Search results for: applied computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9241

Search results for: applied computing

8731 Effects of a Student-Centered Approach to Assessment on Students' Attitudes towards 'Applied Statistics' Course

Authors: Anduela Lile

Abstract:

The purpose of this cross sectional study was to investigate the effectiveness of teaching and learning Statistics from a student centered perspective in higher education institutions. Statistics education has emphasized the application of tangible and interesting examples in order to motivate students learning about statistical concepts. Participants in this study were 112 bachelor students enrolled in the ‘Applied Statistics’ course in Sports University of Tirana. Experimental group students received a student-centered teaching approach; Control group students received an instructor-centered teaching approach. This study found student-centered approach student group had statistically significantly higher assessments scores (52.1 ± 18.9) at the end of the evaluation compared to instructor-centered approach student group (61.8 ± 16.4), (t (108) = 2.848, p = 0.005). Results concluded that student-centered perspective can improve student positive attitude to statistical methods and to motivate project work. Therefore, findings of this study may be very useful to the higher education institutions to establish their learning strategies especially for courses related to Statistics.

Keywords: student-centered, instructor-centered, course assessment, learning outcomes, applied statistics

Procedia PDF Downloads 278
8730 Bilateral Thalamic Hypodense Lesions in Computing Tomography

Authors: Angelis P. Barlampas

Abstract:

Purpose of Learning Objective: This case depicts the need for cooperation between the emergency department and the radiologist to achieve the best diagnostic result for the patient. The clinical picture must correlate well with the radiology report and when it does not, this is not necessarily someone’s fault. Careful interpretation and good knowledge of the limitations, advantages and disadvantages of each imaging procedure are essential for the final diagnostic goal. Methods or Background: A patient was brought to the emergency department by their relatives. He was suddenly confused and his mental status was altered. He hadn't any history of mental illness and was otherwise healthy. A computing tomography scan without contrast was done, but it was unremarkable. Because of high clinical suspicion of probable neurologic disease, he was admitted to the hospital. Results or Findings: Another T was done after 48 hours. It showed a hypodense region in both thalamic areas. Taking into account that the first CT was normal, but the initial clinical picture of the patient was alerting of something wrong, the repetitive CT exam is highly suggestive of a probable diagnosis of bilateral thalamic infractions. Differential diagnosis: Primary bilateral thalamic glioma, Wernicke encephalopathy, osmotic myelinolysis, Fabry disease, Wilson disease, Leigh disease, West Nile encephalitis, Greutzfeldt Jacob disease, top of the basilar syndrome, deep venous thrombosis, mild to moderate cerebral hypotension, posterior reversible encephalopathy syndrome, Neurofibromatosis type 1. Conclusion: As is the case of limitations for any imaging procedure, the same applies to CT. The acute ischemic attack can not depict on CT. A period of 24 to 48 hours has to elapse before any abnormality can be seen. So, despite the fact that there are no obvious findings of an ischemic episode, like paresis or imiparesis, one must be careful not to attribute the patient’s clinical signs to other conditions, such as toxic effects, metabolic disorders, psychiatric symptoms, etc. Further investigation with MRI or at least a repeated CT must be done.

Keywords: CNS, CT, thalamus, emergency department

Procedia PDF Downloads 118
8729 Condensation of Moist Air in Heat Exchanger Using CFD

Authors: Jan Barak, Karel Frana, Joerg Stiller

Abstract:

This work presents results of moist air condensation in heat exchanger. It describes theoretical knowledge and definition of moist air. Model with geometry of square canal was created for better understanding and post processing of condensation phenomena. Different approaches were examined on this model to find suitable software and model. Obtained knowledge was applied to geometry of real heat exchanger and results from experiment were compared with numerical results. One of the goals is to solve this issue without creating any user defined function in the applied code. It also contains summary of knowledge and outlook for future work.

