Search results for: compatibility requirement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1355

Search results for: compatibility requirement

875 Factor to Elicit Spatial Presence: Calmness

Authors: Nadia Diyana Mohd Muhaiyuddin, Dayang Rohaya Awang Rambli

Abstract:

The aim of our work is to identify whether user’s calmness can be a factor to elicit user’s spatial presence experience. Hence, a systematic mental model technique called repertory grid was selected to collect data because users can freely give their opinions in this approach. Three image-based virtual reality (IBVR) environments were created to satisfy the requirement of the repertory grid. Different virtual environments were necessary to allow users to compare and give feedback. Result was analyzed by using descriptive analysis through the SPSS software. The result revealed that ‘users feel calm’ is accepted as one of the factors that can elicit spatial presence. Users also highlighted five IBVR characteristics that could elicit spatial presence, namely, calm sound, calm content, calm color, calm story line, and the calm feeling of the user.

Keywords: spatial presence, presence, virtual reality, image-based virtual reality, human-computer interaction

Procedia PDF Downloads 270
874 Measuring Hazard Analysis and Critical Control Points Implementation in Riyadh Hospitals

Authors: A. Alrasheed, I. Connerton

Abstract:

Daily provision of high quality food and hygiene to patients is a challenging goal of the healthcare. In Saudi Arabia, matters related to food safety and hygiene are regulated by the Ministry of Health (MOH) and the Saudi Food and Drugs Authority (SFDA). The purpose of this research is to discuss the food safety management inconsistencies and flaws, in particular the ones related to Hazard Analysis and Critical Control Points (HACCP) in Riyadh’s MOH hospitals. As required by law, written HACCP regulations must be implemented, and food handlers need to receive the training accordingly. However, in Saudi hospitals, this is not a requirement, and the food handlers do not need to hold training certificates in food safety or HACCP. Nowadays, the matter of food safety and hygiene have become increasingly important since the decision makers want to align these regulations with the majority of the world and to implement HACCP fully and for this purpose, the SFDA was established. 

Keywords: food safety, patients, hospitals, HACCP, Saudi Arabia

Procedia PDF Downloads 249
873 Colorimetric Detection of Melamine in Milk Sample by Using In-Situ Formed Silver Nanoparticles by Tannic Acid

Authors: Md Fazle Alam, Amaj Ahmed Laskar, Hina Younus

Abstract:

Melamine toxicity which causes renal failure and death of humans and animals have recently attracted worldwide attention. Developing an easy, fast and sensitive method for the routine melamine detection is the need of the hour. Herein, we have developed a rapid, sensitive, one step and selective colorimetric method for the detection of melamine in milk samples based upon in-situ formation of silver nanoparticles (AgNPs) via tannic acid at room temperature. These AgNPs thus formed were characterized by UV-VIS spectrophotometer, transmission electron microscope (TEM), zetasizer and dynamic light scattering (DLS). Under optimal conditions, melamine could be selectively detected within the concentration range of 0.05-1.4 µM with a limit of detection (LOD) of 10.1 nM, which is lower than the strictest melamine safety requirement of 1 ppm. This assay does not utilize organic cosolvents, enzymatic reactions, light sensitive dye molecules and sophisticated instrumentation, thereby overcoming some of the limitations of conventional methods.

Keywords: milk adulteration, melamine, silver nanoparticles, tannic acid

Procedia PDF Downloads 234
872 Methods for Distinction of Cattle Using Supervised Learning

Authors: Radoslav Židek, Veronika Šidlová, Radovan Kasarda, Birgit Fuerst-Waltl

Abstract:

Machine learning represents a set of topics dealing with the creation and evaluation of algorithms that facilitate pattern recognition, classification, and prediction, based on models derived from existing data. The data can present identification patterns which are used to classify into groups. The result of the analysis is the pattern which can be used for identification of data set without the need to obtain input data used for creation of this pattern. An important requirement in this process is careful data preparation validation of model used and its suitable interpretation. For breeders, it is important to know the origin of animals from the point of the genetic diversity. In case of missing pedigree information, other methods can be used for traceability of animal´s origin. Genetic diversity written in genetic data is holding relatively useful information to identify animals originated from individual countries. We can conclude that the application of data mining for molecular genetic data using supervised learning is an appropriate tool for hypothesis testing and identifying an individual.

