professors only in a theoretical way, which does not help students to understand them adequately. In this work, we focus on the problems found when teaching Evolutionary Algorithms (EAs), which imitate the principles of natural evolution, as a method to solve parameter optimization problems. Although this kind of algorithms can be very powerful to solve relatively complex problems, students often have difficulties to understand how they work, and how to apply them to solve problems in real cases. In this paper, we present two interactive graphical applications which have been specially designed with the aim of making Evolutionary Algorithms easy to be understood by students. Specifically, we present: (i) TSPS, an application able to solve the ”Traveling Salesman Problem”, and (ii) FotEvol, an application able to reconstruct a given image by using Evolution Strategies. The main objective is that students learn how these techniques can be implemented, and the great possibilities they offer.Keywords: education, evolutionary algorithms, evolution strategies, interactive learning applications
Procedia PDF Downloads 3382913 Exploring Attachment Mechanisms of Sulfate-Reducing Bacteria Biofilm to X52 Carbon Steel and Effective Mitigation Through Moringa Oleifera Extract
Authors: Hadjer Didouh, Mohammed Hadj Melliani, Izzeddine Sameut Bouhaik
Abstract:
Corrosion is a serious problem in industrial installations or metallic transport pipes. Corrosion is an interfacial process controlled by several parameters. The presence of microorganisms affects the kinetics of corrosion. This type of corrosion is often referred to as bio-corrosion or corrosion influenced by microorganisms (MIC). The action of a microorganism or a bacterium is carried out by the formation of biofilm following its attachment to the metal surface. The formation of biofilm isolates the metal surface from its environment and allows the bacteria to control the parameters of the metal/bacteria interface. Biofilm formation by sulfate-reducing bacteria (SRB) X52 steel poses substantial challenges in the oil and gas industry SONATRACH of Algeria. This research delves into the complex attachment mechanisms employed by SRB biofilm on X52 carbon steel and investigates innovative strategies for effective mitigation using biocides. The exploration commences by elucidating the underlying mechanisms facilitating SRB biofilm adhesion to X52 carbon steel, considering factors such as surface morphology, electrostatic interactions, and microbial extracellular substances. Advanced microscopy and spectroscopic techniques provide support to the attachment processes, laying the foundation for targeted mitigation strategies. The use of 100 ppm of Moringa Oleifera extract biocide as a promising approach to control and prevent SRB biofilm formation on X52 carbon steel surfaces. Green extracts undergo evaluation for their effectiveness in disrupting biofilm development while ensuring the integrity of the steel substrate. Systematic analysis is conducted on the biocide's impact on the biofilm's structural integrity, microbial viability, and overall attachment strength. This two-pronged investigation aims to deepen our comprehension of SRB biofilm dynamics and contribute to the development of effective strategies for mitigating its impact on X52 carbon steel.Keywords: attachment, bio-corrosion, biofilm, metal/bacteria interface
Procedia PDF Downloads 732912 A Strategic Communication Design Model for Indigenous Knowledge Management
Authors: Dilina Janadith Nawarathne
Abstract:
This article presents the initial development of a communication model (Model_isi) as the means of gathering, preserving and transferring indigenous knowledge in the field of knowledge management. The article first discusses the need for an appropriate complimentary model for indigenous knowledge management which differs from the existing methods and models. Then the paper suggests the newly developed model for indigenous knowledge management which generate as result of blending key aspects of different disciplines, which can be implemented as a complementary approach for the existing scientific method. The paper further presents the effectiveness of the developed method in reflecting upon a pilot demonstration carried out on selected indigenous communities of Sri Lanka.Keywords: indigenous knowledge management, knowledge transferring, tacit knowledge, research model, asian centric philosophy
Procedia PDF Downloads 4802911 Opportunities for Effective Conflict Management Caused by Global Crises
Authors: Marine Kobalava
Abstract:
The article analyzes current global crises in the world, explains the causes of crises, substantiates that in the main cases the process accompanying the crisis are conflict situations. The paper argues that crises can become predictable if threats are identified and addressed by a company, organization, corporation, and others. Accordingly, mechanisms for the neutralization of conflict potential are proposed, the need to develop a communication strategy and create and redistribute information flows is justified. Conflict situations are assessed according to the types of crisis and it is considered that the conflict can become a prerequisite for the crisis. The paper substantiates the need to differentiate theories of crises and conflicts. Based on the evaluative judgment, conflict management measures are proposed taking into account institutionalization, conflict resolution norms and rules. The paper identifies the potential for conflicts created in the context of global crises and suggests local ways and mechanisms for their effective management. The involvement of the company's Public relations (PR) and relevant communication from the qualified staff is considered important. Conclusions are drawn on the problems of effective conflict management caused by global crises and recommendations for conflict resolution have been proposed.Keywords: global crises, conflict situations, conflict identification, conflict management, conflict potential
Procedia PDF Downloads 1382910 Latency-Based Motion Detection in Spiking Neural Networks
Authors: Mohammad Saleh Vahdatpour, Yanqing Zhang
Abstract:
Understanding the neural mechanisms underlying motion detection in the human visual system has long been a fascinating challenge in neuroscience and artificial intelligence. This paper presents a spiking neural network model inspired by the processing of motion information in the primate visual system, particularly focusing on the Middle Temporal (MT) area. In our study, we propose a multi-layer spiking neural network model to perform motion detection tasks, leveraging the idea that synaptic delays in neuronal communication are pivotal in motion perception. Synaptic delay, determined by factors like axon length and myelin insulation, affects the temporal order of input spikes, thereby encoding motion direction and speed. Overall, our spiking neural network model demonstrates the feasibility of capturing motion detection principles observed in the primate visual system. The combination of synaptic delays, learning mechanisms, and shared weights and delays in SMD provides a promising framework for motion perception in artificial systems, with potential applications in computer vision and robotics.Keywords: neural network, motion detection, signature detection, convolutional neural network
Procedia PDF Downloads 872909 Social Mentoring: Towards Formal and Informal Deployment in the Structures of the Social and Solidarity Economy
Authors: Vanessa Casadella, Mourad Chouki, Agnès Ceccarelli, Sofiane Tahi
Abstract:
Mentoring is positioned in an interpersonal and intergenerational perspective, serving the transmission of interpersonal skills and organizational culture. It echoes orientation, project, self-actualization, guidance, transmission, and filiation. It is available using a formal or informal approach. The formal dimension refers to a privileged relationship between a senior and a junior. Informal mentoring is unplanned and emerges naturally between two people who choose each other. However, it remains more difficult to understand. To study the link between formal and informal mentoring and to define the notion of “social” mentoring, we conducted a qualitative study of an exploratory nature with around ten SSE organizations located in the southeast region of Tunisia. The wealth of this territory has pushed residents to found SSE organizations with a view to creating jobs but also to preserving traditions and preserving nature. These organizations developed spontaneously to solve various local problems, such as the revitalization of deserted rural areas, environmental degradation, and the reskilling and professional reintegration of people marginalized in the labor market. This research, based on semi-structured interviews in order to obtain exhaustive and sensitive data, involves an interview guide with few questions mobilized to let the respondents, leaders of the different structures, express themselves freely. The guide includes questions on activities, methods of sharing knowledge, and difficulties in understanding between stakeholders. The interviews, lasting 30 to 60 minutes, were recorded using a dictaphone and then transcribed in full. The results are as follows: 1. We see two iterative mentoring loops. A first loop can be considered a type of formal mentoring. It highlights the support organized (in the form of training) by social enterprises with the aim of developing the autonomy, know-how, and interpersonal skills of members. A second loop concerns informal mentoring. This is non-formalized support provided by members or with other members of the entourage. This informal mentoring is mainly based on the observation of good practices and learning by doing. 2. We notice an intersection between the two loops. If the first loop is not done, the second will not take place. The knowledge acquired in the first loop is used to feed the second. 3. We note a form of reluctance on the part of some members to share their knowledge for reasons of competition. Ultimately, we retain the notion of “social” mentoring as a hybridization of formal and informal mentoring while dimensioning the “social” perspective by emphasizing the reciprocal character, solidarity, confidence, and trust between the mentor and the mentee.Keywords: social innovation, social mentoring, social and solidarity economy, informal mentoring
Procedia PDF Downloads 542908 Which Mechanisms are Involved by Legume-Rhizobia Symbiosis to Increase Its Phosphorus Use Efficiency under Low Phosphorus Level?