Keywords: condensation, exchanger, experiment, validation

Procedia PDF Downloads 401
8728 Utilization of Low-Cost Adsorbent Fly Ash for the Removal of Phenol from Water

Authors: Ihsanullah, Muataz Ali Atieh

Abstract:

In this study, a low-cost adsorbent carbon fly ash (CFA) was used for the removal of Phenol from the water. The adsorbent characteristics were observed by the Thermogravimetric Analysis (TGA), BET specific surface area analyzer, Zeta Potential and Field Emission Scanning Electron Microscopy (FE-SEM). The effect of pH, agitation speed, contact time, adsorbent dosage, and initial concentration of phenol were studied on the removal of phenol from the water. The optimum values of these variables for maximum removal of phenol were also determined. Both Freundlich and Langmuir isotherm models were successfully applied to describe the experimental data. Results showed that low-cost adsorbent phenol can be successfully applied for the removal of Phenol from the water.

Keywords: phenol, fly ash, adsorption, carbon adsorbents

Procedia PDF Downloads 325
8727 Tribological Performance of Polymer Syntactic Foams in Low-Speed Conditions

Authors: R. Narasimha Rao, Ch. Sri Chaitanya

Abstract:

Syntactic foams are closed-cell foams with high specific strength and high compression strength. At Low speeds, the wear rate is sensitive to the sliding speeds and other tribological parameters like applied load and the sliding distance. In the present study, the tribological performance of the polymer-based syntactic foams was reported based on the experiments conducted on a pin-on-disc tribometer. The syntactic foams were manufactured with epoxy as the matrix and the cenospheres obtained from the thermal powerplants as the reinforcement. The experiments were conducted at a sliding speed of the 1 m/s. The applied load was varied from 1 kg to 5 kg up to a sliding distance of 3000 m. The wear rate increased with the sliding distance at lower loads. The trend was reversed at higher loads of 5kg. This may be due to the high plastic deformation at the initial stages when higher loads were applied. This was evident with the higher friction constants for the higher loads. The adhesive wear was found to be predominant for lower loads, while the abrasive wear tracks can be seen in micrographs of samples tested under higher loads.

Keywords: sliding speed, syntactic foams, tribological performance, wear rate

Procedia PDF Downloads 77
8726 Quality Assurance in Cardiac Disorder Detection Images

Authors: Anam Naveed, Asma Andleeb, Mehreen Sirshar

Abstract:

In the article, Image processing techniques have been applied on cardiac images for enhancing the image quality. Two types of methodologies considers for survey, invasive techniques and non-invasive techniques. Different image processes for improvement of cardiac image quality and reduce the amount of radiation exposure for invasive techniques are explored. Different image processing algorithms for enhancing the noninvasive cardiac image qualities are described. Beside these two methodologies, third methodology has applied on live streaming of heart rate on ECG window for extracting necessary information, removing noise and enhancing quality. Sensitivity analyses have been carried out to investigate the impacts of cardiac images for diagnosis of cardiac arteries disease and how the enhancement on images will help the cardiologist to diagnoses disease. The paper evaluates strengths and weaknesses of different techniques applied for improved the image quality and draw a conclusion. Some specific limitations must be considered for whole survey, like the patient heart beat must be 70-75 beats/minute while doing the angiography, similarly patient weight and exposure radiation amount has some limitation.

Keywords: cardiac images, CT angiography, critical analysis, exposure radiation, invasive techniques, invasive techniques, non-invasive techniques

Procedia PDF Downloads 348
8725 Dielectrophoretic Characterization of Tin Oxide Nanowires for Biotechnology Application

Authors: Ahmad Sabry Mohamad, Kai F. Hoettges, Michael Pycraft Hughes

Abstract:

This study investigates nanowires using Dielectrophoresis (DEP) in non-aqueous suspension of Tin (IV) Oxide (SnO2) nanoparticles dispersed in N,N-dimenthylformamide (DMF). The self assembly of nanowires in DEP impedance spectroscopy can be determined. In this work, dielectrophoretic method was used to measure non-organic molecules for estimating the permittivity and conductivity characteristic of the nanowires. As in aqueous such as salt solution has been dominating the transport of SnO2, which are the wire growth threshold, depend on applied voltage. While DEP assembly of nanowires depend on applied frequency, the applications of dielectrophoretic collection are measured using impedance spectroscopy.

