Search results for: embedded ARM7 processor
608 Meticulous Doxorubicin Release from pH-Responsive Nanoparticles Entrapped within an Injectable Thermoresponsive Depot
Authors: Huayang Yu, Nicola Ingram, David C. Green, Paul D. Thornton
Abstract:
The dual stimuli-controlled release of doxorubicin from gel-embedded nanoparticles is reported. Non-cytotoxic polymer nanoparticles are formed from poly(ethylene glycol)-b-poly(benzyl glutamate) that, uniquely, contain a central ester link. This connection renders the nanoparticles pH-responsive, enabling extensive doxorubicin release in acidic solutions (pH 6.5), but not in solutions of physiological pH (pH 7.4). Doxorubicin loaded nanoparticles were found to be stable for at least 31 days and lethal against the three breast cancer cell lines tested. Furthermore, doxorubicin-loaded nanoparticles could be incorporated within a thermoresponsive poly(2-hydroxypropyl methacrylate) gel depot, which forms immediately upon injection of poly(2-hydroxypropyl methacrylate) into aqueous solution. The combination of the poly(2-hydroxypropyl methacrylate) gel and poly(ethylene glycol)-b-poly(benzyl glutamate) nanoparticles yields an injectable doxorubicin delivery system that facilities near-complete drug release when maintained at elevated temperatures (37 °C) in acidic solution (pH 6.5). In contrast, negligible payload release occurs when the material is stored at room temperature in a non-acidic solution (pH 7.4). The system has great potential as a vehicle for the prolonged, site-specific release of chemotherapeutics.Keywords: biodegradable, nanoparticle, polymer, thermoresponsive
Procedia PDF Downloads 136607 Development of Colorimetric Based Microfluidic Platform for Quantification of Fluid Contaminants
Authors: Sangeeta Palekar, Mahima Rana, Jayu Kalambe
Abstract:
In this paper, a microfluidic-based platform for the quantification of contaminants in the water is proposed. The proposed system uses microfluidic channels with an embedded environment for contaminants detection in water. Microfluidics-based platforms present an evident stage of innovation for fluid analysis, with different applications advancing minimal efforts and simplicity of fabrication. Polydimethylsiloxane (PDMS)-based microfluidics channel is fabricated using a soft lithography technique. Vertical and horizontal connections for fluid dispensing with the microfluidic channel are explored. The principle of colorimetry, which incorporates the use of Griess reagent for the detection of nitrite, has been adopted. Nitrite has high water solubility and water retention, due to which it has a greater potential to stay in groundwater, endangering aquatic life along with human health, hence taken as a case study in this work. The developed platform also compares the detection methodology, containing photodetectors for measuring absorbance and image sensors for measuring color change for quantification of contaminants like nitrite in water. The utilization of image processing techniques offers the advantage of operational flexibility, as the same system can be used to identify other contaminants present in water by introducing minor software changes.Keywords: colorimetric, fluid contaminants, nitrite detection, microfluidics
Procedia PDF Downloads 198606 Identity Management in Virtual Worlds Based on Biometrics Watermarking
Authors: S. Bader, N. Essoukri Ben Amara
Abstract:
With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world
Procedia PDF Downloads 265605 Visualizing the Commercial Activity of a City by Analyzing the Data Information in Layers
Authors: Taras Agryzkov, Jose L. Oliver, Leandro Tortosa, Jose Vicent
Abstract:
This paper aims to demonstrate how network models can be used to understand and to deal with some aspects of urban complexity. As it is well known, the Theory of Architecture and Urbanism has been using for decades’ intellectual tools based on the ‘sciences of complexity’ as a strategy to propose theoretical approaches about cities and about architecture. In this sense, it is possible to find a vast literature in which for instance network theory is used as an instrument to understand very diverse questions about cities: from their commercial activity to their heritage condition. The contribution of this research consists in adding one step of complexity to this process: instead of working with one single primal graph as it is usually done, we will show how new network models arise from the consideration of two different primal graphs interacting in two layers. When we model an urban network through a mathematical structure like a graph, the city is usually represented by a set of nodes and edges that reproduce its topology, with the data generated or extracted from the city embedded in it. All this information is normally displayed in a single layer. Here, we propose to separate the information in two layers so that we can evaluate the interaction between them. Besides, both layers may be composed of structures that do not have to coincide: from this bi-layer system, groups of interactions emerge, suggesting reflections and in consequence, possible actions.Keywords: graphs, mathematics, networks, urban studies