Keywords: genetic data, Pinzgau cattle, supervised learning, machine learning

Procedia PDF Downloads 530
871 Development of a Bacterial Resistant Concrete for Use in Low Cost Kitchen Floors

Authors: S. S. Mahlangu, R. K. K. Mbaya, D. D. Delport, H. Van. Zyl

Abstract:

The degrading effect due to bacterial growth on the structural integrity of concrete floor surfaces is predictable; this consequently cause development of surface micro cracks in which organisms penetrate through resulting in surface spalling. Hence, the need to develop mix design meeting the requirement of floor surfaces exposed to aggressive agent to improve certain material properties with good workability, extended lifespan and low cost is essential. In this work, tests were performed to examine the microbial activity on kitchen floor surfaces and the effect of adding admixtures. The biochemical test shows the existence of microorganisms (E.coli, Streptococcus) on newly casted structure. Of up to 6% porosity was reduced and improvement on structural integrity was observed upon adding mineral admixtures from the concrete mortar. The SEM result after 84 days of curing specimens, shows that chemical admixtures have significant role to enable retard bacterial penetration and good quality structure is achieved.

Keywords: admixture, organisms, porosity, strength

Procedia PDF Downloads 222
870 Analysis of the Acoustic Performance of Vertical Internal Seals with Pet Wool as NBR 15.575-4NO Green Towers Building-DF

Authors: Lucas Aerre, Wallesson Faria, Roberto Pimentel, Juliana Santos

Abstract:

An extremely disturbing and irritating element in the lives of people and organizations is the noise, the consequences that can bring us has a lot of connection with human health as well as financial and economic aspects. In order to improve the efficiency of buildings in Brazil in general, a performance standard was created, NBR 15.575 in which all buildings are seen in a more systemic and peculiar way, while following the requirements of the standard. The acoustic performance present in these buildings is one such requirement. Based on this, the present work was elaborated with the objective of evaluating through acoustic measurements the acoustic performance of vertical internal fences that are under the incidence of aerial noise of a building in the city of Brasilia-DF. A short theoretical basis is made and soon after the procedures of measurement are described through the control method established by the standard, and its results are evaluated according to the parameters of the same. The measurement performed between rooms of the same unit, presented a standardized sound pressure level difference (D nT, w) equal to 40 dB, thus being classified within the minimum performance required by the standard in question.

Keywords: airborne noise, performance standard, soundproofing, vertical seal

Procedia PDF Downloads 280
869 Suitable Die Shaping for a Rectangular Shape Bottle by Application of FEM and AI Technique

Authors: N. Ploysook, R. Rugsaj, C. Suvanjumrat

Abstract:

The characteristic requirement for producing rectangular shape bottles was a uniform thickness of the plastic bottle wall. Die shaping was a good technique which controlled the wall thickness of bottles. An advance technology which was the finite element method (FEM) for blowing parison to be a rectangular shape bottle was conducted to reduce waste plastic from a trial and error method of a die shaping and parison control method. The artificial intelligent (AI) comprised of artificial neural network and genetic algorithm was selected to optimize the die gap shape from the FEM results. The application of AI technique could optimize the suitable die gap shape for the parison blow molding which did not depend on the parison control method to produce rectangular bottles with the uniform wall. Particularly, this application can be used with cheap blow molding machines without a parison controller therefore it will reduce cost of production in the bottle blow molding process.

Keywords: AI, bottle, die shaping, FEM

Procedia PDF Downloads 227
868 Finite Element and Split Bregman Methods for Solving a Family of Optimal Control Problem with Partial Differential Equation Constraint

Authors: Mahmoud Lot

Abstract:

In this article, we will discuss the solution of elliptic optimal control problem. First, by using the nite element method, we obtain the discrete form of the problem. The obtained discrete problem is actually a large scale constrained optimization problem. Solving this optimization problem with traditional methods is difficult and requires a lot of CPU time and memory. But split Bergman method converts the constrained problem to an unconstrained, and hence it saves time and memory requirement. Then we use the split Bregman method for solving this problem, and examples show the speed and accuracy of split Bregman methods for solving these types of problems. We also use the SQP method for solving the examples and compare with the split Bregman method.