Keywords: dielectrophoresis, impedance spectroscopy, nanowires, N, N-dimenthylformamide, SnO2

Procedia PDF Downloads 658
8724 Comparison of Presented Definitions to Authenticity and Integrity

Authors: Golnaz Salehi Mourkani

Abstract:

Two conception of Integrity and authenticity, in texts have just applied respectively for adaptive reuse and conservation, which in comparison with word “Integrity” in texts related to adaptive reuse is much more seen than Authenticity, which is often applied with conservation. According to Stove, H., (2007) in some cases, this conception have used with this form “integrity/authenticity” in texts, that cause to infer one conception of both. In this article, with referring to definitions and comparison of aspects specialized to both concept of “Authenticity and Integrity” through literature review, it was attempted to examine common and distinctive aspects of each one, then with this method we can reach their differences in adaptive reuse.

Keywords: adaptive reuse, integrity, authenticity, conservation

Procedia PDF Downloads 428
8723 Effect of Plant Growth Regulator on Vegetative Growth and Yield Components of Winter Wheat under Different Levels of Irrigation

Authors: Mohammed Ahmed Alghamdi

Abstract:

Field experiment were carried out to investigate the effect of the plant growth regulator on vegetative growth and yield components of reduced height isogenic lines of the wheat (Triticum aestivum L.) cultivar Mercia. The Field experiment compared the growth regulator response of seven isogenic lines of Mercia. Growth regulators reduced plant height significantly in all lines. Growth regulator decreased total dry matter and grain yield with greatest reduction generally for the control and Rht8 lines. Rht1 was the least affected. There were few significant effects of growth regulator on gas exchange and chlorophyll fluorescence but the trend was for greater values with growth regulator. In this field experiment, a rate of 2.0 l ha-1 applied just before the third node detectable stage under non water stressed and water stressed conditions gave slight increases in yield of up to 14% except for line Rht10 which increased significantly in non-stressed conditions. In the second glasshouse experiment, a rate of 2.5 l ha-1 applied at the start of stem elongation under 30% FC and 100% FC gave reductions in yield up to 16% for the growth regulator and 55% under water stress. In the field experiment, rates of 2.5 and 3.0 l ha-1 applied at the start of stem elongation gave reductions in yield up to 20% mainly through individual seed weight. In the final glasshouse experiment, rates of 2.5 and 3.0 l ha-1 applied at 6 leaves unfolded and 1st node detectable both reduced grain yield.

Keywords: growth regulator, irrigation, isogenic lines, yield, winter wheat

Procedia PDF Downloads 457
8722 Development of Swing Valve for Gasoline Turbocharger Using Hybrid Metal Injection Molding

Authors: B. S. So, Y. H. Yoon, J. O. Jung, K. S. Bae

Abstract:

Metal Injection Molding (MIM) is a technology that combines powder metallurgy and injection molding. Particularly, it is widely applied to the manufacture of precision mobile parts and automobile turbocharger parts because compact precision parts with complicated three-dimensional shapes that are difficult to machining are formed into a large number of finished products. The swing valve is a valve that adjusts the boost pressure of the turbocharger. Since the head portion is exposed to the harsh temperature condition of about 900 degrees in the gasoline GDI engine, it is necessary to use Inconel material with excellent heat resistance and abrasion resistance, resulting in high manufacturing cost. In this study, we developed a swing valve using a metal powder injection molding based hybrid material (Inconel 713C material with heat resistance is applied to the head part, and HK30 material with low price is applied to the rest of the body part). For this purpose, the process conditions of the metal injection molding were optimized to minimize the internal defects, and the effectiveness was confirmed by the fracture strength and fatigue test.

Keywords: hybrid metal injection molding, swing valve, turbocharger, double injection

Procedia PDF Downloads 212
8721 Fully Eulerian Finite Element Methodology for the Numerical Modeling of the Dynamics of Heart Valves

Authors: Aymen Laadhari

Abstract:

During the last decade, an increasing number of contributions have been made in the fields of scientific computing and numerical methodologies applied to the study of the hemodynamics in the heart. In contrast, the numerical aspects concerning the interaction of pulsatile blood flow with highly deformable thin leaflets have been much less explored. This coupled problem remains extremely challenging and numerical difficulties include e.g. the resolution of full Fluid-Structure Interaction problem with large deformations of extremely thin leaflets, substantial mesh deformations, high transvalvular pressure discontinuities, contact between leaflets. Although the Lagrangian description of the structural motion and strain measures is naturally used, many numerical complexities can arise when studying large deformations of thin structures. Eulerian approaches represent a promising alternative to readily model large deformations and handle contact issues. We present a fully Eulerian finite element methodology tailored for the simulation of pulsatile blood flow in the aorta and sinus of Valsalva interacting with highly deformable thin leaflets. Our method enables to use a fluid solver on a fixed mesh, whilst being able to easily model the mechanical properties of the valve. We introduce a semi-implicit time integration scheme based on a consistent NewtonRaphson linearization. A variant of the classical Newton method is introduced and guarantees a third-order convergence. High-fidelity computational geometries are built and simulations are performed under physiological conditions. We address in detail the main features of the proposed method, and we report several experiments with the aim of illustrating its accuracy and efficiency.

Keywords: eulerian, level set, newton, valve

Procedia PDF Downloads 277
8720 Sensitivity Analysis during the Optimization Process Using Genetic Algorithms

Authors: M. A. Rubio, A. Urquia

Abstract:

Genetic algorithms (GA) are applied to the solution of high-dimensional optimization problems. Additionally, sensitivity analysis (SA) is usually carried out to determine the effect on optimal solutions of changes in parameter values of the objective function. These two analyses (i.e., optimization and sensitivity analysis) are computationally intensive when applied to high-dimensional functions. The approach presented in this paper consists in performing the SA during the GA execution, by statistically analyzing the data obtained of running the GA. The advantage is that in this case SA does not involve making additional evaluations of the objective function and, consequently, this proposed approach requires less computational effort than conducting optimization and SA in two consecutive steps.

Keywords: optimization, sensitivity, genetic algorithms, model calibration

Procedia PDF Downloads 434
8719 Non-Universality in Barkhausen Noise Signatures of Thin Iron Films

Authors: Arnab Roy, P. S. Anil Kumar

Abstract:

We discuss angle dependent changes to the Barkhausen noise signatures of thin epitaxial Fe films upon altering the angle of the applied field. We observe a sub-critical to critical phase transition in the hysteresis loop of the sample upon increasing the out-of-plane component of the applied field. The observations are discussed in the light of simulations of a 2D Gaussian Random Field Ising Model with references to a reducible form of the Random Anisotropy Ising Model.

Keywords: Barkhausen noise, Planar Hall effect, Random Field Ising Model, Random Anisotropy Ising Model

Procedia PDF Downloads 387
8718 Off-Line Text-Independent Arabic Writer Identification Using Optimum Codebooks

Authors: Ahmed Abdullah Ahmed

Abstract:

The task of recognizing the writer of a handwritten text has been an attractive research problem in the document analysis and recognition community with applications in handwriting forensics, paleography, document examination and handwriting recognition. This research presents an automatic method for writer recognition from digitized images of unconstrained writings. Although a great effort has been made by previous studies to come out with various methods, their performances, especially in terms of accuracy, are fallen short, and room for improvements is still wide open. The proposed technique employs optimal codebook based writer characterization where each writing sample is represented by a set of features computed from two codebooks, beginning and ending. Unlike most of the classical codebook based approaches which segment the writing into graphemes, this study is based on fragmenting a particular area of writing which are beginning and ending strokes. The proposed method starting with contour detection to extract significant information from the handwriting and the curve fragmentation is then employed to categorize the handwriting into Beginning and Ending zones into small fragments. The similar fragments of beginning strokes are grouped together to create Beginning cluster, and similarly, the ending strokes are grouped to create the ending cluster. These two clusters lead to the development of two codebooks (beginning and ending) by choosing the center of every similar fragments group. Writings under study are then represented by computing the probability of occurrence of codebook patterns. The probability distribution is used to characterize each writer. Two writings are then compared by computing distances between their respective probability distribution. The evaluations carried out on ICFHR standard dataset of 206 writers using Beginning and Ending codebooks separately. Finally, the Ending codebook achieved the highest identification rate of 98.23%, which is the best result so far on ICFHR dataset.

