Search results for: concrete design code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14983

Search results for: concrete design code

9403 Frequency of BCR-ABL Fusion Transcript Types with Chronic Myeloid Leukemia by Multiplex Polymerase Chain Reaction in Srinagarind Hospital, Khon Kaen Thailand

Authors: Kanokon Chaicom, Chitima Sirijerachai, Kanchana Chansung, Pinsuda Klangsang, Boonpeng Palaeng, Prajuab Chaimanee, Pimjai Ananta

Abstract:

Chronic myeloid leukemia (CML) is characterized by the consistent involvement of the Philadelphia chromosome (Ph), which is derived from a reciprocal translocation between chromosome 9 and 22, the main product of the t(9;22) (q34;q11) translocation, is found in the leukemic clone of at least 95% of CML patients. There are two major forms of the BCR/ABL fusion gene, involving ABL exon 2, but including different exons of BCR gene. The transcripts b2a2 (e13a2) or b3a2 (e14a2) code for a p210 protein. Another fusion gene leads to the expression of an e1a2 transcript, which codes for a p190 protein. Other less common fusion genes are b3a3 or b2a3, which codes for a p203 protein and e19a2 (c3a2) transcript, which codes for a p230 protein. Its frequency varies in different populations. In this study, we aimed to report the frequency of BCR-ABL fusion transcript types with CML by multiplex PCR (polymerase chain reaction) in Srinagarind Hospital, Khon Kaen, Thailand. Multiplex PCR for BCR-ABL was performed on 58 patients, to detect different types of BCR-ABL transcripts of the t (9; 22). All patients examined were positive for some type of BCR/ABL rearrangement. The majority of the patients (93.10%) expressed one of the p210 BCR-ABL transcripts, b3a2 and b2a2 transcripts were detected in 53.45% and 39.65% respectively. The expression of an e1a2 transcript showed 3.75%. Co-expression of p210/p230 was detected in 3.45%. Co-expression of p210/p190 was not detected. Multiplex PCR is useful, saves time and reliable in the detection of BCR-ABL transcript types. The frequency of one or other rearrangement in CML varies in different population.

Keywords: chronic myeloid leukemia, BCR-ABL fusion transcript types, multiplex PCR, frequency of BCR-ABL fusion

Procedia PDF Downloads 247
9402 Investigation of the Flow Characteristics in a Catalytic Muffler with Perforated Inlet Cone

Authors: Gyo Woo Lee, Man Young Kim

Abstract:

Emission regulations for diesel engines are being strengthened and it is impossible to meet the standards without exhaust after-treatment systems. Lack of the space in many diesel vehicles, however, make it difficult to design and install stand-alone catalytic converters such as DOC, DPF, and SCR in the vehicle exhaust systems. Accordingly, those have been installed inside the muffler to save the space, and referred to the catalytic muffler. However, that has complex internal structure with perforated plate and pipe for noise and monolithic catalyst for emission reduction. For this reason, flow uniformity and pressure drop, which affect efficiency of catalyst and engine performance, respectively, should be examined when the catalytic muffler is designed. In this work, therefore, the flow uniformity and pressure drop to improve the performance of the catalytic converter and the engine have been numerically investigated by changing various design parameters such as inlet shape, porosity, and outlet shape of the muffler using the three-dimensional turbulent flow of the incompressible, non-reacting, and steady state inside the catalytic muffler. Finally, it can be found that the shape, in which the muffler has perforated pipe inside the inlet part, has higher uniformity index and lower pressure drop than others considered in this work.

Keywords: catalytic muffler, perforated inlet cone, catalysts, perforated pipe, flow uniformity, pressure drop

Procedia PDF Downloads 330
9401 Design and Implementation Guidance System of Guided Rocket RKX-200 Using Optimal Guidance Law

Authors: Amalia Sholihati, Bambang Riyanto Trilaksono

Abstract:

As an island nation, is a necessity for the Republic of Indonesia to have a capable military defense on land, sea or air that the development of military weapons such as rockets for air defense becomes very important. RKX rocket-200 is one of the guided missiles which are developed by consortium Indonesia and coordinated by LAPAN that serve to intercept the target. RKX-200 is designed to have the speed of Mach 0.5-0.9. RKX rocket-200 belongs to the category two-stage rocket that control is carried out on the second stage when the rocket has separated from the booster. The requirement for better performance to intercept missiles with higher maneuverability continues to push optimal guidance law development, which is derived from non-linear equations. This research focused on the design and implementation of a guidance system based OGL on the rocket RKX-200 while considering the limitation of rockets such as aerodynamic rocket and actuator. Guided missile control system has three main parts, namely, guidance system, navigation system and autopilot systems. As for other parts such as navigation systems and other supporting simulated on MATLAB based on the results of previous studies. In addition to using the MATLAB simulation also conducted testing with hardware-based ARM TWR-K60D100M conjunction with a navigation system and nonlinear models in MATLAB using Hardware-in-the-Loop Simulation (HILS).