Procedia PDF Downloads 180604 Uncovering Underwater Communication for Multi-Robot Applications via CORSICA
Authors: Niels Grataloup, Micael S. Couceiro, Manousos Valyrakis, Javier Escudero, Patricia A. Vargas
Abstract:
This paper benchmarks the possible underwater communication technologies that can be integrated into a swarm of underwater robots by proposing an underwater robot simulator named CORSICA (Cross platfORm wireleSs communICation simulator). Underwater exploration relies increasingly on the use of mobile robots, called Autonomous Underwater Vehicles (AUVs). These robots are able to reach goals in harsh underwater environments without resorting to human divers. The introduction of swarm robotics in these scenarios would facilitate the accomplishment of complex tasks with lower costs. However, swarm robotics requires implementation of communication systems to be operational and have a non-deterministic behaviour. Inter-robot communication is one of the key challenges in swarm robotics, especially in underwater scenarios, as communication must cope with severe restrictions and perturbations. This paper starts by presenting a list of the underwater propagation models of acoustic and electromagnetic waves, it also reviews existing transmitters embedded in current robots and simulators. It then proposes CORSICA, which allows validating the choices in terms of protocol and communication strategies, whether they are robot-robot or human-robot interactions. This paper finishes with a presentation of possible integration according to the literature review, and the potential to get CORSICA at an industrial level.Keywords: underwater simulator, robot-robot underwater communication, swarm robotics, transceiver and communication models
Procedia PDF Downloads 300603 Domain Driven Design vs Soft Domain Driven Design Frameworks
Authors: Mohammed Salahat, Steve Wade
Abstract:
This paper presents and compares the SSDDD “Systematic Soft Domain Driven Design Framework” to DDD “Domain Driven Design Framework” as a soft system approach of information systems development. The framework use SSM as a guiding methodology within which we have embedded a sequence of design tasks based on the UML leading to the implementation of a software system using the Naked Objects framework. This framework has been used in action research projects that have involved the investigation and modelling of business processes using object-oriented domain models and the implementation of software systems based on those domain models. Within this framework, Soft Systems Methodology (SSM) is used as a guiding methodology to explore the problem situation and to develop the domain model using UML for the given business domain. The framework is proposed and evaluated in our previous works, a comparison between SSDDD and DDD is presented in this paper, to show how SSDDD improved DDD as an approach to modelling and implementing business domain perspectives for Information Systems Development. The comparison process, the results, and the improvements are presented in the following sections of this paper.Keywords: domain-driven design, soft domain-driven design, naked objects, soft language
Procedia PDF Downloads 298602 The Optimal Location of Brickforce in Brickwork
Authors: Sandile Daniel Ngidi
Abstract:
A brickforce is a product consisting of two main parallel wires joined by in-line welded cross wires. Embedded in the normal thickness of the brickwork joint, the wires are manufactured to a flattened profile to simplify location into the mortar joint without steel build-up problems at lap positions corners/junctions or when used in conjunction with wall ties. A brickforce has been in continuous use since 1918. It is placed in the cement between courses of bricks. Brickforce is used in every course of the foundations and every course above lintel height. Otherwise, brickforce is used every fourth course in between the foundations and lintel height or a concrete slab and lintel height. The brickforce strengthens and stabilizes the wall, especially if you are building on unstable ground. It provides brickwork increased resistance to tensional stresses. Brickforce uses high tensile steel wires, which can withstand high forces but with a very little stretch. This helps to keep crack widths to a minimum. Recently a debate has opened about the purpose of using brickforce in single-story buildings. The debate has been compounded by the fact that there is no consensus about the spacing of brickforce in brickwork or masonry. In addition, very little information had been published on the relative merits of using the same size of brickforce for the different atmospheric conditions in South Africa. This paper aims to compare different types of brickforce systems used in different countries. Conclusions are made to identify the point and location of brickforce that optimize the system.Keywords: brickforce, masonry concrete, reinforcement, strengthening, wall panels