Keywords: off-line text-independent writer identification, feature extraction, codebook, fragments

Procedia PDF Downloads 510
8717 The Effect of Taking Heavy Metal on Gastrointestinal Peptides

Authors: Nurgul Senol, Melda Azman

Abstract:

In this study, the rate of release of gastrointestinal peptides heavy metal compounds applied to a certain extent (gastrin/CCK) on immunohistochemical aimed to determine the effect. This study was supported by TÜBİTAK. Subjects were randomly grouped into three. Group I; iron (Fe), Group II; zinc (Zn), Group III; control; gavage technique was applied to each group once a day throughout 30 days. At the end of the experiment, rats were decapitated and their stomach-intestine tissues removed, Peroxidase anti peroxidase method was applied following the routine histological follow-ups. According to the control group, in the stomach, had more positive cell density of gastrin in Fe groups, it was observed that group followed by Zn. It was found between the groups in the stomach and intestinal gastrin, gastrin-positive cell density decreases towards the intestines from the stomach. Although CCK differences in staining were observed in the control group, the intensity of staining intensity between the two groups in positive cells was determined to be more than the stomach. The group in the intestines, there is no change in terms of positivity CCK. Consequently, there is no significant effect on gastrointestinal peptides in Zn application. It has been identified Fe application has a significant effect on the releasing of CCK/gastrin peptides.

Keywords: alimentary canal, CCK, iron, gastrin, zinc

Procedia PDF Downloads 213
8716 Translation Methods Applied While Dealing With System-Bound Terms (Polish-English Translation)

Authors: Anna Kizinska

Abstract:

The research aims at discussing Polish and British incongruent terms that refer to company law. The Polish terms under analysis appear in the Polish Code of Commercial Partnerships and Companies and constitute legal terms or factual terms. The English equivalents of each Polish term under research appear in two Polish Code of Commercial Partnerships and Companies translations into English. The theoretical part of the paper includes the presentation of the definitions of a system-bound term and incongruity of terms. The aim of the analysis is to check if the classification of translation methods used in civil law terms translation comprehends the translation methods applied while translating company law terms into English. The translation procedures are defined according to Newmark. The stages of the research include 1) presentation of a definition of a Polish term, 2) enumerating the so-far published English equivalents of a given Polish term and comparing their definitions (as long as they appear in English law dictionaries ) with the definition of a given Polish term under analysis, 3) checking whether an English equivalent appears or not in, among others, the sources of the British law (legislation.gov.uk database) , 4) identifying the translation method that was applied while forming a given English equivalent.

Keywords: translation, legal terms, equivalence, company law, incongruency

Procedia PDF Downloads 86
8715 Mining Diagnostic Investigation Process

Authors: Sohail Imran, Tariq Mahmood

Abstract:

In complex healthcare diagnostic investigation process, medical practitioners have to focus on ways to standardize their processes to perform high quality care and optimize the time and costs. Process mining techniques can be applied to extract process related knowledge from data without considering causal and dynamic dependencies in business domain and processes. The application of process mining is effective in diagnostic investigation. It is very helpful where a treatment gives no dispositive evidence favoring it. In this paper, we applied process mining to discover important process flow of diagnostic investigation for hepatitis patients. This approach has some benefits which can enhance the quality and efficiency of diagnostic investigation processes.

Keywords: process mining, healthcare, diagnostic investigation process, process flow

Procedia PDF Downloads 519
8714 Real-Time Big-Data Warehouse a Next-Generation Enterprise Data Warehouse and Analysis Framework

Authors: Abbas Raza Ali

Abstract:

Big Data technology is gradually becoming a dire need of large enterprises. These enterprises are generating massively large amount of off-line and streaming data in both structured and unstructured formats on daily basis. It is a challenging task to effectively extract useful insights from the large scale datasets, even though sometimes it becomes a technology constraint to manage transactional data history of more than a few months. This paper presents a framework to efficiently manage massively large and complex datasets. The framework has been tested on a communication service provider producing massively large complex streaming data in binary format. The communication industry is bound by the regulators to manage history of their subscribers’ call records where every action of a subscriber generates a record. Also, managing and analyzing transactional data allows service providers to better understand their customers’ behavior, for example, deep packet inspection requires transactional internet usage data to explain internet usage behaviour of the subscribers. However, current relational database systems limit service providers to only maintain history at semantic level which is aggregated at subscriber level. The framework addresses these challenges by leveraging Big Data technology which optimally manages and allows deep analysis of complex datasets. The framework has been applied to offload existing Intelligent Network Mediation and relational Data Warehouse of the service provider on Big Data. The service provider has 50+ million subscriber-base with yearly growth of 7-10%. The end-to-end process takes not more than 10 minutes which involves binary to ASCII decoding of call detail records, stitching of all the interrogations against a call (transformations) and aggregations of all the call records of a subscriber.