Keywords: RKX-200, guidance system, optimal guidance law, Hils

Procedia PDF Downloads 257
9400 Tackling the Value-Action-Gap: Improving Civic Participation Using a Holistic Behavioral Model Approach

Authors: Long Pham, Julia Blanke

Abstract:

An increasingly popular way of establishing citizen engagement within communities is through ‘city apps’. Currently, most of these mobile applications seem to be extensions of the existing communication media, sometimes merely replicating the information available on the classical city web sites, and therefore provide minimal additional impact on citizen behavior and engagement. In order to overcome this challenge, we propose to use a holistic behavioral model to generate dynamic and contextualized app content based on optimizing well defined city-related performance goals constrained by the proposed behavioral model. In this paper, we will show how the data collected by the CorkCitiEngage project in the Irish city of Cork can be utilized to calibrate aspects of the proposed model enabling the design of a personalized citizen engagement app aiming at positively influencing people’s behavior towards more active participation in their communities. We will focus on the important aspect of intentions to act, which is essential for understanding the reasons behind the common value-action-gap being responsible for the mismatch between good intentions and actual observable behavior, and will discuss how customized app design can be based on a rigorous model of behavior optimized towards maximizing well defined city-related performance goals.

Keywords: city apps, holistic behaviour model, intention to act, value-action-gap, citizen engagement

Procedia PDF Downloads 230
9399 Method and Apparatus for Optimized Job Scheduling in the High-Performance Computing Cloud Environment

Authors: Subodh Kumar, Amit Varde

Abstract:

Typical on-premises high-performance computing (HPC) environments consist of a fixed number and a fixed set of computing hardware. During the design of the HPC environment, the hardware components, including but not limited to CPU, Memory, GPU, and networking, are carefully chosen from select vendors for optimal performance. High capital cost for building the environment is a prime factor influencing the design environment. A class of software called “Job Schedulers” are critical to maximizing these resources and running multiple workloads to extract the maximum value for the high capital cost. In principle, schedulers work by preventing workloads and users from monopolizing the finite hardware resources by queuing jobs in a workload. A cloud-based HPC environment does not have the limitations of fixed (type of and quantity of) hardware resources. In theory, users and workloads could spin up any number and type of hardware resource. This paper discusses the limitations of using traditional scheduling algorithms for cloud-based HPC workloads. It proposes a new set of features, called “HPC optimizers,” for maximizing the benefits of the elasticity and scalability of the cloud with the goal of cost-performance optimization of the workload.

Keywords: high performance computing, HPC, cloud computing, optimization, schedulers

Procedia PDF Downloads 96
9398 Tool Wear Analysis in 3D Manufactured Ti6AI4V

Authors: David Downey

Abstract:

With the introduction of additive manufacturing (3D printing) to produce titanium (Ti6Al4V) components in the medical/aerospace and automotive industries, intricate geometries can be produced with virtually complete design freedom. However, the consideration of microstructural anisotropy resulting from the additive manufacturing process becomes necessary due to this design flexibility and the need to print a geometric shape that can consist of numerous angles, radii, and swept surfaces. A femoral knee implant serves as an example of a 3D-printed near-net-shaped product. The mechanical properties of the printed components, and consequently, their machinability, are affected by microstructural anisotropy. Currently, finish-machining operations performed on titanium printed parts using selective laser melting (SLM) utilize the same cutting tools employed for processing wrought titanium components. Cutting forces for components manufactured through SLM can be up to 70% higher than those for their wrought counterparts made of Ti6Al4V. Moreover, temperatures at the cutting interface of 3D printed material can surpass those of wrought titanium, leading to significant tool wear. Although the criteria for tool wear may be similar for both 3D printed and wrought materials, the rate of wear during the machining process may differ. The impact of these issues on the choice of cutting tool material and tool lifetimes will be discussed.

Keywords: additive manufacturing, build orientation, microstructural anisotropy, printed titanium Ti6Al4V, tool wear

Procedia PDF Downloads 96
9397 The Effect of Nursing Teamwork Training on Nursing Teamwork Effectiveness

Authors: Manar Ahmed Elbadawy

Abstract:

Background: Empirical evidence suggested that improving nursing teamwork (NTW) may be the key to reducing medical error. The functioning nursing teams require open communication, mutual respect, and shared mental models to activate quality patient care. The complexity and the high demands for specialized nursing knowledge and skill also require nursing staff to consult with one another and work in teams regularly. The current study aimed to evaluate the effect of the nursing teamwork training program on nursing teamwork effectiveness. Design: A quasi-experimental (one group pretest-posttest) design was utilized. Three medical intensive care units at a teaching hospital affiliated to Cairo University Hospital, Egypt. Subjects: A convenient sample of 48 nursing staff worked at the selected units. The Nursing Teamwork Observational Checklist was used. Results: Total (NTW) mean scores exhibited quite elevation post-program implementation compared to preprogram and showed little decrease 3 months later ( = 2.52, SD = ± 0.27, mean % =51.98, = 2.72, SD = ± 0.20, mean %=72.45, = 2.67, SD = ± 0.11, mean %= 67.48 respectively). Conclusion: Implementation of (NTW) training program had a positive effect on increasing (NTW) effectiveness. Regular and frequent short-term teamwork training is important to be introduced as well as sustainable monitoring is required to ensure nursing attitudes, knowledge and skills’ change about teamwork effectiveness.