Authors: B. Makoudi, R. Ghanimi, A. Bargaz, M. Mouradi, M. Farissi, A. Kabbaj, J. J. Drevon, C. Ghoulam
Abstract:
Legume species are able to establish a nitrogen fixing symbiosis with soil rhizobia that allows them, when it operates normally, to ensure their necessary nitrogen nutrition. This biological process needs high phosphorus (P) supply and consequently it is limited under low phosphorus availability. To overcome this constraint, legume-rhizobia symbiosis develops many mechanisms to increase P availability in the rhizosphere and also the efficiency of P fertilizers. The objectives of our research works are to understand the physiological and biochemical mechanisms implemented by legume-rhizobia symbiosis to increase its P use efficiency (PUE) in order to select legume genotypes-rhizobia strains combination more performing for BNF under P deficiency. Our studies were carried out on two grain legume species, common bean (Phaseolus vulgaris) and faba bean (Vicia faba) tested in farmers’ fields and in experimental station fewer than two soil phosphorus levels. Under field conditions, the P deficiency caused a significant decrease of Plant and nodule biomasses in all of the tested varieties with a difference between them. This P limitation increased the contents of available P in the rhizospheric soils that was positively correlated with the increase of phosphatases activities in the nodules and the rhizospheric soil. Some legume genotypes showed a significant increase of their P use efficiency under P deficiency. The P solubilization test showed that some rhizobia strains isolated from Haouz region presented an important capacity to grow on solid and liquid media with tricalcium phosphate as the only P source and their P solubilizing activity was confirmed by the assay of the released P in the liquid medium. Also, this P solubilizing activity was correlated with medium acidification and the excretion of acid phosphatases and phytases in the medium. Thus, we concluded that medium acidification and excretion of phosphatases in the rhizosphere are the prominent reactions for legume-rhizobia symbiosis to improve its P nutrition.Keywords: legume, phosphorus deficiency, rhizobia, rhizospheric soil
Procedia PDF Downloads 3122907 Unconventional Composite Inorganic Membrane Fabrication for Carbon Emissions Mitigation
Authors: Ngozi Nwogu, Godson Osueke, Mamdud Hossain, Edward Gobina
Abstract:
An unconventional composite inorganic ceramic membrane capable in carbon dioxide emission decline was fabricated and tested at laboratory scale to develop in conformism to various environmental guidelines to mitigate the effect of global warming. A review of the existing membrane technologies for carbon capture including the relevant gas transport mechanisms are presented and discussed. Single gas separation experiments using silica modified ceramic membrane with internal diameter 20mm, outside diameter 25mm and length of 368mm deposited on a macro porous supported reactor.was carried out to investigate individual gas permeation behaviours at different pressures and membrane efficiency after a dip coating method. Nitrogen, Carbon dioxide, Argon, Oxygen and Methane pure gases were used to investigate their individual permeation rates at various pressures. Results show that the gas flow rate increases with pressure drop. However at above a pressure of 3bar, CO2 permeability ratio to than the other gases indicated control of a more selective surface adsorptive transport mechanism.Keywords: carbon dioxide, composite membranes, permeability, transport mechanisms
Procedia PDF Downloads 5042906 An Observation of Patient-Professional Communication in the Cambodian Dental Setting
Authors: Christina Tran, Lu Khoo, Andrea Waylen
Abstract:
Introduction: The evolution of the dental consultation from paternalism to partnership has been well documented in developed Western countries. Great emphasis is now placed on the importance of empowering patients to make decisions regarding their care, obtaining informed consent, and maintaining patient privacy and confidentiality. With the majority of communication occurring non-verbally, clinicians often adopt behaviours which suggest an approachable and positive attitude. However, evidence indicates that in Asia, a paternalistic model may be favored in medicine. The power imbalance occurring in doctor-patient relationships worldwide may be exacerbated by various factors in Southeast Asia: the strong hierarchical culture, and the large education gap between doctor and patient. Further insight into this matter can be gained by observing patient-dentist communication in Cambodia. The dentist:population ratio in Cambodia is approximately 1:33,000, with rural areas remaining extremely underserviced. We have carried out an observational study of communication in a voluntary dental clinic in Cambodia with the aim of describing whether the patient-dentist relationship follows a paternalistic or patient-centred model. Method: Over a period of two weeks, two clinicians provided dental care as part of a voluntary program in two Cambodian settings: a temporary, rural clinic and a permanent clinic in Phnom Penh. The clinicians independently recorded their experiences in diaries, making observations on the verbal and non-verbal communication between patients and staff. General observations such as the clinic environment were also made. The diaries were then compared and analyzed using a thematic approach. Results: The overall themes that emerged were regarding the clinic environment, verbal communication, and non-verbal communication. Regarding the clinic environment, the rural clinic was arranged in order to easily direct patients from one dentist to another, with little emphasis on continuous patient care. There was also little consideration for patient privacy: patients were often treated in the presence of many observers, including other waiting patients. However, the permanent clinic was structured to allow greater patient privacy, with continuous patient care occurring throughout the appointment. Regarding verbal communication, there was a strongly paternalistic approach to gaining consent and giving instruction. Patients rarely asked questions regarding their treatment, with dentists doing little to encourage patient involvement. Non-verbal