Keywords: big data, communication service providers, enterprise data warehouse, stream computing, Telco IN Mediation

Procedia PDF Downloads 175
8713 On Adaptive and Auto-Configurable Apps

Authors: Prisa Damrongsiri, Kittinan Pongpianskul, Mario Kubek, Herwig Unger

Abstract:

Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation.

Keywords: apps, context-sensitive, location-sensitive, self-configuration, mobile computing, smart home

Procedia PDF Downloads 393
8712 The Role of Mass Sport Guidance in the Health Service Industry of China

Authors: Qiu Jian-Rong, Li Qing-Hui, Zhan Dong, Zhang Lei

Abstract:

Facing the problem of the demand of economic restructuring and risk of social economy stagnation due to the ageing of population, the Health Service Industry will play a very important role in the structure of industry in the future. During the process, the orient of Chinese sports medicine as well as the joint with preventive medicine, and the integration with data bank and cloud computing will be involved.

Keywords: China, the health service industry, mass sport, data bank

Procedia PDF Downloads 626
8711 Wet Sliding Wear and Frictional Behavior of Commercially Available Perspex

Authors: S. Reaz Ahmed, M. S. Kaiser

Abstract:

The tribological behavior of commercially used Perspex was evaluated under dry and wet sliding condition using a pin-on-disc wear tester with different applied loads ranging from 2.5 to 20 N. Experiments were conducted with varying sliding distance from 0.2 km to 4.6 km, wherein the sliding velocity was kept constant, 0.64 ms-1. The results reveal that the weight loss increases with applied load and the sliding distance. The nature of the wear rate was very similar in both the sliding environments in which initially the wear rate increased very rapidly with increasing sliding distance and then progressed to a slower rate. Moreover, the wear rate in wet sliding environment was significantly lower than that under dry sliding condition. The worn surfaces were characterized by optical microscope and SEM. It is found that surface modification has significant effect on sliding wear performance of Perspex.

Keywords: Perspex, wear, friction, SEM

Procedia PDF Downloads 272
8710 Single Ion Transport with a Single-Layer Graphene Nanopore

Authors: Vishal V. R. Nandigana, Mohammad Heiranian, Narayana R. Aluru

Abstract:

Graphene material has found tremendous applications in water desalination, DNA sequencing and energy storage. Multiple nanopores are etched to create opening for water desalination and energy storage applications. The nanopores created are of the order of 3-5 nm allowing multiple ions to transport through the pore. In this paper, we present for the first time, molecular dynamics study of single ion transport, where only one ion passes through the graphene nanopore. The diameter of the graphene nanopore is of the same order as the hydration layers formed around each ion. Analogous to single electron transport resulting from ionic transport is observed for the first time. The current-voltage characteristics of such a device are similar to single electron transport in quantum dots. The current is blocked until a critical voltage, as the ions are trapped inside a hydration shell. The trapped ions have a high energy barrier compared to the applied input electrical voltage, preventing the ion to break free from the hydration shell. This region is called “Coulomb blockade region”. In this region, we observe zero transport of ions inside the nanopore. However, when the electrical voltage is beyond the critical voltage, the ion has sufficient energy to break free from the energy barrier created by the hydration shell to enter into the pore. Thus, the input voltage can control the transport of the ion inside the nanopore. The device therefore acts as a binary storage unit, storing 0 when no ion passes through the pore and storing 1 when a single ion passes through the pore. We therefore postulate that the device can be used for fluidic computing applications in chemistry and biology, mimicking a computer. Furthermore, the trapped ion stores a finite charge in the Coulomb blockade region; hence the device also acts a super capacitor.