Keywords: effectiveness, nursing, teamwork, training

Procedia PDF Downloads 126
9396 Building Information Modelling-Based Diminished Reality Visualisation to Facilitate Building Renovation Projects

Authors: Roghieh Eskandari, Ali Motamedi

Abstract:

There is a significant demand for renovation as-built assets are aging. To plan for a desirable and comfortable indoor environment, stakeholders use simulation technics to assess potential renovation scenarios with the innovative designs. Diminished Reality (DR), which is a technique of visually removing unwanted objects from the real-world scene in real-time, can contribute to the renovation design visualization for stakeholders by removing existing structures and assets from the scene. Using DR, the objects to be demolished or changed will be visually removed from the scene for a better understanding of the intended design scenarios for stakeholders. This research proposes an integrated system for renovation plan visualization using Building Information Modelling (BIM) data and mixed reality (MR) technologies. It presents a BIM-based DR method that utilizes a textured BIM model of the environment to accurately register the virtual model of the occluded background to the physical world in real-time. This system can facilitate the simulation of the renovation plan by visually diminishing building elements in an indoor environment.

Keywords: diminished reality, building information modelling, mixed reality, stock renovation

Procedia PDF Downloads 118
9395 Plasma Ion Implantation Study: A Comparison between Tungsten and Tantalum as Plasma Facing Components

Authors: Tahreem Yousaf, Michael P. Bradley, Jerzy A. Szpunar

Abstract:

Currently, nuclear fusion is considered one of the most favorable options for future energy generation, due both to its abundant fuel and lack of emissions. For fusion power reactors, a major problem will be a suitable material choice for the Plasma Facing Components (PFCs) which will constitute the reactor first wall. Tungsten (W) has advantages as a PFC material because of its high melting point, low vapour pressure, high thermal conductivity and low retention of hydrogen isotopes. However, several adverse effects such as embrittlement, melting and morphological evolution have been observed in W when it is bombarded by low-energy and high-fluence helium (He) and deuterium (D) ions, as a simulation conditions adjacent to a fusion plasma. Recently, tantalum (Ta) also investigate as PFC and show better reluctance to nanostructure fuzz as compared to W under simulated fusion plasma conditions. But retention of D ions found high in Ta than W. Preparatory to plasma-based ion implantation studies, the effect of D and He ion impact on W and Ta is predicted by using the stopping and range of ions in the matter (SRIM) code. SRIM provided some theoretical results regarding projected range, ion concentration (at. %) and displacement damage (dpa) in W and Ta. The projected range for W under Irradiation of He and D ions with an energy of 3-keV and 1×fluence is determined 75Å and 135 Å and for Ta 85Å and 155Å, respectively. For both W and Ta samples, the maximum implanted peak for helium is predicted ~ 5.3 at. % at 12 nm and for De ions concentration peak is located near 3.1 at. % at 25 nm. For the same parameters, the displacement damage for He ions is observed in W ~ 0.65 dpa and Ta ~ 0.35 dpa at 5 nm. For D ions the displacement damage for W ~ 0.20 dpa at 8 nm and Ta ~ 0.175 dpa at 7 nm. The mean implantation depth is same for W and Ta, i.e. for He ions ~ 40 nm and D ions ~ 70 nm. From these results, we conclude that retention of D is high than He ions, but damage is low for Ta as compared to W. Further investigation still in progress regarding W and T.

Keywords: helium and deuterium ion impact, plasma facing components, SRIM simulation, tungsten, tantalum

Procedia PDF Downloads 135
9394 Design and Experimental Studies of a Centrifugal SWIRL Atomizer

Authors: Hemabushan K., Manikandan

Abstract:

In a swirl atomizer, fluid undergoes a swirling motion as a result of centrifugal force created by opposed tangential inlets in the swirl chamber. The angular momentum of fluid continually increases as it reaches the exit orifice and forms a hollow sheet. Which disintegrates to form ligaments and droplets respectively as it flows downstream. This type of atomizers used in rocket injectors and oil burner furnaces. In this present investigation a swirl atomizer with two opposed tangential inlets has been designed. Water as working fluid, experiments had been conducted for the fluid injection pressures in regime of 0.033 bar to 0.519 bar. The fluid has been pressured by a 0.5hp pump and regulated by a pressure regulator valve. Injection pressure of fluid has been measured by a U-tube mercury manometer. The spray pattern and the droplets has been captured with a high resolution camera in black background with a high intensity flash highlighting the fluid. The unprocessed images were processed in ImageJ processing software for measuring the droplet diameters and its shape characteristics along the downstream. The parameters such as mean droplet diameter and distribution, wave pattern, rupture distance and spray angle were studied for this atomizer. The above results were compared with theoretical results and also analysed for deviation with design parameters.

Keywords: swirl atomizer, injector, spray, SWIRL

Procedia PDF Downloads 495
9393 Assessing the Self-Directed Learning Skills of the Undergraduate Nursing Students in a Medical University in Bahrain: A Quantitative Study

Authors: Catherine Mary Abou-Zaid

Abstract:

This quantitative study discusses the concerns with the self-directed learning (SDL) skills of the undergraduate nursing students in a medical university in Bahrain. The nursing undergraduate student SDL study was conducted taking all 4 years and compiling data collected from the students themselves by survey questionnaire. The aim of the study is to understand and change the attitudes of self-directed learning among the undergraduate students. The SDL of the undergraduate student nurses has been noticed to be lacking and motivation to actually perform without supervision while out-with classrooms are very low. Their use of the resources available on the virtual learning environment and also within the university is not as good as it should be for a university student at this level. They do not use them to their own advantage. They are not prepared for the transition from high school to an academic environment such as a university or college. For some students it is the first time in their academic lives that they have faced sharing a classroom with the opposite sex. For some this is a major issue and we as academics need to be aware of all issues that they come to higher education with. Design Methodology: The design methodology that was chosen was a quantitative design using convenience sampling of the students who would be asked to complete survey questionnaire. This sampling method was chosen because of the time constraint. This was completed by the undergraduate students themselves while in class. The questionnaire was analyzed by the statistical package for social sciences (SPSS), the results interpreted by the researcher and the findings published in the paper. The analyzed data will also be reported on and from this information we as educators will be able to see the student’s weaknesses regarding self-directed learning. The aims and objectives of the research will be used as recommendations for the improvement of resources for the students to improve their SDL skills. Conclusion: The results will be able to give the educators an insight to how we can change the self-directed learning techniques of the students and enable them to embrace the skills and to focus more on being self-directed in their studies rather than having to be put on to a SDL pathway from the educators themselves. This evidence will come from the analysis of the statistical data. It may even change the way in which the students are selected for the nursing programme. These recommendations will be reported to the head of school and also to the nursing faculty.

Keywords: self-directed learning, undergraduate students, transition, statistical package for social sciences (SPSS), higher education

Procedia PDF Downloads 320
9392 Embedded Hardware and Software Design of Omnidirectional Autonomous Robotic Platform Suitable for Advanced Driver Assistance Systems Testing with Focus on Modularity and Safety

Authors: Ondrej Lufinka, Jan Kaderabek, Juraj Prstek, Jiri Skala, Kamil Kosturik

Abstract:

This paper deals with the problem of using Autonomous Robotic Platforms (ARP) for the ADAS (Advanced Driver Assistance Systems) testing in automotive. There are different possibilities of the testing already in development, and lately, the autonomous robotic platforms are beginning to be used more and more widely. Autonomous Robotic Platform discussed in this paper explores the hardware and software design possibilities related to the field of embedded systems. The paper focuses on its chapters on the introduction of the problem in general; then, it describes the proposed prototype concept and its principles from the embedded HW and SW point of view. It talks about the key features that can be used for the innovation of these platforms (e.g., modularity, omnidirectional movement, common and non-traditional sensors used for localization, synchronization of more platforms and cars together, or safety mechanisms). In the end, the future possible development of the project is discussed as well.

Keywords: advanced driver assistance systems, ADAS, autonomous robotic platform, embedded systems, hardware, localization, modularity, multiple robots synchronization, omnidirectional movement, safety mechanisms, software

Procedia PDF Downloads 147
9391 Design and Construction of Models of Sun Tracker or Sun Tracking System for Light Transmission

Authors: Mohsen Azarmjoo, Yasaman Azarmjoo, Zahra Alikhani Koopaei

Abstract:

This article introduces devices that can transfer sunlight to buildings that do not have access to direct sunlight during the day. The transmission and reflection of sunlight are done through the movement of movable mirrors. The focus of this article is on two models of sun tracker systems designed and built by the Macad team. In fact, this article will reveal the distinction between the two Macad devices and the previously built competitor device. What distinguishes the devices built by the Macad team from the competitor's device is the different mode of operation and the difference in the location of the sensors. Given that the devices have the same results, the Macad team has tried to reduce the defects of the competitor's device as much as possible. The special feature of the second type of device built by the Macad team has enabled buildings with different construction positions to use sun tracking systems. This article will also discuss diagrams of the path of sunlight transmission and more details of the device. It is worth mentioning that fixed mirrors are also placed next to the main devices. So that the light shining on the first device is reflected to these mirrors, this light is guided within the light receiver space and is transferred to the different parts around by steel sheets built in the light receiver space, and finally, these spaces benefit from sunlight.

Keywords: design, construction, mechatronic device, sun tracker system, sun tracker, sunlight

Procedia PDF Downloads 88
9390 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 145
9389 Ethnolinguistic Otherness: The Vedda Language (Baasapojja) of Indigenous Adivasi (Veddas) of Dambana in Sri Lanka

Authors: Nimasha Malalasekera

Abstract:

Working with the indigenous Adivasi (Vedda) community of Dambana in the district of Badulla in Sri Lanka, this research documents linguistic data to address language and cultural endangerment. The ancestral language of Adivasi has undergone sustained restructuration over a long historical period due to its contact with Sinhala, an Indo-Aryan language spoken by the majority Sinhalese. The Vedda language is highly endangered today. At present, all speakers of the Vedda language spoken in Dambana are Adivasi men in the parent generation, who are Sinhala-Vedda bilinguals. Adivasi women and children do not speak the Vedda language but Sinhala in everyday life. Women can understand the Vedda language and would respond to a Vedda language utterance in Sinhala. The use of the Vedda language is largely restricted to self-ascribing Adivasi men who employ it in the context of cultural tourism in Dambana to index ethnolinguistic otherness. Adivasi of Dambana often refers to this distinct linguistic code that they speak as baasapojja or language. This research employs a cooperative model of ethnographic documentation to explore the interrelations between discursive practices, linguistic structures, and linguistic (and broader sociocultural) ideologies in this community. The Vedda language has been previously identified as a dialect of Sinhala or a creole emerging in the contact between Sinhala and the ancestral Vedda language. This paper analyzes the current language endangerment context of bilingual Adivasi members that allows the birth of a mixed language. The aim of this research is to preserve ongoing linguistic innovation among this endangered language speech community. It contributes to the appreciation of creative cultural and linguistic production of a stigmatized minuscule indigenous community of South Asia that strives to assert a distinct linguistic and cultural identity from the dominant populations.