communication between patients and dentists was generally paternalistic, with the dentist often addressing the supine patient from above. Patients often avoided making eye-contact, which may have indicated discomfort or lack of engagement. Both adult and paediatric patients rarely raised verbal concerns regarding pain during treatment, despite displaying non-verbal signs of experiencing pain. Anxious paediatric patients were sometimes managed with physical restraint by their mothers to facilitate treatment. Conclusion: Patient-professional communication in the Cambodian dental setting was observed to be generally paternalistic in nature, although more patient-centred aspects were observed in the established, urban setting. However, it should be noted that these observations are subjective in nature, and that the patients’ actual perceptions of their communication experience were unexplored. Further observations in variety of dental settings in Cambodia are needed before any definitive conclusions can be made.Keywords: patient-dentist communication, paternalism, patient-centered, non-verbal communication
Procedia PDF Downloads 1222905 Common Regulatory Mechanisms Reveals Links between Aberrant Glycosylation and Biological Hallmarks in Cancer
Authors: Jahanshah Ashkani, Kevin J. Naidoo
Abstract:
Glycosylation is the major posttranslational modification (PTM) process in cellular development. In tumour development, it is marked by structural alteration of carbohydrates (glycans) that is the result of aberrant glycosylation. Altered glycan structures affect cell surface ligand-receptor interactions that interfere with the regulation of cell adhesion, migration, and proliferation. The resulting changes in glycan biosynthesis pathways originate from altered expression of glycosyltransferases and glycosidases. While the alteration in glycosylation patterns is a recognized “hallmark of cancer”, the influential overview of the biology of cancer proposes eight hallmarks with no explicit suggestion to connectivity with glycosylation. Recently, we have discovered a connection between the glycosyltransferase gene expression and cancer type and subtype. Here we present an association between aberrant glycosylation and the biological hallmarks of breast cancer by exploring the common regulatory mechanisms at the genomic scale. The result of this study bridges the glycobiological and biological pathways that are accepted hallmarks of cancer by connecting their common regulatory pathways. This is an impetus for further investigation as target therapies of breast cancer are very likely to be uncovered from this.Keywords: aberrant glycosylation, biological hallmarks, breast cancer, regulatory mechanism
Procedia PDF Downloads 2542904 Detecting Memory-Related Gene Modules in sc/snRNA-seq Data by Deep-Learning
Authors: Yong Chen
Abstract:
To understand the detailed molecular mechanisms of memory formation in engram cells is one of the most fundamental questions in neuroscience. Recent single-cell RNA-seq (scRNA-seq) and single-nucleus RNA-seq (snRNA-seq) techniques have allowed us to explore the sparsely activated engram ensembles, enabling access to the molecular mechanisms that underlie experience-dependent memory formation and consolidation. However, the absence of specific and powerful computational methods to detect memory-related genes (modules) and their regulatory relationships in the sc/snRNA-seq datasets has strictly limited the analysis of underlying mechanisms and memory coding principles in mammalian brains. Here, we present a deep-learning method named SCENTBOX, to detect memory-related gene modules and causal regulatory relationships among themfromsc/snRNA-seq datasets. SCENTBOX first constructs codifferential expression gene network (CEGN) from case versus control sc/snRNA-seq datasets. It then detects the highly correlated modules of differential expression genes (DEGs) in CEGN. The deep network embedding and attention-based convolutional neural network strategies are employed to precisely detect regulatory relationships among DEG genes in a module. We applied them on scRNA-seq datasets of TRAP; Ai14 mouse neurons with fear memory and detected not only known memory-related genes, but also the modules and potential causal regulations. Our results provided novel regulations within an interesting module, including Arc, Bdnf, Creb, Dusp1, Rgs4, and Btg2. Overall, our methods provide a general computational tool for processing sc/snRNA-seq data from case versus control studie and a systematic investigation of fear-memory-related gene modules.Keywords: sc/snRNA-seq, memory formation, deep learning, gene module, causal inference
Procedia PDF Downloads 1202903 Unfolding Architectural Assemblages: Mapping Contemporary Spatial Objects' Affective Capacity
Authors: Panagiotis Roupas, Yota Passia
Abstract:
This paper aims at establishing an index of design mechanisms - immanent in spatial objects - based on the affective capacity of their material formations. While spatial objects (design objects, buildings, urban configurations, etc.) are regarded as systems composed of interacting parts, within the premises of assemblage theory, their ability to affect and to be affected has not yet been mapped or sufficiently explored. This ability lies in excess, a latent potentiality they contain, not transcendental but immanent in their pre-subjective aesthetic power. As spatial structures are theorized as assemblages - composed of heterogeneous elements that enter into relations with one another - and since all assemblages are parts of larger assemblages, their components' ability to engage is contingent. We thus seek to unfold the mechanisms inherent in spatial objects that allow to the constituent parts of design assemblages to perpetually enter into new assemblages. To map architectural assemblage's affective ability, spatial objects are analyzed in two axes. The first axis focuses on the relations that the assemblage's material and expressive components develop in order to enter the assemblages. Material components refer to those material elements that an assemblage requires in order to exist, while expressive components includes non-linguistic (sense impressions) as well as linguistic (beliefs). The second axis records the processes known as