Procedia PDF Downloads 230601 Utilization of Solid Waste Materials to Produce Glass-Ceramic Tiles
Authors: Sonjida Mustafia
Abstract:
Glass-ceramic is a material that contains both the properties of glass and ceramic within. They always contain a residual glassy phase and one or more embedded crystalline phases. Ceramic tiles are very popular in the world because of their high structural strength, low absorption, increased hygiene, and hot and cold insulation. Glass-ceramic materials are used to produce marble-like floor and wall tiles. There are a huge amount of waste materials like rice husk ash (RHA), waste iron, waste glass, and other industrial solid waste in Bangladesh, which can be used to produce glass-ceramic floor and wall tiles. The raw materials (rice husk ash, waste glass, and k-feldspar) are a mixture, and the mixture is melted to form glass frit at 1175°C. The frits are grained to require fine particle size. The powder is moistened in 7-8% water with sodium silicate. The green glass-ceramic tiles were fired at different temperatures (800–1100°C) for a soaking time of 1 hour to form glass-ceramic tiles and to study the sintering-crystallization process. The results reveal that the modulus of rupture increases with increasing sintering temperature and reaches the highest value (95.25Mpa) at 925°C. Glossiness and linear shrinkage increase with increasing temperature.Keywords: rice husk ash, waste glass, glass-ceramic, modulus of rupture, glossiness, linear shrinkage, micro-structure
Procedia PDF Downloads 93600 Morphometry of Cervical Spinal Cord in Rabbit Using Design-Based Stereology
Authors: Hamed Chavoshi Pour, Javad Sadeghinejad
Abstract:
The spinal cord is a long structure that starts at the end of the medulla oblongata and is located within the vertebral canal. Physiologically, the spinal cord connects the brain with the peripheral nervous system for sensory and motor activities. The cervical spinal cord is an area of particular interest in medicine and veterinary medicine due to the high prevalence of diseases in this region. This study describes the morphometric features of the cervical spinal cord in rabbits using design-unbiased stereology. The cervical spinal cords of five male rabbits were dissected, and slabs were taken according to systematic uniform random sampling. Each slab was embedded in paraffin and cut into a 6-µm thick section, and stained with cresyl violet 0.1% for stereological estimations. The total spinal cord volume, volume fraction of grey and white matter, and also dorsal and ventral horns were estimated using point counting and Cavalieri's estimator. The total cervical spinal cord volume was 0.98 ± 0.07 cm³. The relative volume of white matter and grey matter was 70.6 ± 1.7% and 29.31 ± 1.67%, respectively. The dorsal horn and ventral horn volume were 13.86 ± 1.36% and 14.9 ± 0.62% of the whole cervical spinal cord. This knowledge of rabbit spinal cord findings may serve as a foundation for a translational model in spinal cord experimental research and provide basic findings for the diagnosis and treatment of spinal cord disorders.Keywords: stereology, spinal cord, rabbit, cervical
Procedia PDF Downloads 76599 Molecular Dynamics Simulation for Buckling Analysis at Nanocomposite Beams
Authors: Babak Safaei, A. M. Fattahi
Abstract:
In the present study we have investigated axial buckling characteristics of nanocomposite beams reinforced by single-walled carbon nanotubes (SWCNTs). Various types of beam theories including Euler-Bernoulli beam theory, Timoshenko beam theory and Reddy beam theory were used to analyze the buckling behavior of carbon nanotube-reinforced composite beams. Generalized differential quadrature (GDQ) method was utilized to discretize the governing differential equations along with four commonly used boundary conditions. The material properties of the nanocomposite beams were obtained using molecular dynamic (MD) simulation corresponding to both short-(10,10) SWCNT and long-(10,10) SWCNT composites which were embedded by amorphous polyethylene matrix. Then the results obtained directly from MD simulations were matched with those calculated by the mixture rule to extract appropriate values of carbon nanotube efficiency parameters accounting for the scale-dependent material properties. The selected numerical results were presented to indicate the influences of nanotube volume fractions and end supports on the critical axial buckling loads of nanocomposite beams relevant to long- and short-nanotube composites.Keywords: nanocomposites, molecular dynamics simulation, axial buckling, generalized differential quadrature (GDQ)
Procedia PDF Downloads 325598 A Graph-Based Retrieval Model for Passage Search
Authors: Junjie Zhong, Kai Hong, Lei Wang
Abstract:
Passage Retrieval (PR) plays an important role in many Natural Language Processing (NLP) tasks. Traditional efficient retrieval models relying on exact term-matching, such as TF-IDF or BM25, have nowadays been exceeded by pre-trained language models which match by semantics. Though they gain effectiveness, deep language models often require large memory as well as time cost. To tackle the trade-off between efficiency and effectiveness in PR, this paper proposes Graph Passage Retriever (GraphPR), a graph-based model inspired by the development of graph learning techniques. Different from existing works, GraphPR is end-to-end and integrates both term-matching information and semantics. GraphPR constructs a passage-level graph from BM25 retrieval results and trains a GCN-like model on the graph with graph-based objectives. Passages were regarded as nodes in the constructed graph and were embedded in dense vectors. PR can then be implemented using embeddings and a fast vector-similarity search. Experiments on a variety of real-world retrieval datasets show that the proposed model outperforms related models in several evaluation metrics (e.g., mean reciprocal rank, accuracy, F1-scores) while maintaining a relatively low query latency and memory usage.Keywords: efficiency, effectiveness, graph learning, language model, passage retrieval, term-matching model
Procedia PDF Downloads 148597 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 266596 Smart Demand Response: A South African Pragmatic, Non-Destructive and Alternative Advanced Metering Infrastructure-Based Maximum Demand Reduction Methodology
Authors: Christo Nicholls
Abstract:
The National Electricity Grid (NEG) in South Africa has been under strain for the last five years. This overburden of the NEG led Eskom (the State-Owned Entity responsible for the NEG) to implement a blunt methodology to assist them in reducing the maximum demand (MD) on the NEG, when required, called Loadshedding. The challenge of this methodology is that not only does it lead to immense technical issues with the distribution network equipment, e.g., transformers, due to the frequent abrupt off and on switching, it also has a broader negative fiscal impact on the distributors, as their key consumers (commercial & industrial) are now grid defecting due to the lack of Electricity Security Provision (ESP). This paper provides a pragmatic alternative methodology utilizing specific functionalities embedded within direct-connect single and three-phase Advanced Meter Infrastructure (AMI) Solutions deployed within the distribution network, in conjunction with a Multi-Agent Systems Based AI implementation focused on Automated Negotiation Peer-2-Peer trading. The results of this research clearly illustrate, not only does methodology provide a factual percentage contribution towards the NEG MD at the point of consideration, it also allows the distributor to leverage the real-time MD data from key consumers to activate complex, yet impact-measurable Demand Response (DR) programs.Keywords: AI, AMI, demand response, multi-agent
Procedia PDF Downloads 112595 Enhanced Test Scheme based on Programmable Write Time for Future Computer Memories
Authors: Nor Zaidi Haron, Fauziyah Salehuddin, Norsuhaidah Arshad, Sani Irwan Salim
Abstract:
Resistive random access memories (RRAMs) are one of the main candidates for future computer memories. However, due to their tiny size and immature device technology, the quality of the outgoing RRAM chips is seen as a serious issue. Defective RRAM cells might behave differently than existing semiconductor memories (Dynamic RAM, Static RAM, and Flash), meaning that they are difficult to be detected using existing test schemes. This paper presents an enhanced test scheme, referred to as Programmable Short Write Time (PSWT) that is able to improve the detection of faulty RRAM cells. It is developed by applying multiple weak write operations, each with different time durations. The test circuit embedded in the RRAM chip is made programmable in order to supply different weak write times during testing. The RRAM electrical model is described using Verilog-AMS language and is simulated using HSPICE simulation tools. Simulation results show that the proposed test scheme offers better open-resistive fault detection compared to existing test schemes.Keywords: memory fault, memory test, design-for-testability, resistive random access memory
Procedia PDF Downloads 387594 A Generalization of Planar Pascal’s Triangle to Polynomial Expansion and Connection with Sierpinski Patterns
Authors: Wajdi Mohamed Ratemi
Abstract:
The very well-known stacked sets of numbers referred to as Pascal’s triangle present the coefficients of the binomial expansion of the form (x+y)n. This paper presents an approach (the Staircase Horizontal Vertical, SHV-method) to the generalization of planar Pascal’s triangle for polynomial expansion of the form (x+y+z+w+r+⋯)n. The presented generalization of Pascal’s triangle is different from other generalizations of Pascal’s triangles given in the literature. The coefficients of the generalized Pascal’s triangles, presented in this work, are generated by inspection, using embedded Pascal’s triangles. The coefficients of I-variables expansion are generated by horizontally laying out the Pascal’s elements of (I-1) variables expansion, in a staircase manner, and multiplying them with the relevant columns of vertically laid out classical Pascal’s elements, hence avoiding factorial calculations for generating the coefficients of the polynomial expansion. Furthermore, the classical Pascal’s triangle has some pattern built into it regarding its odd and even numbers. Such pattern is known as the Sierpinski’s triangle. In this study, a presentation of Sierpinski-like patterns of the generalized Pascal’s triangles is given. Applications related to those coefficients of the binomial expansion (Pascal’s triangle), or polynomial expansion (generalized Pascal’s triangles) can be in areas of combinatorics, and probabilities.Keywords: pascal’s triangle, generalized pascal’s triangle, polynomial expansion, sierpinski’s triangle, combinatorics, probabilities
Procedia PDF Downloads 367593 Influence of the 3D Printing Parameters on the Dynamic Characteristics of Composite Structures
Authors: Ali Raza, Rūta Rimašauskienė
Abstract:
In the current work, the fused deposition modelling (FDM) technique is used to manufacture PLA reinforced with carbon fibre composite structures with two unique layer patterns, 0°\0° and 0°\90°. The purpose of the study is to investigate the dynamic characteristics of each fabricated composite structure. The Macro Fiber Composite (MFC) is embedded with 0°/0° and 0°/90° structures to investigate the effect of an MFC (M8507-P2 type) patch on vibration amplitude suppression under dynamic loading circumstances. First, modal analysis testing was performed using a Polytec 3D laser vibrometer to identify bending mode shapes, natural frequencies, and vibration amplitudes at the corresponding natural frequencies. To determine the stiffness of each structure, several loads were applied at the free end of the structure, and the deformation was recorded using a laser displacement sensor. The findings confirm that a structure with 0°\0° layers pattern was found to have more stiffness compared to a 0°\90° structure. The maximum amplitude suppression in each structure was measured using a laser displacement sensor at the first resonant frequency when the control voltage signal with optimal phase was applied to the MFC. The results confirm that the 0°/0° pattern's structure exhibits a higher displacement reduction than the 0°/90° pattern. Moreover, stiffer structures have been found to perform amplitude suppression more effectively.Keywords: carbon fibre composite, MFC, modal analysis stiffness, stiffness
Procedia PDF Downloads 63592 Thermophoresis Particle Precipitate on Heated Surfaces
Authors: Rebhi A. Damseh, H. M. Duwairi, Benbella A. Shannak
Abstract:
This work deals with heat and mass transfer by steady laminar boundary layer flow of a Newtonian, viscous fluid over a vertical flat plate with variable surface heat flux embedded in a fluid saturated porous medium in the presence of thermophoresis particle deposition effect. The governing partial differential equations are transformed into no-similar form by using special transformation and solved numerically by using an implicit finite difference method. Many results are obtained and a representative set is displaced graphically to illustrate the influence of the various physical parameters on the wall thermophoresis deposition velocity and concentration profiles. It is found that the increasing of thermophoresis constant or temperature differences enhances heat transfer rates from vertical surfaces and increase wall thermophoresis velocities; this is due to favourable temperature gradients or buoyancy forces. It is also found that the effect of thermophoresis phenomena is more pronounced near pure natural convection heat transfer limit; because this phenomenon is directly a temperature gradient or buoyancy forces dependent. Comparisons with previously published work in the limits are performed and the results are found to be in excellent agreement.Keywords: thermophoresis, porous medium, variable surface heat flux, heat transfer
Procedia PDF Downloads 202591 Influence of Cathodic Protection on High Strength, Pre-Stressed Corroded Tendons
Authors: Ibrahim R. Elomari, Fin O'Flaherty, Ibrahim R. Elomari, Paul Lambert
Abstract:
Cathodic protection (CP) is a technique commonly used to arrest corrosion of steel in infrastructure. However, it is not generally used on high strength, pre-stressed tendons due to the risk of hydrogen generation, leading to possible embrittlement. This paper investigates its use in such circumstances where the applied protection potential is varied to determine if CP can be safely employed on pre-stressed tendons. Plain steel tendons measuring 5.4 mm diameter were pre-stressed in timber moulds and embedded in sand/cement mortar, formulated to represent gunite. Two levels of pre-stressing were investigated (400MPa and 1200MPa). Pre-corrosion of 0% (control), 3% and 6% target loss of cross-sectional area was applied to replicate service conditions. Impressed current cathodic protection (ICCP) was then applied to the tendons at two levels of potential to identify any effect on strength. Instant-off values up to -950mV were used for normal protection with values of -1100mV or more negative to achieve overprotection. Following the ICCP phase, the tendons were removed from the mortar, cleaned and weighed to confirm actual percentage of corrosion. Tensile tests were then conducted on the tendons. The preliminary results show the influence of normal levels and overprotection of CP on the ultimate strength of the tendons.Keywords: pre-stressed concrete, corrosion, cathodic protection, hydrogen embrittlement
Procedia PDF Downloads 266590 Prediction of Phonon Thermal Conductivity of F.C.C. Al by Molecular Dynamics Simulation
Authors: Leila Momenzadeh, Alexander V. Evteev, Elena V. Levchenko, Tanvir Ahmed, Irina Belova, Graeme Murch
Abstract:
In this work, the phonon thermal conductivity of f.c.c. Al is investigated in detail in the temperature range 100 – 900 K within the framework of equilibrium molecular dynamics simulations making use of the Green-Kubo formalism and one of the most reliable embedded-atom method potentials. It is found that the heat current auto-correlation function of the f.c.c. Al model demonstrates a two-stage temporal decay similar to the previously observed for f.c.c Cu model. After the first stage of decay, the heat current auto-correlation function of the f.c.c. Al model demonstrates a peak in the temperature range 100-800 K. The intensity of the peak decreases as the temperature increases. At 900 K, it transforms to a shoulder. To describe the observed two-stage decay of the heat current auto-correlation function of the f.c.c. Al model, we employ decomposition model recently developed for phonon-mediated thermal transport in a monoatomic lattice. We found that the electronic contribution to the total thermal conductivity of f.c.c. Al dominates over the whole studied temperature range. However, the phonon contribution to the total thermal conductivity of f.c.c. Al increases as temperature decreases. It is about 1.05% at 900 K and about 12.5% at 100 K.Keywords: aluminum, gGreen-Kubo formalism, molecular dynamics, phonon thermal conductivity
Procedia PDF Downloads 413589 Modeling Bessel Beams and Their Discrete Superpositions from the Generalized Lorenz-Mie Theory to Calculate Optical Forces over Spherical Dielectric Particles
Authors: Leonardo A. Ambrosio, Carlos. H. Silva Santos, Ivan E. L. Rodrigues, Ayumi K. de Campos, Leandro A. Machado
Abstract:
In this work, we propose an algorithm developed under Python language for the modeling of ordinary scalar Bessel beams and their discrete superpositions and subsequent calculation of optical forces exerted over dielectric spherical particles. The mathematical formalism, based on the generalized Lorenz-Mie theory, is implemented in Python for its large number of free mathematical (as SciPy and NumPy), data visualization (Matplotlib and PyJamas) and multiprocessing libraries. We also propose an approach, provided by a synchronized Software as Service (SaaS) in cloud computing, to develop a user interface embedded on a mobile application, thus providing users with the necessary means to easily introduce desired unknowns and parameters and see the graphical outcomes of the simulations right at their mobile devices. Initially proposed as a free Android-based application, such an App enables data post-processing in cloud-based architectures and visualization of results, figures and numerical tables.Keywords: Bessel Beams and Frozen Waves, Generalized Lorenz-Mie Theory, Numerical Methods, optical forces
Procedia PDF Downloads 380588 Analysis of Natural Convection within a Hexagonal Enclosure Full with Nanofluid (Water-Cu) Under Effect of the Position of the Inner Obstacle
Authors: Lakhdar Rahmani, Benhanifia Kada, Brahim Mebarki
Abstract:
The present paper aims to investigate the natural convection of nanofluid (water-cu) inside a hexagonal enclosure shape embedded with a square obstacle in the presence of hot and cold side walls. The governing equations were solved in a non-uniform unstructured grid by employing the Galerkin finite element method using the software COMSOL Multiphysics. The objective of this study is to analyze the influence of Rayleigh number (103 < Ra < 105), the position of the obstacle, which is located in three different positions (center, bottom, and top side ), and the effect of Nanoparticles volume concentration (0 < Ø < 0.2) on the thermal behavior inside the enclosure, The results are reported as contours of isotherms, streamlines, and average Nusselt numbers. The obtained results illustrate that the increase in the Rayleigh number (Ra) and the Nanoparticles concentration ( Ø ) leads to an increase in the Nusselt number (Nu average ) that signifies the rate of heat transfer in the studied enclosure, in addition to the best performance observed with the position of obstacle that is located at the middle of the enclosure, where has a high effect in improving the heat transfer along the enclosure comparatively with the rest different positions.Keywords: natural convection, nanofluid (water-Cu), hexagonal enclosure, Nusselt numbers, Rayleigh number