Keywords: Split Bregman Method, optimal control with elliptic partial differential equation constraint, finite element method

Procedia PDF Downloads 134
867 The Key Factors in Shipping Company's Port Selection for Providing Their Supplies

Authors: Sedigheh Zarei

Abstract:

The aim of this research is to identify the key factors in shipping company’s port selection in order to providing their requirement. To identify and rank factors that are play the main role in selecting port for providing the ship supplies. At the first step, Data were collected via Semi-structured interviews, The aim was to generate knowledge on how shipping company select the port and suppliers for providing their needs. 37 port selection factors were chosen from the previous researches and field interviews and have been categorized into two groups of port's factor and the factors of services of suppliers companies. The current study adopts a questionnaire survey to the main shipping companies' operators in Iran. Their responses reveal that level of services of supplying companies and customs rules play the important role in selecting the ports. Our findings could affect decisions made by port authorities to consider that supporting the privet sections for ship chandelling business could have the best result in attracting ships.

Keywords: ship supplier, port selection, ship chandler, provision

Procedia PDF Downloads 437
866 Analysis of Lightweight Register Hardware Threat

Authors: Yang Luo, Beibei Wang

Abstract:

In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.

Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power

Procedia PDF Downloads 261
865 The Rehabilitation Solutions for the Hydraulic Jump Sweepout: A Case Study from India

Authors: Ali Heidari, Hany Saleem

Abstract:

The tailwater requirements are important criteria in the design of the stilling basins as energy dissipation of the spillways. The adequate tailwater level that ensures the hydraulic jump inside the basin should be fulfilled by the river's natural water level and the apron depth downstream of the chute. The requirements of the hydraulic jump should mainly be checked for the design flood, however, the drawn jump condition should not be critical in the discharges lesser than the design flood. The tailwater requirement is not met in Almatti dam, built in 2005 in India, and the jump sweep out from the basin, resulting in significant scour in the apron and end sill of the basin. This paper discusses different hydraulic solutions as sustainable solutions for the rehabilitation program. The deep apron alternative is proposed for the fewer bays of the spillway as the most cost-effective, sustainable solution. The apron level of 15 gates out of 26 gates should decrease by 5.4 m compared to the existing design to ensure a safe hydraulic jump up to the discharge of 10,000 m3/s i.e. 30% of the updated PMF.

Keywords: dam, spillway, stilling basin, Almatti

Procedia PDF Downloads 31
864 Preparation and In vitro Characterization of Nanoparticle Hydrogel for Wound Healing

Authors: Rajni Kant Panik

Abstract:

The aim of the present study was to develop and evaluate mupirocin loaded nanoparticle incorporated into hydrogel as an infected wound healer. Incorporated Nanoparticle in hydrogel provides a barrier that effectively prevents the contamination of the wound and further progression of infection to deeper tissues. Hydrogel creates moist healing environment on wound space with good fluid absorbance. Nanoparticles were prepared by double emulsion solvent evaporation method using different ratios of PLGA polymer and the hydrogels was developed using sodium alginate and gelatin. Further prepared nanoparticles were then incorporated into the hydrogels. The formulations were characterized by FT-IR and DSC for drug and polymer compatibility and surface morphology was studied by TEM. Nanoparticle hydrogel were evaluated for their size, shape, encapsulation efficiency and for in vitro studies. The FT-IR and DSC confirmed the absence of any drug polymer interaction. The average size of Nanoparticle was found to be in range of 208.21-412.33 nm and shape was found to be spherical. The maximum encapsulation efficiency was found to be 69.03%. The in vitro release profile of Nanoparticle incorporated hydrogel formulation was found to give sustained release of drug. Antimicrobial activity testing confirmed that encapsulated drug preserve its effectiveness. The stability study confirmed that the formulation prepared were stable. Present study complements our finding that mupirocin loaded Nanoparticle incorporated into hydrogel has the potential to be an effective and safe novel addition for the release of mupirocin in sustained manner, which may be a better option for the management of wound. These finding also supports the progression of antibiotic via hydrogel delivery system is a novel topical dosage form for the management of wound.