Keywords: Vedda language, language endangerment, mixed languages, indigenous identity

Procedia PDF Downloads 109
9388 Formula Student Car: Design, Analysis and Lap Time Simulation

Authors: Rachit Ahuja, Ayush Chugh

Abstract:

Aerodynamic forces and moments, as well as tire-road forces largely affects the maneuverability of the vehicle. Car manufacturers are largely fascinated and influenced by various aerodynamic improvements made in formula cars. There is constant effort of applying these aerodynamic improvements in road vehicles. In motor racing, the key differentiating factor in a high performance car is its ability to maintain highest possible acceleration in appropriate direction. One of the main areas of concern in motor racing is balance of aerodynamic forces and stream line the flow of air across the body of the vehicle. At present, formula racing cars are regulated by stringent FIA norms, there are constrains for dimensions of the vehicle, engine capacity etc. So one of the fields in which there is a large scope of improvement is aerodynamics of the vehicle. In this project work, an attempt has been made to design a formula- student (FS) car, improve its aerodynamic characteristics through steady state CFD simulations and simultaneously calculate its lap time. Initially, a CAD model of a formula student car is made using SOLIDWORKS as per the given dimensions and a steady-state external air-flow simulation is performed on the baseline model of the formula student car without any add on device to evaluate and analyze the air-flow pattern around the car and aerodynamic forces using FLUENT Solver. A detailed survey on different add-on devices used in racing application like: - front wing, diffuser, shark pin, T- wing etc. is made and geometric model of these add-on devices are created. These add-on devices are assembled with the baseline model. Steady state CFD simulations are done on the modified car to evaluate the aerodynamic effects of these add-on devices on the car. Later comparison of lap time simulation of the formula student car with and without the add-on devices is done with the help of MATLAB. Aerodynamic performances like: - lift, drag and their coefficients are evaluated for different configuration and design of the add-on devices at different speed of the vehicle. From parametric CFD simulations on formula student car attached with add-on devices, there is a considerable amount of drag and lift force reduction besides streamlining the airflow across the car. The best possible configuration of these add-on devices is obtained from these CFD simulations and also use of these add-on devices have shown an improvement in performance of the car which can be compared by various lap time simulations of the car.

Keywords: aerodynamic performance, front wing, laptime simulation, t-wing

Procedia PDF Downloads 200
9387 Morphometry of Cervical Spinal Cord in Rabbit Using Design-Based Stereology

Authors: Hamed Chavoshi Pour, Javad Sadeghinejad

Abstract:

The spinal cord is a long structure that starts at the end of the medulla oblongata and is located within the vertebral canal. Physiologically, the spinal cord connects the brain with the peripheral nervous system for sensory and motor activities. The cervical spinal cord is an area of particular interest in medicine and veterinary medicine due to the high prevalence of diseases in this region. This study describes the morphometric features of the cervical spinal cord in rabbits using design-unbiased stereology. The cervical spinal cords of five male rabbits were dissected, and slabs were taken according to systematic uniform random sampling. Each slab was embedded in paraffin and cut into a 6-µm thick section, and stained with cresyl violet 0.1% for stereological estimations. The total spinal cord volume, volume fraction of grey and white matter, and also dorsal and ventral horns were estimated using point counting and Cavalieri's estimator. The total cervical spinal cord volume was 0.98 ± 0.07 cm³. The relative volume of white matter and grey matter was 70.6 ± 1.7% and 29.31 ± 1.67%, respectively. The dorsal horn and ventral horn volume were 13.86 ± 1.36% and 14.9 ± 0.62% of the whole cervical spinal cord. This knowledge of rabbit spinal cord findings may serve as a foundation for a translational model in spinal cord experimental research and provide basic findings for the diagnosis and treatment of spinal cord disorders.

Keywords: stereology, spinal cord, rabbit, cervical

Procedia PDF Downloads 80
9386 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 145
9385 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 147
9384 Failure Analysis and Verification Using an Integrated Method for Automotive Electric/Electronic Systems

Authors: Lei Chen, Jian Jiao, Tingdi Zhao

Abstract:

Failures of automotive electric/electronic systems, which are universally considered to be safety-critical and software-intensive, may cause catastrophic accidents. Analysis and verification of failures in these kinds of systems is a big challenge with increasing system complexity. Model-checking is often employed to allow formal verification by ensuring that the system model conforms to specified safety properties. The system-level effects of failures are established, and the effects on system behavior are observed through the formal verification. A hazard analysis technique, called Systems-Theoretic Process Analysis, is capable of identifying design flaws which may cause potential failure hazardous, including software and system design errors and unsafe interactions among multiple system components. This paper provides a concept on how to use model-checking integrated with Systems-Theoretic Process Analysis to perform failure analysis and verification of automotive electric/electronic systems. As a result, safety requirements are optimized, and failure propagation paths are found. Finally, an automotive electric/electronic system case study is used to verify the effectiveness and practicability of the method.