a-signifying signs or a-signs, which are the triggering mechanisms able to territorialize or deterritorialize, stabilize or destabilize the assemblage and thus allow it to assemble anew. As a-signs cannot be isolated from matter, we point to their resulting effects, which without entering the linguistic level they are expressed in terms of intensity fields: modulations, movements, speeds, rhythms, spasms, etc. They belong to a molecular level where they operate in the pre-subjective world of perceptions, effects, drives, and emotions. A-signs have been introduced as intensities that transform the object beyond meaning, beyond fixed or known cognitive procedures. To that end, from an archive of more than 100 spatial objects by contemporary architects and designers, we have created an effective mechanisms index is created, where each a-sign is now connected with the list of effects it triggers and which thoroughly defines it. And vice versa, the same effect can be triggered by different a-signs, allowing the design object to lie in a perpetual state of becoming. To define spatial objects, A-signs are categorized in terms of their aesthetic power to affect and to be affected on the basis of the general categories of form, structure and surface. Thus, different part's degree of contingency are evaluated and measured and finally, we introduce as material information that is immanent in the spatial object while at the same time they confer no meaning; they only convey some information without semantic content. Through this index, we are able to analyze and direct the final form of the spatial object while at the same time establishing the mechanism to measure its continuous transformation.Keywords: affective mechanisms index, architectural assemblages, a-signifying signs, cartography, virtual
Procedia PDF Downloads 1272902 Towards a Rigorous Analysis for a Supercritical Particulate Process
Authors: Yousef Bakhbakhi
Abstract:
Crystallization with supercritical fluids (SCFs), as a developed technology to produce particles of micron and sub-micron size with narrow size distribution, has found appreciable importance as an environmentally friendly technology. Particle synthesis using SCFs can be achieved employing a number of special processes involving solvent and antisolvent mechanisms. In this study, the compressed antisolvent (PCA) process is utilized as a model to analyze the theoretical complexity of crystallization with supercritical fluids. The population balance approach has proven to be an effectual technique to simulate and predict the particle size and size distribution. The nucleation and growth mechanisms of the particles formation in the PCA process is investigated using the population balance equation, which describes the evolution of the particle through coalescence and breakup levels with time. The employed mathematical population balance model contains a set of the partial differential equation with algebraic constraints, which demands a rigorous numerical approach. The combined Collocation and Galerkin finite element method are proposed as a high-resolution technique to solve the dynamics of the PCA process.Keywords: particle formation, particle size and size distribution, PCA, supercritical carbon dioxide
Procedia PDF Downloads 1972901 Locket Application
Authors: Farah Al-Fityani, Aljohara Alsowail, Shatha Bindawood, Heba Balrbeah
Abstract:
Locket is a popular app that lets users share spontaneous photos with a close circle of friends. The app offers a unique way to stay connected with loved ones by allowing users to see glimpses of their day through photos displayed on a widget on their home screen. This summary outlines the process of developing an app like Locket, highlighting the importance of user privacy and security. It also details the findings of a study on user engagement with the Locket app, revealing positive sentiment towards its features and concept but also identifying areas for improvement. Overall, the summary portrays Locket as a successful app that is changing the way people connect on social media.Keywords: locket, app, machine learning, connect
Procedia PDF Downloads 462900 Biomimetic Luminescent Textile Using Biobased Products
Authors: Sweta Iyer, Nemeshwaree Behary, Vincent Nierstrasz
Abstract:
Various organisms involve bioluminescence for their particular biological function. The bio-based molecules responsible for bioluminescence vary from one species to another, research has been done to identify the chemistry and different mechanisms involved in light production in living organisms. The light emitting chemical systems such as firefly and bacterial luminous mostly involves enzyme-catalyzed reactions and is widely used for ATP measurement, bioluminescence imaging, environmental biosensors etc. Our strategy is to design bioluminescent textiles using such bioluminescent systems. Hence, a detailed literature work was carried out to study on how to mimic bioluminescence effect seen in nature. Reaction mechanisms in various bioluminescent living organisms were studied and the components or molecules responsible for luminescence were identified. However, the challenge is to obtain the same effect on textiles by immobilizing enzymes responsible for light creation. Another challenge is also to regenerate substrates involved in the reaction system to create a longer lasting illumination in bioluminescent textiles. Natural film-forming polymers were used to immobilize the reactive components including enzymes on textile materials to design a biomimetic luminescent textile.Keywords: bioluminescence, biomimetic, immobilize, luminescent textile
Procedia PDF Downloads 2632899 Young’s Modulus Variability: Influence on Masonry Vault Behavior
Authors: Abdelmounaim Zanaz, Sylvie Yotte, Fazia Fouchal, Alaa Chateauneuf
Abstract:
This paper presents a methodology for probabilistic assessment of bearing capacity and prediction of failure mechanism of masonry vaults at the ultimate state with consideration of the natural variability of Young’s modulus of stones. First, the computation model is explained. The failure mode is the most reported mode, i.e. the four-hinge mechanism. Based on this assumption, the study of a vault composed of 16 segments is presented. The Young’s modulus of the segments is considered as random variable defined by a mean value and a coefficient of variation CV. A relationship linking the vault bearing capacity to the modulus variation of voussoirs is proposed. The failure mechanisms, in addition to that observed in the deterministic case, are identified for each CV value as well as their probability of occurrence. The results show that the mechanism observed in the deterministic case has decreasing probability of occurrence in terms of CV, while the number of other mechanisms and their probability of occurrence increase with the coefficient of variation of Young’s modulus. This means that if a significant change in the Young modulus of the segments is proven, taken it into account in computations becomes mandatory, both for determining the vault bearing capacity and for predicting its failure mechanism.Keywords: masonry, mechanism, probability, variability, vault
Procedia PDF Downloads 4412898 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption
Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem
Abstract:
In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.Keywords: chaos, encryption, security, image
Procedia PDF Downloads 4752897 Efficient Energy Management: A Novel Technique for Prolonged and Persistent Automotive Engine
Authors: Chakshu Baweja, Ishaan Prakash, Deepak Giri, Prithwish Mukherjee, Herambraj Ashok Nalawade
Abstract:
The need to prevent and control rampant and indiscriminate usage of energy in present-day realm on earth has motivated active research efforts aimed at understanding of controlling mechanisms leading to sustained energy. Although much has been done but complexity of the problem has prevented a complete understanding due to nonlinear interaction between flow, heat and mass transfer in terrestrial environment. Therefore, there is need for a systematic study to clearly understand mechanisms controlling energy-spreading phenomena to increase a system’s efficiency. The present work addresses the issue of sustaining energy and proposes a devoted technique of optimizing energy in the automotive domain. The proposed method focus on utilization of the mechanical and thermal energy of an automobile IC engine by converting and storing energy due to motion of a piston in form of electrical energy. The suggested technique utilizes piston motion of the engine to generate high potential difference capable of working as a secondary power source. This is achieved by the use of a gear mechanism and a flywheel.Keywords: internal combustion engine, energy, electromagnetic induction, efficiency, gear ratio, hybrid vehicle, engine shaft
Procedia PDF Downloads 4742896 Effects of Carbon Dioxide on the Sensory of Pumpkin seed and Its Toxicity Against Oryzaephilus mercator
Authors: Reza Sadeghi
Abstract:
Carbon dioxide treatment is one of the new methods for storage pest control. It can be used to replace chemical approaches. In the present study, the mortalities of Oryzaephilus mercator as the key pest of stored products, especially nuts, were studied after being exposed to different CO2 pressures (0.1, 0.2, 0.3, 0.4 and 0.5 bar) within 24 hours. The mortality percentages of O. mercator increased with an increase in CO2 pressure. The results obtained from experiments on the qualitative characteristics of the studied dates through the sensory test revealed that CO2 pressures did not affect their aroma, color, crispness, firmness, and overall acceptance. Therefore, it could be concluded that the atmospheric CO2 gas provided a cost-effective and environmentally friendly method for controlling the insect pests of pumpkin seed, besides preserving their sensory and quality properties.Keywords: carbon dioxide, control, seed, qualitative characteristics
Procedia PDF Downloads 1132895 Structural Analysis of an Active Morphing Wing for Enhancing UAV Performance
Abstract:
A numerical study of a design concept for actively controlling wing twist is described in this paper. The concept consists of morphing elements which were designed to provide a rigid and seamless skin while maintaining structural rigidity. The wing structure is first modeled in CATIA V5 then imported into ANSYS for structural analysis. Athena Vortex Lattice method (AVL) is used to estimate aerodynamic response as well as aerodynamic loads of morphing wings, afterwards a structural optimization performed via ANSYS Static. Overall, the results presented in this paper show that the concept provides efficient wing twist while preserving an aerodynamically smooth and compliant surface. Sufficient structural rigidity in bending is also obtained. This concept is suggested as a possible alternative for morphing skin applications.Keywords: aircraft, morphing, skin, twist
Procedia PDF Downloads 3962894 Coping for Academic Women Departmental Heads during COVID-19: A Capabilities Approach Perspective
Authors: Juliet Ramohai
Abstract:
This paper explores how women departmental heads in higher education experience leadership in a time of the COVID-19 crises. The focus is mostly on their care and coping as they work in virtual spaces. Most scholars have looked at the effects and challenges that different employees face while working from home during a lockdown. However, very few take a dedicated focus on women in leadership and the coping mechanisms and resources that they use for effective leadership during this difficult time. The paper draws on two aspects of Sen’s Capabilities approach, functionings, and agency, to cast a closer understanding of the institutional and individual coping mechanisms that might be at these women's disposal. The qualitative approach used for this paper and a feminist lens provides a critical and in-depth understanding of the real-life stories of the women and how they make sense of their virtual leadership. Data for this paper was collected through semi-structured interviews with 10 women in the positions of head of departments and analysed thematically using capabilities approach concepts as an analytical tool. The findings in this paper indicate that functionings and freedoms are tightly linked to institutional ethnographies. These ethnographies might support or hamper coping for women leaders, especially during times of crisis.Keywords: capability approach, women leaders, higher education, COVID-19