Keywords: hydrogel, nanoparticle, PLGA, wound healing

Procedia PDF Downloads 294
863 Fuzzy Logic Based Fault Tolerant Model Predictive MLI Topology

Authors: Abhimanyu Kumar, Chirag Gupta

Abstract:

This work presents a comprehensive study on the employment of Model Predictive Control (MPC) for a three-phase voltage-source inverter to regulate the output voltage efficiently. The inverter is modeled via the Clarke Transformation, considering a scenario where the load is unknown. An LC filter model is developed, demonstrating its efficacy in Total Harmonic Distortion (THD) reduction. The system, when implemented with fault-tolerant multilevel inverter topologies, ensures reliable operation even under fault conditions, a requirement that is paramount with the increasing dependence on renewable energy sources. The research also integrates a Fuzzy Logic based fault tolerance system which identifies and manages faults, ensuring consistent inverter performance. The efficacy of the proposed methodology is substantiated through rigorous simulations and comparative results, shedding light on the voltage prediction efficiency and the robustness of the model even under fault conditions.

Keywords: total harmonic distortion, fuzzy logic, renewable energy sources, MLI

Procedia PDF Downloads 90
862 Experimental Studies on Prestressed Precast Concrete Bridge Piers

Authors: C. Shim, C. Koem, S. Park, S. Lee

Abstract:

This paper deals with experimental studies on pre stressed precast concrete columns with continuous reinforcing bars and pre stressing tendons. Design requirements on minimum transverse reinforcement ratio are not included in current design codes. Pre stressing introduces additional compression to the column. Precast columns with different transverse reinforcement ratios were tested to derive adequate design requirement. Displacement ductility of the pre stressed precast columns was evaluated and compared with previous studies. Design of axial steels including reinforcing bars and pre stressing tendons influenced on the seismic performance. Without significant increase of transverse reinforcement ratio, the specimens showed required displacement ductility without reduction of their flexural strength. Design recommendations for precast bridge piers were derived.

Keywords: displacement ductility, flexural strength, prestressed precast column, transverse reinforcement

Procedia PDF Downloads 262
861 An Indoor Guidance System Combining Near Field Communication and Bluetooth Low Energy Beacon Technologies

Authors: Rung-Shiang Cheng, Wei-Jun Hong, Jheng-Syun Wang, Kawuu W. Lin

Abstract:

Users rely increasingly on Location-Based Services (LBS) and automated navigation/guidance systems nowadays. However, while such services are easily implemented in outdoor environments using Global Positioning System (GPS) technology, a requirement still exists for accurate localization and guidance schemes in indoor settings. Accordingly, the present study presents a methodology based on GPS, Bluetooth Low Energy (BLE) beacons, and Near Field Communication (NFC) technology. Through establishing graphic information and the design of algorithm, this study develops a guidance system for indoor and outdoor on smartphones, with aim to provide users a smart life through this system. The presented system is implemented on a smartphone and evaluated on a student campus environment. The experimental results confirm the ability of the presented app to switch automatically from an outdoor mode to an indoor mode and to guide the user to the requested target destination via the shortest possible route.

Keywords: beacon, indoor, BLE, Dijkstra algorithm

Procedia PDF Downloads 283
860 Spherical Harmonic Based Monostatic Anisotropic Point Scatterer Model for RADAR Applications

Authors: Eric Huang, Coleman DeLude, Justin Romberg, Saibal Mukhopadhyay, Madhavan Swaminathan

Abstract:

High performance computing (HPC) based emulators can be used to model the scattering from multiple stationary and moving targets for RADAR applications. These emulators rely on the RADAR Cross Section (RCS) of the targets being available in complex scenarios. Representing the RCS using tables generated from electromagnetic (EM) simulations is often times cumbersome leading to large storage requirement. This paper proposed a spherical harmonic based anisotropic scatterer model to represent the RCS of complex targets. The problem of finding the locations and reflection profiles of all scatterers can be formulated as a linear least square problem with a special sparsity constraint. This paper solves this problem using a modified Orthogonal Matching Pursuit algorithm. The results show that the spherical harmonic based scatterer model can effectively represent the RCS data of complex targets.