Keywords: failure analysis and verification, model checking, system-theoretic process analysis, automotive electric/electronic system

Procedia PDF Downloads 126
9383 Comparative Mesh Sensitivity Study of Different Reynolds Averaged Navier Stokes Turbulence Models in OpenFOAM

Authors: Zhuoneng Li, Zeeshan A. Rana, Karl W. Jenkins

Abstract:

In industry, to validate a case, often a multitude of simulation are required and in order to demonstrate confidence in the process where users tend to use a coarser mesh. Therefore, it is imperative to establish the coarsest mesh that could be used while keeping reasonable simulation accuracy. To date, the two most reliable, affordable and broadly used advanced simulations are the hybrid RANS (Reynolds Averaged Navier Stokes)/LES (Large Eddy Simulation) and wall modelled LES. The potentials in these two simulations will still be developed in the next decades mainly because the unaffordable computational cost of a DNS (Direct Numerical Simulation). In the wall modelled LES, the turbulence model is applied as a sub-grid scale model in the most inner layer near the wall. The RANS turbulence models cover the entire boundary layer region in a hybrid RANS/LES (Detached Eddy Simulation) and its variants, therefore, the RANS still has a very important role in the state of art simulations. This research focuses on the turbulence model mesh sensitivity analysis where various turbulence models such as the S-A (Spalart-Allmaras), SSG (Speziale-Sarkar-Gatski), K-Omega transitional SST (Shear Stress Transport), K-kl-Omega, γ-Reθ transitional model, v2f are evaluated within the OpenFOAM. The simulations are conducted on a fully developed turbulent flow over a flat plate where the skin friction coefficient as well as velocity profiles are obtained to compare against experimental values and DNS results. A concrete conclusion is made to clarify the mesh sensitivity for different turbulence models.

Keywords: mesh sensitivity, turbulence models, OpenFOAM, RANS

Procedia PDF Downloads 264
9382 Technique and Use of Machine Readable Dictionary: In Special Reference to Hindi-Marathi Machine Translation

Authors: Milind Patil

Abstract:

Present paper is a discussion on Hindi-Marathi Morphological Analysis and generating rules for Machine Translation on the basis of Machine Readable Dictionary (MRD). This used Transformative Generative Grammar (TGG) rules to design the MRD. As per TGG rules, the suffix of a particular root word is based on its Tense, Aspect, Modality and Voice. That's why the suffix is very important for the word meanings (or root meanings). The Hindi and Marathi Language both have relation with Indo-Aryan language family. Both have been derived from Sanskrit language and their script is 'Devnagari'. But there are lots of differences in terms of semantics and grammatical level too. In Marathi, there are three genders, but in Hindi only two (Masculine and Feminine), the Natural gender is absent in Hindi. Likewise other grammatical categories also differ in their level of use. For MRD the suffixes (or Morpheme) are of particular root word for GNP (Gender, Number and Person) are based on its natural phenomena. A particular Suffix and Morphine change as per the need of person, number and gender. The design of MRD also based on this format. In first, Person, Number, Gender and Tense are key points than root words and suffix of particular Person, Number Gender (PNG). After that the inferences are drawn on the basis of rules that is (V.stem) (Pre.T/Past.T) (x) + (Aux-Pre.T) (x) → (V.Stem.) + (SP.TM) (X).

Keywords: MRD, TGG, stem, morph, morpheme, suffix, PNG, TAM&V, root

Procedia PDF Downloads 326
9381 From Makers to Maker Communities: A Survey on Turkish Makerspaces

Authors: Dogan Can Hatunoglu, Cengiz Hakan Gurkanlı, Hatice Merve Demirci

Abstract:

Today, the maker movement is regarded as a socio-cultural movement that represents designing and building objects for innovations. In these creativity-based activities of the movement, individuals from different backgrounds such as; inventors, programmers, craftspeople, DIY’ers, tinkerers, engineers, designers, and hackers, form a community and work collaboratively for mutual, open-source innovations. Today, with the accessibility of recently emerged technologies and digital fabrication tools, the Maker Movement is continuously expanding its scope and has evolved into a new experience, and for many, it is now considered as new kind of industrial revolution. In this new experience, makers create new things within their community by using new digital tools and technologies in spots called makerspaces. In these makerspaces, activities of learning, experience sharing, and mentoring are evolved into maker events. Makers who share common interests in making benefit from makerspaces as meeting and working spots. In literature, there are many sources on Maker Movement, maker communities, and their activities, especially in the field of business administration. However, there is a gap in the literature about the maker communities in Turkey. This research aims to be an information source on the dynamics and process design of “making” activities in Turkish maker communities and also aims to provide insights to sustain and enhance local maker communities in the future. Within this aim, semi-structured interviews were conducted with founders and facilitators from selected Turkish maker communities. (1) The perception towards Maker Movement, makers, activity of making, and current situation of maker communities, (2) motivations of individuals who participate the maker communities, and (3) key drivers (collaboration and decision-making in design processes) of maker activities from the perspectives of main actors (founders, facilitators) are all examined deeply with question on personal experiences and perspectives. After a qualitative approached data analysis concerning the maker communities in Turkey, this research reveals that there are two main conclusions regarding (1) the foundation of the Turkish maker mindset and (2) emergence of self-sustaining communities.