Keywords: graphene nanomembrane, single ion transport, Coulomb blockade, nanofluidics

Procedia PDF Downloads 320
8709 Steel Dust as a Coating Agent for Iron Ore Pellets at Ironmaking

Authors: M. Bahgat, H. Hanafy, H. Al-Tassan

Abstract:

Cluster formation is an essential phenomenon during direct reduction processes at shaft furnaces. Decreasing the reducing temperature to avoid this problem can cause a significant drop in throughput. In order to prevent sticking of pellets, a coating material basically inactive under the reducing conditions prevailing in the shaft furnace, should be applied to cover the outer layer of the pellets. In the present work, steel dust is used as coating material for iron ore pellets to explore dust coating effectiveness and determines the best coating conditions. Steel dust coating is applied for iron ore pellets in various concentrations. Dust slurry concentrations of 5.0-30% were used to have a coated steel dust amount of 1.0-5.0 kg per ton iron ore. Coated pellets with various concentrations were reduced isothermally in weight loss technique with simulated gas mixture to the composition of reducing gases at shaft furnaces. The influences of various coating conditions on the reduction behavior and the morphology were studied. The optimum reduced samples were comparatively applied for sticking index measurement. It was found that the optimized steel dust coating condition that achieve higher reducibility with lower sticking index was 30% steel dust slurry concentration with 3.0 kg steel dust/ton ore.

Keywords: reduction, ironmaking, steel dust, coating

Procedia PDF Downloads 301
8708 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 384
8707 Comparison of Presented Definitions and Aspects of Authenticity and Integrity in Adaptive Reuse

Authors: Golnaz Salehi Mourkani

Abstract:

Two conception of Integrity and authenticity, in texts have just applied respectively for adaptive reuse and conservation, which in comparison with word “Integrity” in texts related to adaptive reuse is much more seen than Authenticity, which is often applied with conservation. According to Stove, H. (2007) in some cases, this conception have used with this form “integrity/authenticity” in texts, that cause to infer one conception of both. In this article, with referring to definitions and comparison of aspects specialized to both concept of “Authenticity and Integrity” through literature review, it was attempted to examine common and distinctive aspects of each one, then with this method we can reach their differences in adaptive reuse.

Keywords: adaptive reuse, integrity, authenticity, conservation

Procedia PDF Downloads 459
8706 Stochastic Richelieu River Flood Modeling and Comparison of Flood Propagation Models: WMS (1D) and SRH (2D)

Authors: Maryam Safrai, Tewfik Mahdi

Abstract:

This article presents the stochastic modeling of the Richelieu River flood in Quebec, Canada, occurred in the spring of 2011. With the aid of the one-dimensional Watershed Modeling System (WMS (v.10.1) and HEC-RAS (v.4.1) as a flood simulator, the delineation of the probabilistic flooded areas was considered. Based on the Monte Carlo method, WMS (v.10.1) delineated the probabilistic flooded areas with corresponding occurrence percentages. Furthermore, results of this one-dimensional model were compared with the results of two-dimensional model (SRH-2D) for the evaluation of efficiency and precision of each applied model. Based on this comparison, computational process in two-dimensional model is longer and more complicated versus brief one-dimensional one. Although, two-dimensional models are more accurate than one-dimensional method, but according to existing modellers, delineation of probabilistic flooded areas based on Monte Carlo method is achievable via one-dimensional modeler. The applied software in this case study greatly responded to verify the research objectives. As a result, flood risk maps of the Richelieu River with the two applied models (1d, 2d) could elucidate the flood risk factors in hydrological, hydraulic, and managerial terms.

Keywords: flood modeling, HEC-RAS, model comparison, Monte Carlo simulation, probabilistic flooded area, SRH-2D, WMS

Procedia PDF Downloads 139
8705 Speed up Vector Median Filtering by Quasi Euclidean Norm

Authors: Vinai K. Singh

Abstract:

For reducing impulsive noise without degrading image contours, median filtering is a powerful tool. In multiband images as for example colour images or vector fields obtained by optic flow computation, a vector median filter can be used. Vector median filters are defined on the basis of a suitable distance, the best performing distance being the Euclidean. Euclidean distance is evaluated by using the Euclidean norms which is quite demanding from the point of view of computation given that a square root is required. In this paper an optimal piece-wise linear approximation of the Euclidean norm is presented which is applied to vector median filtering.