Procedia PDF Downloads 1852893 An Empirical Investigation of the Challenges of Secure Edge Computing Adoption in Organizations
Authors: Hailye Tekleselassie
Abstract:
Edge computing is a spread computing outline that transports initiative applications closer to data sources such as IoT devices or local edge servers, and possible happenstances would skull the action of new technologies. However, this investigation was attained to investigation the consciousness of technology and communications organization workers and computer users who support the service cloud. Surveys were used to achieve these objectives. Surveys were intended to attain these aims, and it is the functional using survey. Enquiries about confidence are also a key question. Problems like data privacy, integrity, and availability are the factors affecting the company’s acceptance of the service cloud.Keywords: IoT, data, security, edge computing
Procedia PDF Downloads 832892 Analysis of Mechanisms for Design of Add-On Device to Assist in Stair Climbing of Wheelchairs
Authors: Manish Kumar Prajapat, Vishwajeet Sikchi
Abstract:
In the present scenario, many motorized stair climbing wheelchairs are available in the western countries which are significantly expensive and hence are not popular in developing countries. Also, such wheelchairs tend to be bulkier and heavy which makes their use for normal conditions difficult. Manually operated solutions are rarely explored in this space. Therefore, this project aims at developing a manually operated cost effective solution for the same. Differently abled people are not required to climb stairs frequently in their daily use. Because of this, carrying a stair climbing mechanism attached to the wheelchair permanently adds redundant weight to the wheelchair which reduces ease of use of the wheelchair. Hence, the idea of add-on device for stair climbing was envisaged wherein the wheelchair is mounted onto add-on only at the time when climbing the stairs is required. This work analyses in detail the mechanism for stair climbing of conventional wheelchair followed by analysis and iterations on multiple mechanisms to identify the most suitable mechanism for application in the add-on device. Further, this work imparts specific attention to optimize the force and time required for stair climbing of wheelchairs. The most suitable mechanism identified was validated by building and testing a prototype.Keywords: add-on device, Rocker-Bogie, stair climbing, star wheel, y wheel
Procedia PDF Downloads 2122891 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: access controls, cloud computing, confidentiality, identity and access management
Procedia PDF Downloads 1312890 Evaluation and Preservation of Post-War Concrete Architecture: The Case of Lithuania
Authors: Aušra Černauskienė
Abstract:
The heritage of modern architecture is closely related to the materiality and technology used to implement the buildings. Concrete is one of the most ubiquitous post-war building materials with enormous aesthetic and structural potential that architects have creatively used for everyday buildings and exceptional architectural objects that have survived. Concrete's material, structural, and architectural development over the post-war years has produced a remarkably rich and diverse typology of buildings, for implementation of which unique handicraft skills and industrialized novelties were used. Nonetheless, in the opinion of the public, concrete architecture is often treated as ugly and obsolete, and in Lithuania, it also has negative associations with the scarcity of the Soviet era. Moreover, aesthetic non-appreciation is not the only challenge that concrete architecture meets. It also no longer meets the needs of contemporary requirements: buildings are of poor energy class, have little potential for transformation, and have an obsolete surrounding environment. Thus, as a young heritage, concrete architecture is not yet sufficiently appreciated by society and heritage specialists, as it takes a short time to rethink what they mean from a historical perspective. However, concrete architecture is considered ambiguous but has its character and specificity that needs to be carefully studied in terms of cultural heritage to avoid the risk of poor renovation or even demolition, which has increasingly risen in recent decades in Lithuania. For example, several valuable pieces of post-war concrete architecture, such as the Banga restaurant and the Summer Stage in Palanga, were demolished without understanding their cultural value. Many unique concrete structures and raw concrete surfaces were painted or plastered, paying little attention to the appearance of authentic material. Furthermore, it raises a discussion on how to preserve buildings of different typologies: for example, innovative public buildings in their aesthetic, spatial solutions, and mass housing areas built using precast concrete panels. It is evident that the most traditional preservation strategy, conservation, is not the only option for preserving post-war concrete architecture, and more options should be considered. The first step in choosing the right strategy in each case is an appropriate assessment of the cultural significance. For this reason, an evaluation matrix for post-war concrete architecture is proposed. In one direction, an analysis of different typological groups of buildings is suggested, with the designation of ownership rights; in the other direction – the analysis of traditional value aspects such as aesthetic, technological, and relevant for modern architecture such as social, economic, and sustainability factors. By examining these parameters together, three relevant scenarios for preserving post-war concrete architecture were distinguished: conservation, renovation, and reuse, and they are revealed using examples of concrete architecture in Lithuania.Keywords: modern heritage, value aspects, typology, conservation, upgrade, reuse
Procedia PDF Downloads 1432889 An Analysis of Brand-Building Characteristics in the Iran Airline Websites
Authors: Pedram Behyar, Zahra Bayat
Abstract:
The internet and web are changing ways of “far reaching scope and potential for transformation of the marketing functions”. The web is developing in a faster rate than any previous new communication medium. The website of destination has become a crucial branding channel, that is why all businesses are changing their way to communicate with their customers to encounter their needs and wants in better ways. Website provides numerous opportunities for businesses to strengthen their relationship with their customers. One of these opportunities is website component that enables internet users to make two-way communication with the businesses.Keywords: marketing communication, brand image, usability, privacy and security, personalization and customization, responsiveness, customer online web experience
Procedia PDF Downloads 5032888 Managing IT Departments in Higher Education Institutes: Coping with the Exponentially Growing Needs and Expectations
Authors: Balqees A. Al-Thuhli, Ali H. Al-Badi, Khamis Al-Gharbi
Abstract:
Information technology is changing rapidly and the users’ expectations are also growing. Dealing with these changes in information technology, while satisfying the users’ needs and expectations is a big challenge. IT managers need to explore new mechanisms/strategies to enable them to cope with such challenges. The objectives of this research are to identify the significant challenges that might face IT managers in higher education institutes in the face of the high and ever growing customer expectations and to propose possible solutions to cope with such high-speed changes in information technology. To achieve these objectives, interviews with the IT professionals from different higher education institutes in Oman were conducted. In addition, documentation (printed and online) related to these institutions were studied and an intensive literature review of published work was examined. The findings of this research are expected to give a better understanding of the challenges that might face the IT managers at higher education institutes. This acquired understanding is expected to highlight the importance of being adaptable and fast in keeping up with the ever-growing technological changes. Moreover, adopting different tools and technologies could assist IT managers in developing their organisations’ IT policies and strategies.Keywords: information technology, rapid change, CIO roles, challenges, IT managers, coping mechanisms, users' expectations
Procedia PDF Downloads 2612887 A Longitudinal Case Study of Greek as a Second Language
Authors: M. Vassou, A. Karasimos
Abstract:
A primary concern in the field of Second Language Acquisition (SLA) research is to determine the innate mechanisms of second language learning and acquisition through the systematic study of a learner's interlanguage. Errors emerge while a learner attempts to communicate using the target-language and can be seen either as the observable linguistic product of the latent cognitive and language process of mental representations or as an indispensable learning mechanism. Therefore, the study of the learner’s erroneous forms may depict the various strategies and mechanisms that take place during the language acquisition process resulting in deviations from the target-language norms and difficulties in communication. Mapping the erroneous utterances of a late adult learner in the process of acquiring Greek as a second language constitutes one of the main aims of this study. For our research purposes, we created an error-tagged learner corpus composed of the participant’s written texts produced throughout a period of a 4- year instructed language acquisition. Error analysis and interlanguage theory constitute the methodological and theoretical framework, respectively. The research questions pertain to the learner's most frequent errors per linguistic category and per year as well as his choices concerning the Greek Article System. According to the quantitative analysis of the data, the most frequent errors are observed in the categories of the stress system and syntax, whereas a significant fluctuation and/or gradual reduction throughout the 4 years of instructed acquisition indicate the emergence of developmental stages. The findings with regard to the article usage bespeak fossilization of erroneous structures in certain contexts. In general, our results point towards the existence and further development of an established learner’s (inter-) language system governed not only by mother- tongue and target-language influences but also by the learner’s assumptions and set of rules as the result of a complex cognitive process. It is expected that this study will contribute not only to the knowledge in the field of Greek as a second language and SLA generally, but it will also provide an insight into the cognitive mechanisms and strategies developed by multilingual learners of late adulthood.Keywords: Greek as a second language, error analysis, interlanguage, late adult learner
Procedia PDF Downloads 1272886 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques
Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar
Abstract:
This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI
Procedia PDF Downloads 952885 Islam’s Expediency; The Poison and the Antidote of Islamic Government
Authors: Mahdi Ebrahimi
Abstract:
One of the most effective factors that can empower and modernize the Islamic government according to the needs of society is the institution of expediency in Islamic governance. At the same time, not paying attention to the foundations and principles of Islamic governance may cause this factor to create the basis for corruption and totalitarianism of the rulers, which ultimately causes a gap between the people and the rulers and the emergence of whole government corruption and dictatorship. Meanwhile, there are specific principles in the doctrine of Islamic Governance that can prevent such an event from happening. Principles such as: remaining popular and pious by the Ulama, Amr Bil-Maroof Va Nahy An Al-Munkar (commanding the good and preventing the bad) by the individuals, the rule of frank criticism with loud voices and clarification and accountability in the fields that cause the corruption of those in charge. In this research, these principles are presented along with their Islamic basis. It is also stated what effect each of these cases will have on preserving Islam in the ruling system.Keywords: expediency, Islamic ruling, Islamic principles, Islam
Procedia PDF Downloads 76