Keywords: Maker Movement, maker community, makerspaces, open-source design, sustainability

Procedia PDF Downloads 147
9380 Technical Evaluation of Upgrading a Simple Gas Turbine Fired by Diesel to a Combined Cycle Power Plant in Kingdom of Suadi Arabistan Using WinSim Design II Software

Authors: Salman Obaidoon, Mohamed Hassan, Omer Bakather

Abstract:

As environmental regulations increase, the need for a clean and inexpensive energy is becoming necessary these days using an available raw material with high efficiency and low emissions of toxic gases. This paper presents a study on modifying a gas turbine power plant fired by diesel, which is located in Saudi Arabia in order to increase the efficiency and capacity of the station as well as decrease the rate of emissions. The studied power plant consists of 30 units with different capacities and total net power is 1470 MW. The study was conducted on unit number 25 (GT-25) which produces 72.3 MW with 29.5% efficiency. In the beginning, the unit was modeled and simulated by using WinSim Design II software. In this step, actual unit data were used in order to test the validity of the model. The net power and efficiency obtained from software were 76.4 MW and 32.2% respectively. A difference of about 6% was found in the simulated power plant compared to the actual station which means that the model is valid. After the validation of the model, the simple gas turbine power plant was converted to a combined cycle power plant (CCPP). In this case, the exhausted gas released from the gas turbine was introduced to a heat recovery steam generator (HRSG), which consists of three heat exchangers: an economizer, an evaporator and a superheater. In this proposed model, many scenarios were conducted in order to get the optimal operating conditions. The net power of CCPP was increased to 116.4 MW while the overall efficiency of the unit was reached to 49.02%, consuming the same amount of fuel for the gas turbine power plant. For the purpose of comparing the rate of emissions of carbon dioxide on each model. It was found that the rate of CO₂ emissions was decreased from 15.94 kg/s to 9.22 kg/s by using the combined cycle power model as a result of reducing of the amount of diesel from 5.08 kg/s to 2.94 kg/s needed to produce 76.5 MW. The results indicate that the rate of emissions of carbon dioxide was decreased by 42.133% in CCPP compared to the simple gas turbine power plant.

Keywords: combined cycle power plant, efficiency, heat recovery steam generator, simulation, validation, WinSim design II software

Procedia PDF Downloads 277
9379 Integration of Load Introduction Elements into Fabrics

Authors: Jan Schwennen, Harlad Schmid, Juergen Fleischer

Abstract:

Lightweight design plays an important role in the automotive industry. Especially the combination of metal and CFRP shows great potential for future vehicle concepts. This requires joining technologies that are cost-efficient and appropriate for the materials involved. Previous investigations show that integrating load introduction elements during CFRP part manufacturing offers great advantages in mechanical performance. However, it is not yet clear how to integrate the elements in an automated process without harming the fiber structure. In this paper, a test rig is build up to investigate the effect of different parameters during insert integration experimentally. After a short description of the experimental equipment, preliminary tests are performed to determine a set of important process parameters. Based on that, the planning of design of experiments is given. The interpretation and evaluation of the test results show that with a minimization of the insert diameter and the peak angle less harm on the fiber structure can be achieved. Furthermore, a maximization of the die diameter above the insert shows a positive effect on the fiber structure. At the end of this paper, a theoretical description of alternative peak shaping is given and then the results get validated on the basis of an industrial reference part.

Keywords: CFRP, fabrics, insert, load introduction element, integration

Procedia PDF Downloads 246
9378 Hydraulic Conductivity Prediction of Cement Stabilized Pavement Base Incorporating Recycled Plastics and Recycled Aggregates

Authors: Md. Shams Razi Shopnil, Tanvir Imtiaz, Sabrina Mahjabin, Md. Sahadat Hossain

Abstract:

Saturated hydraulic conductivity is one of the most significant attributes of pavement base course. Determination of hydraulic conductivity is a routine procedure for regular aggregate base courses. However, in many cases, a cement-stabilized base course is used with compromised drainage ability. Traditional hydraulic conductivity testing procedure is a readily available option which leads to two consequential drawbacks, i.e., the time required for the specimen to be saturated and extruding the sample after completion of the laboratory test. To overcome these complications, this study aims at formulating an empirical approach to predicting hydraulic conductivity based on Unconfined Compressive Strength test results. To do so, this study comprises two separate experiments (Constant Head Permeability test and Unconfined Compressive Strength test) conducted concurrently on a specimen having the same physical credentials. Data obtained from the two experiments were then used to devise a correlation between hydraulic conductivity and unconfined compressive strength. This correlation in the form of a polynomial equation helps to predict the hydraulic conductivity of cement-treated pavement base course, bypassing the cumbrous process of traditional permeability and less commonly used horizontal permeability tests. The correlation was further corroborated by a different set of data, and it has been found that the derived polynomial equation is deemed to be a viable tool to predict hydraulic conductivity.

Keywords: hydraulic conductivity, unconfined compressive strength, recycled plastics, recycled concrete aggregates

Procedia PDF Downloads 94
9377 Research on the Influence of Robot Teaching on the Creativity of Primary and Secondary School Students under the Background of STEM Education

Authors: Chu Liu

Abstract:

With the development of society and the changes of the times, the requirements for the cultivation of learners are different. In the 21st century, STEM education has become a boom in the development of education in various countries, aiming to improve the comprehensive ability of learners in science, technology, engineering, and mathematics. The rise of robot education provides an effective way for STEM education to cultivate computational thinking ability, interdisciplinary ability, problem-solving ability, and teamwork ability. Although robot education has been developed in China for several years, it still lacks a standard curriculum system. This article uses programming software as a platform, through the research and analysis of 'Basic Education Information Technology Curriculum Standards (2012 Edition)', combines with the actual learning situation of learners, tries to conduct teaching project design research, and aims at providing references for the teaching ideas and method of robot education courses. In contemporary society, technological advances increasingly require creativity. Innovative comprehensive talents urgently need a radical and effective education reform to keep up with social changes. So in this context, robot teaching design can be used for students. The tendency of creativity to influence is worth to be verified.