Keywords: RADAR, RCS, high performance computing, point scatterer model

Procedia PDF Downloads 174
859 Lipid-Chitosan Hybrid Nanoparticles for Controlled Delivery of Cisplatin

Authors: Muhammad Muzamil Khan, Asadullah Madni, Nina Filipczek, Jiayi Pan, Nayab Tahir, Hassan Shah, Vladimir Torchilin

Abstract:

Lipid-polymer hybrid nanoparticles (LPHNP) are delivery systems for controlled drug delivery at tumor sites. The superior biocompatible properties of lipid and structural advantages of polymer can be obtained via this system for controlled drug delivery. In the present study, cisplatin-loaded lipid-chitosan hybrid nanoparticles were formulated by the single step ionic gelation method based on ionic interaction of positively charged chitosan and negatively charged lipid. Formulations with various chitosan to lipid ratio were investigated to obtain the optimal particle size, encapsulation efficiency, and controlled release pattern. Transmission electron microscope and dynamic light scattering analysis demonstrated a size range of 181-245 nm and a zeta potential range of 20-30 mV. Compatibility among the components and the stability of formulation were demonstrated with FTIR analysis and thermal studies, respectively. The therapeutic efficacy and cellular interaction of cisplatin-loaded LPHNP were investigated using in vitro cell-based assays in A2780/ADR ovarian carcinoma cell line. Additionally, the cisplatin loaded LPHNP exhibited a low toxicity profile in rats. The in-vivo pharmacokinetics study also proved a controlled delivery of cisplatin with enhanced mean residual time and half-life. Our studies suggested that the cisplatin-loaded LPHNP being a promising platform for controlled delivery of cisplatin in cancer therapy.

Keywords: cisplatin, lipid-polymer hybrid nanoparticle, chitosan, in vitro cell line study

Procedia PDF Downloads 115
858 Powerful Media: Reflection of Professional Audience

Authors: Hamide Farshad, Mohammadreza Javidi Abdollah Zadeh Aval

Abstract:

As a result of the growing penetration of the media into human life, a new role under the title of "audience" is defined in the social life .A kind of role which is dramatically changed since its formation. This article aims to define the audience position in the new media equations which is concluded to the transformation of the media role. By using the Library and Attributive method to study the history, the evolutionary outlook to the audience and the recognition of the audience and the media relation in the new media context is studied. It was perceived in past that public communication would result in receiving the audience. But after the emergence of the interactional media and transformation in the audience social life, a new kind of public communication is formed, and also the imaginary picture of the audience is replaced by the audience impact on the communication process. Part of this impact can be seen in the form of feedback which is one of the public communication elements. In public communication, the audience feedback is completely accepted. But in many cases, and along with the audience feedback, the media changes its direction; this direction shift is known as media feedback. At this state, the media and the audience are both doers and consistently change their positions in an interaction. With the greater number of the audience and the media, this process has taken a new role, and the role of this doer is sometimes taken by an audience while influencing another audience, or a media while influencing another media. In this article, this multiple public communication process is shown through representing a model under the title of ”The bilateral influence of the audience and the media.” Based on this model, the audience and the media power are not the two sides of a coin, and as a result, by accepting these two as the doers, the bilateral power of the audience and the media will be complementary to each other. Also more, the compatibility between the media and the audience is analyzed in the bilateral and interactional relation hypothesis, and by analyzing the action law hypothesis, the dos and don’ts of this role are defined, and media is obliged to know and accept them in order to be able to survive. They also have a determining role in the strategic studies of a media.

Keywords: audience, effect, media, interaction, action laws

Procedia PDF Downloads 465
857 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 526
856 Overview of Different Approaches Used in Optimal Operation Control of Hybrid Renewable Energy Systems

Authors: K. Kusakana

Abstract:

A hybrid energy system is a combination of renewable energy sources with back up, as well as a storage system used to respond to given load energy requirements. Given that the electrical output of each renewable source is fluctuating with changes in weather conditions, and since the load demand also varies with time; one of the main attributes of hybrid systems is to be able to respond to the load demand at any time by optimally controlling each energy source, storage and back-up system. The induced optimization problem is to compute the optimal operation control of the system with the aim of minimizing operation costs while efficiently and reliably responding to the load energy requirement. Current optimization research and development on hybrid systems are mainly focusing on the sizing aspect. Thus, the aim of this paper is to report on the state-of-the-art of optimal operation control of hybrid renewable energy systems. This paper also discusses different challenges encountered, as well as future developments that can help in improving the optimal operation control of hybrid renewable energy systems.