Keywords: euclidean norm, quasi euclidean norm, vector median filtering, applied mathematics

Procedia PDF Downloads 472
8704 Fashion Accessory and Its Future: Design for Sustainability Applied to the Design Process as a Potential Approach

Authors: Trinh Bui, A. Cappellieri

Abstract:

The fashion industry has become one of the most polluting industries in the world. In this context, designers can contribute solutions to the problem by applying Design for Sustainability (DfS) criteria, which will enable to promote designing products and services toward Sustainability. Therefore, 'Slow Fashion' movement has been receiving the attention of researchers, designers, and customers who are sensitive to sustainable development. The purpose of this paper is to contribute to a better understanding of DfS in fashion. In particular, how can apply sustainable design principles to the fashion accessory in order to minimize the negative impact on the environment and society? The research method of this study is qualitative, utilising a multi-method case study approach. Grounded theory analysis was applied to analyse the data of the case studies collected and the results obtained. Also, research findings indicate that DfS applied to Fashion Accessory design processes might have great potential and win-win approaches toward a sustainable future. An important implication is that understanding the concepts and applying DfS to fashion accessory design processes can support designers to face challenges and seize opportunities. Furthermore, identify the key concept of sustainability and social responsibility could raise awareness on sustainable fashion for both producers and customers more effectively.

Keywords: design for sustainability, fashion accessory, sustainable fashion, sustainability

Procedia PDF Downloads 280
8703 Developing a Framework for Open Source Software Adoption in a Higher Education Institution in Uganda. A case of Kyambogo University

Authors: Kafeero Frank

Abstract:

This study aimed at developing a frame work for open source software adoption in an institution of higher learning in Uganda, with the case of KIU as a study area. There were mainly four research questions based on; individual staff interaction with open source software forum, perceived FOSS characteristics, organizational characteristics and external characteristics as factors that affect open source software adoption. The researcher used causal-correlation research design to study effects of these variables on open source software adoption. A quantitative approach was used in this study with self-administered questionnaire on a purposively and randomly sampled sample of university ICT staff. Resultant data was analyzed using means, correlation coefficients and multivariate multiple regression analysis as statistical tools. The study reveals that individual staff interaction with open source software forum and perceived FOSS characteristics were the primary factors that significantly affect FOSS adoption while organizational and external factors were secondary with no significant effect but significant correlation to open source software adoption. It was concluded that for effective open source software adoption to occur there must be more effort on primary factors with subsequent reinforcement of secondary factors to fulfill the primary factors and adoption of open source software. Lastly recommendations were made in line with conclusions for coming up with Kyambogo University frame work for open source software adoption in institutions of higher learning. Areas of further research recommended include; Stakeholders’ analysis of open source software adoption in Uganda; Challenges and way forward. Evaluation of Kyambogo University frame work for open source software adoption in institutions of higher learning. Framework development for cloud computing adoption in Ugandan universities. Framework for FOSS development in Uganda IT industry

Keywords: open source software., organisational characteristics, external characteristics, cloud computing adoption

Procedia PDF Downloads 70
8702 Poz and Play: Exploring the Effectiveness of the Online Teleserye 'Mga Batang Poz' in Influencing the Reproductive Health Practices of Filipino Teenagers

Authors: Arlan Jay Jondonero

Abstract:

The study explores the potential of teleseryes in improving the reproductive health practices of its Filipino teenage viewers. This includes the identification of the elements of teleseryes and the conditions that make it suitable for teleseryes to influence the practices of its viewers, as well as the assessment of how the Sabido methodology was applied in other countries to see if it can be applied in the Philippine context. It discusses the historical context of teleseryes in the Philippines, which are now in the online digital media platform. The study recognizes the role of the social cognitive theory and dramatic theory in a viewer’s acquisition of better reproductive health practices and evaluates if these theories can be applied in the Philippine context. Using the quasi-experimental approach, the study aims to determine if there is a causal relationship between how the online teleserye “Mga Batang Poz” is perceived by the Filipino teenage audience through its characters and storylines and the development of the audience’s knowledge, perceptions, and behaviors surrounding HIV/AIDS. The study looked into the components of the teleserye that made it relatable to the Filipino youth, as well as factors that should be taken into consideration to significantly influence the reproductive health practices of the Filipino youth.

Keywords: entertainment-education, HIV, quasi-experimental, Sabido methodology, teleserye

Procedia PDF Downloads 112