Keywords: STEM education, robot teaching, primary and secondary school students, tendency of creativity

Procedia PDF Downloads 123
9376 Persian Garden Design and Climate Case Studies: Shahzadeh-Mahan and Shah Garden

Authors: Raheleh Saifiabolhassan

Abstract:

Gardens symbolize human effort to bring Eden to earth and are defined as the purest pleasures and the greatest inspiration for men. According to Persian mythology, a garden called "Paris" is a magical, perfumed place populated by beautiful and angelic creatures. "Pardis" comes from the word "paridaiza," which means "walled garden." Gardening has always been a worldwide attraction due to the abundance of green space, and desert gardens are no exception. Because most historical garden designs use a similar pattern, such as Chahar-Bagh, climate effects have not been considered. The purpose of studying these general designs was to determine whether location and weather conditions are affecting them. So, two gardens were chosen for comparison: a desert (Shahzadeh-Mahan) and a humid garden (Shah) and compared their geometry, irrigation system, entrances, and pavilions. The findings of the study revealed that there are several notable differences among their architectural principles. For example, the desert garden design is introverted with transparent surfaces and a single focal point, while the moderate garden is extraverted with high complexity and multiple perspectives. In conclusion, the study recognizes the richness and significance of the Persian garden concept, which can be applied in many different contexts.

Keywords: Pardis, Chahar-bagh, Persian garden, temperate, humid climate, geometry, pavilion, irrigations, culture

Procedia PDF Downloads 215
9375 Developing Proof Demonstration Skills in Teaching Mathematics in the Secondary School

Authors: M. Rodionov, Z. Dedovets

Abstract:

The article describes the theoretical concept of teaching secondary school students proof demonstration skills in mathematics. It describes in detail different levels of mastery of the concept of proof-which correspond to Piaget’s idea of there being three distinct and progressively more complex stages in the development of human reflection. Lessons for each level contain a specific combination of the visual-figurative components and deductive reasoning. It is vital at the transition point between levels to carefully and rigorously recalibrate teaching to reflect the development of more complex reflective understanding. This can apply even within the same age range, since students will develop at different speeds and to different potential. The authors argue that this requires an aware and adaptive approach to lessons to reflect this complexity and variation. The authors also contend that effective teaching which enables students to properly understand the implementation of proof arguments must develop specific competences. These are: understanding of the importance of completeness and generality in making a valid argument; being task focused; having an internalised locus of control and being flexible in approach and evaluation. These criteria must be correlated with the systematic application of corresponding methodologies which are best likely to achieve success. The particular pedagogical decisions which are made to deliver this objective are illustrated by concrete examples from the existing secondary school mathematics courses. The proposed theoretical concept formed the basis of the development of methodological materials which have been tested in 47 secondary schools.

Keywords: education, teaching of mathematics, proof, deductive reasoning, secondary school

Procedia PDF Downloads 245
9374 Case Study of Human Factors and Ergonomics in the Design and Use of Harness-Embedded Costumes in the Entertainment Industry

Authors: Marielle Hanley, Brandon Takahashi, Gerry Hanley, Gabriella Hancock

Abstract:

Safety harnesses and their protocols are very common within the construction industry, and the Occupational Safety and Health Administration has provided extensive guidelines with protocols being constantly updated to ensure the highest level of safety within construction sites. There is also extensive research on harnesses that are meant to keep people in place in moving vehicles, such as seatbelts. Though this research is comprehensive in these areas, the findings and recommendations are not generally applicable to other industry sectors where harnesses are used, such as the entertainment industry. The focus of this case study is on the design and use of harnesses used by theme park employees wearing elaborate costumes in parades and performances. The key factors of posture, kinesthetic factors, and harness engineering interact in significantly different ways when the user is performing repetitive choreography with 20 to 40 lbs. of apparatus connected to harnesses that need to be hidden from the audience’s view. Human factors and ergonomic analysis take into account the required performers’ behaviors, the physical and mental preparation and posture of the performer, the design of the harness-embedded costume, and the environmental conditions during the performance (e.g., wind) that can determine the physical stresses placed on the harness and performer. The uniqueness and expense of elaborate costumes frequently result in one or two costumes created for production, and a variety of different performers need to fit into the same costume. Consequently, the harnesses should be adjustable if they are to minimize the physical and cognitive loads on the performer, but they are frequently more a “one-size fits all”. The complexity of human and technology interactions produces a range of detrimental outcomes, from muscle strains to nerve damage, mental and physical fatigue, and reduced motivation to perform at peak levels. Based on observations conducted over four years for this case study, a number of recommendations to institutionalize the human factors and ergonomic analyses can significantly improve the safety, reliability, and quality of performances with harness-embedded costumes in the entertainment industry. Human factors and ergonomic analyses can be integrated into the engineering design of the performance costumes with embedded harnesses, the conditioning and training of the performers using the costumes, the choreography of the performances within the staged setting and the maintenance of the harness-embedded costumes. By applying human factors and ergonomic methodologies in the entertainment industry, the industry management and support staff can significantly reduce the risks of injury, improve the longevity of unique performers, increase the longevity of the harness-embedded costumes, and produce the desired entertainment value for audiences.

Keywords: ergonomics in entertainment industry, harness-embedded costumes, performer safety, injury prevention

Procedia PDF Downloads 96