Keywords: renewable energies, hybrid systems, optimization, operation control

Procedia PDF Downloads 362
855 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 439
854 Transformer Design Optimization Using Artificial Intelligence Techniques

Authors: Zakir Husain

Abstract:

Main objective of a power transformer design optimization problem requires minimizing the total overall cost and/or mass of the winding and core material by satisfying all possible constraints obligatory by the standards and transformer user requirement. The constraints include appropriate limits on winding fill factor, temperature rise, efficiency, no-load current and voltage regulation. The design optimizations tasks are a constrained minimum cost and/or mass solution by optimally setting the parameters, geometry and require magnetic properties of the transformer. In this paper, present the above design problems have been formulated by using genetic algorithm (GA) and simulated annealing (SA) on the MATLAB platform. The importance of the presented approach is stems for two main features. First, proposed technique provides reliable and efficient solution for the problem of design optimization with several variables. Second, it guaranteed to obtained solution is global optimum. This paper includes a demonstration of the application of the genetic programming GP technique to transformer design.

Keywords: optimization, power transformer, genetic algorithm (GA), simulated annealing technique (SA)

Procedia PDF Downloads 560
853 Assessment of the High-Speed Ice Friction of Bob Skeleton Runners

Authors: Agata Tomaszewska, Timothy Kamps, Stephan R. Turnock, Nicola Symonds

Abstract:

Bob skeleton is a highly competitive sport in which an athlete reaches speeds up to 40 m/s sliding, head first, down an ice track. It is believed that the friction between the runners and ice significantly contributes to the amount of the total energy loss during a bob skeleton descent. There is only limited available experimental data regarding the friction of bob skeleton runners or indeed steel on the ice at high sliding speeds ( > 20 m/s). Testing methods used to investigate the friction of steel on ice in winter sports have been outlined, and their accuracy and repeatability discussed. A system thinking approach was used to investigate the runner-ice interaction during sliding and create concept designs of three ice tribometers. The operational envelope of the bob skeleton system has been defined through mathematical modelling. Designs of a drum, linear and inertia pin-on-disk tribometers were developed specifically for bob skeleton runner testing with the requirement of reaching up to 40 m/s speed and facilitate fresh ice sliding. The design constraints have been outline and the proposed solutions compared based on the ease of operation, accuracy and the development cost.

Keywords: bob skeleton, ice friction, high-speed tribometers, sliding friction

Procedia PDF Downloads 244
852 Analysis of Fault Tolerance on Grid Computing in Real Time Approach

Authors: Parampal Kaur, Deepak Aggarwal

Abstract:

In the computational Grid, fault tolerance is an imperative issue to be considered during job scheduling. Due to the widespread use of resources, systems are highly prone to errors and failures. Hence, fault tolerance plays a key role in the grid to avoid the problem of unreliability. Scheduling the task to the appropriate resource is a vital requirement in computational Grid. The fittest resource scheduling algorithm searches for the appropriate resource based on the job requirements, in contrary to the general scheduling algorithms where jobs are scheduled to the resources with best performance factor. The proposed method is to improve the fault tolerance of the fittest resource scheduling algorithm by scheduling the job in coordination with job replication when the resource has low reliability. Based on the reliability index of the resource, the resource is identified as critical. The tasks are scheduled based on the criticality of the resources. Results show that the execution time of the tasks is comparatively reduced with the proposed algorithm using real-time approach rather than a simulator.

Keywords: computational grid, fault tolerance, task replication, job scheduling

Procedia PDF Downloads 417
851 Digital Preservation: Requirement of 21st Century

Authors: Gaurav Kumar, Shilpa

Abstract:

Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper focuses on operational digital preservation systems specifically in educational organizations in India. It considers the broad range of digital objects including e-journals, technical reports, e-records, project documents, scientific data, etc. This paper describes the main objectives, process and technological issues involved in preservation of digital materials. Digital preservation refers to the various methods of keeping digital materials alive for the future. It includes everything from electronic publications on CD-ROM to Online database and collections of experimental data in digital format maintains the ability to display, retrieve and use digital collections in the face of rapidly changing technological and organizational infrastructures elements. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation.

Keywords: preservation, digital preservation, digital dark age, conservation, archive, repository, document, information technology, hardware, software, organization, machine readable format

Procedia PDF Downloads 432
850 Transparency of Algorithmic Decision-Making: Limits Posed by Intellectual Property Rights

Authors: Olga Kokoulina

Abstract:

Today, algorithms are assuming a leading role in various areas of decision-making. Prompted by a promise to provide increased economic efficiency and fuel solutions for pressing societal challenges, algorithmic decision-making is often celebrated as an impartial and constructive substitute for human adjudication. But in the face of this implied objectivity and efficiency, the application of algorithms is also marred with mounting concerns about embedded biases, discrimination, and exclusion. In Europe, vigorous debates on risks and adverse implications of algorithmic decision-making largely revolve around the potential of data protection laws to tackle some of the related issues. For example, one of the often-cited venues to mitigate the impact of potentially unfair decision-making practice is a so-called 'right to explanation'. In essence, the overall right is derived from the provisions of the General Data Protection Regulation (‘GDPR’) ensuring the right of data subjects to access and mandating the obligation of data controllers to provide the relevant information about the existence of automated decision-making and meaningful information about the logic involved. Taking corresponding rights and obligations in the context of the specific provision on automated decision-making in the GDPR, the debates mainly focus on efficacy and the exact scope of the 'right to explanation'. In essence, the underlying logic of the argued remedy lies in a transparency imperative. Allowing data subjects to acquire as much knowledge as possible about the decision-making process means empowering individuals to take control of their data and take action. In other words, forewarned is forearmed. The related discussions and debates are ongoing, comprehensive, and, often, heated. However, they are also frequently misguided and isolated: embracing the data protection law as ultimate and sole lenses are often not sufficient. Mandating the disclosure of technical specifications of employed algorithms in the name of transparency for and empowerment of data subjects potentially encroach on the interests and rights of IPR holders, i.e., business entities behind the algorithms. The study aims at pushing the boundaries of the transparency debate beyond the data protection regime. By systematically analysing legal requirements and current judicial practice, it assesses the limits of the transparency requirement and right to access posed by intellectual property law, namely by copyrights and trade secrets. It is asserted that trade secrets, in particular, present an often-insurmountable obstacle for realising the potential of the transparency requirement. In reaching that conclusion, the study explores the limits of protection afforded by the European Trade Secrets Directive and contrasts them with the scope of respective rights and obligations related to data access and portability enshrined in the GDPR. As shown, the far-reaching scope of the protection under trade secrecy is evidenced both through the assessment of its subject matter as well as through the exceptions from such protection. As a way forward, the study scrutinises several possible legislative solutions, such as flexible interpretation of the public interest exception in trade secrets as well as the introduction of the strict liability regime in case of non-transparent decision-making.

Keywords: algorithms, public interest, trade secrets, transparency

Procedia PDF Downloads 112
849 Classic Modelled Hybrid Electric Vehicles Using The Power of Internet Of Things

Authors: Venkatesh Krishna Murthy

Abstract:

The era before government-regulated automotive designs gave us some astonishing vehicles that are well worth to keep on the road. The fact that restoring an automobile in 2015 does not mean it will perform like one designed in 2021. This is one of the reasons that manufacturers continue to turn to vintage hardware for future enhancements in their vehicles. Now we need to understand that a modern chassis could possibly allow manufacturers to give vintage performance cars a level of braking capability, compatibility with tires, chassis rigidity, suspension sophistication, and steering response, an experience only racers got until now. However, half a century of advancements in engineering can have a great impact on design in any field, and the automotive realm which holds no exception. In the current situation, a growing number of companies offer chassis and braking components to onboard manufacturers to retrofit contemporary technology for their vintage vehicles to modernize them at the foundation level. The recent question arises on performance on lithium batteries, as opposed to simply bolting upgraded components, for ex. lithium batteries with graphene as superconductive material to enhance performance, an area deeply investigated. Serving as the “bones” of the vehicle, the chassis and frame play a central role in dictating how that automobile will perform. While the desire to maintain originality is alluring for many, the benefits of a modern chassis are vast. In some situations, it also allows builders to put cars back on the road that might otherwise be too far gone. “There’s a couple of different factors at play here – one of them being that these older cars from the ’40s, ’50s, and ’60s have seen a lot of weather and a lot of road miles over the years, more often than not,” says Craig Morrison of Art Morrison Enterprises.

Keywords: hybrid electric vehicles, internet of things, lithium graphene batteries, classic car chassis

Procedia PDF Downloads 157
848 Oxygen-Tolerant H₂O₂ Reduction Catalysis by Iron Phosphate Coated Iron Oxides

Authors: Chia-Ting Chang, Chia-Yu Lin

Abstract:

We report on the decisive role of iron phosphate (FePO₄), formed in-situ during the electrochemical characterization, played in the electrocatalytic activity, especially its oxygen tolerance of iron oxides towards H₂O₂ reduction. Iron oxides studied including, Nanorod arrays (NRs) of β-FeOOH, γ-Fe₂O₃, α-Fe₂O₃, α-Fe₂O₃ nanosheets (α-Fe₂O₃NS), α-Fe₂O₃ nanoparticles (α-Fe₂O₃NP), were synthesized using chemical bath deposition. The nanostructure was controlled simply by adjusting the composition of precursor solution and reaction duration for CBD process, whereas the crystal phase was controlled by adjusting the annealing temperature. It was found that iron phosphate (FePO₄) was deposited in-situ onto the surface of this nanostructured α-Fe₂O₃ during the electrochemical pretreatment in the phosphate electrolyte, and both FePO₄ and α-Fe₂O₃ showed the activity in catalysing the electrochemical reduction of H₂O₂. In addition, the interaction/compatibility between deposited FePO₄ and iron oxides has a decisive effect on the overall electrocatalytic activity of the resultant electrodes; FePO₄ only showed synergetic effect on the overall electrocatalytic activity of α-Fe₂O₃NR and α-Fe2O₃NS. Both α-Fe₂O₃NR and α-Fe₂O₃NS showed two reduction peaks in phosphate electrolyte containing H₂O₂, one being pH-dependent and related to the electrocatalytic properties of FePO₄, and the other one being pH-independent and only related to the intrinsic electrocatalytic properties of α-Fe₂O₃NR and α-Fe₂O₃NS. However, all iron oxides showed only one pH-independent reductive peak in non-phosphate electrolyte containing H₂O₂. The synergesitic catalysis exerted by FePO₄ with α-Fe₂O₃NR or α-Fe₂O₃NS providing additional oxygen-insensitive active site for H₂O₂ reduction, which allows their applications to electrochemical detection of H₂O₂ without the interference of O₂ involving in oxidase-catalyzed chemical processes.

Keywords: H₂O₂ reduction, Iron oxide, iron phosphate, O₂ tolerance

Procedia PDF Downloads 403
847 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 304
846 The Impact of Gamification on Self-Assessment for English Language Learners in Saudi Arabia

Authors: Wala A. Bagunaid, Maram Meccawy, Arwa Allinjawi, Zilal Meccawy

Abstract:

Continuous self-assessment becomes crucial in self-paced online learning environments. Students often depend on themselves to assess their progress; which is considered an essential requirement for any successful learning process. Today’s education institutions face major problems around student motivation and engagement. Thus, personalized e-learning systems aim to help and guide the students. Gamification provides an opportunity to help students for self-assessment and social comparison with other students through attempting to harness the motivational power of games and apply it to the learning environment. Furthermore, Open Social Student Modeling (OSSM) as considered as the latest user modeling technologies is believed to improve students’ self-assessment and to allow them to social comparison with other students. This research integrates OSSM approach and gamification concepts in order to provide self-assessment for English language learners at King Abdulaziz University (KAU). This is achieved through an interactive visual representation of their learning progress.

Keywords: e-learning system, gamification, motivation, social comparison, visualization

Procedia PDF Downloads 132