Procedia PDF Downloads 90587 Casting Lots for Candidature in General Elections: An Un-Named Political System
Authors: Talib Jan Abasindhi
Abstract:
Democracy has reached almost every nuke & corner of the globe. It is well embedded in the political systems found in the majority of the countries in the world. Political parties, their manifestos, and programs are educating their people for better democracy and good governance, as well as service delivery in many countries around the globe. Although democracy in Pakistan by itself is in its infancy stage, yet, there is a region consisting of three districts (administrative units) lying in the North of the country where democracy is yet unknown to a wide range of population bounded into a series of mountains from Himalayan and Karakuram ranges. Political parties are struggling now to get their roots in the area while disrupting the traditional and tribal electoral system prevailing in the region. This paper will shed light on an interesting subject of casting lots for nomination as candidatures for general and local bodies’ elections in Kohistani region in Pakistan. The people of wisdom and knowledge in the modern world deem such societies as uncivilized where these practices are found. No one can believe it in today’s world, yet, this practice has been common in Kohistani region over the past many decades, and there have been many reasons for this too. Through this paper, we shall not only make others aware of the process and procedure practiced in casting the lots in elections in democratic Pakistan, but rather we shall also talk about its very basic reasons and suggestions as a solution for this menace to be eliminated.Keywords: democracy, casting lots, governance, Kohistani region
Procedia PDF Downloads 69586 Development of Academic Software for Medial Axis Determination of Porous Media from High-Resolution X-Ray Microtomography Data
Authors: S. Jurado, E. Pazmino
Abstract:
Determination of the medial axis of a porous media sample is a non-trivial problem of interest for several disciplines, e.g., hydrology, fluid dynamics, contaminant transport, filtration, oil extraction, etc. However, the computational tools available for researchers are limited and restricted. The primary aim of this work was to develop a series of algorithms to extract porosity, medial axis structure, and pore-throat size distributions from porous media domains. A complementary objective was to provide the algorithms as free computational software available to the academic community comprising researchers and students interested in 3D data processing. The burn algorithm was tested on porous media data obtained from High-Resolution X-Ray Microtomography (HRXMT) and idealized computer-generated domains. The real data and idealized domains were discretized in voxels domains of 550³ elements and binarized to denote solid and void regions to determine porosity. Subsequently, the algorithm identifies the layer of void voxels next to the solid boundaries. An iterative process removes or 'burns' void voxels in sequence of layer by layer until all the void space is characterized. Multiples strategies were tested to optimize the execution time and use of computer memory, i.e., segmentation of the overall domain in subdomains, vectorization of operations, and extraction of single burn layer data during the iterative process. The medial axis determination was conducted identifying regions where burnt layers collide. The final medial axis structure was refined to avoid concave-grain effects and utilized to determine the pore throat size distribution. A graphic user interface software was developed to encompass all these algorithms, including the generation of idealized porous media domains. The software allows input of HRXMT data to calculate porosity, medial axis, and pore-throat size distribution and provide output in tabular and graphical formats. Preliminary tests of the software developed during this study achieved medial axis, pore-throat size distribution and porosity determination of 100³, 320³ and 550³ voxel porous media domains in 2, 22, and 45 minutes, respectively in a personal computer (Intel i7 processor, 16Gb RAM). These results indicate that the software is a practical and accessible tool in postprocessing HRXMT data for the academic community.Keywords: medial axis, pore-throat distribution, porosity, porous media
Procedia PDF Downloads 115585 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA
Authors: S. Saju, G. Thirugnanam
Abstract:
In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet
Procedia PDF Downloads 528584 The Populist Rhetoric: The Symmetry of Environmentalism and Gandhianism in the Indian Mainstream Academia
Authors: Akanksha Indora
Abstract:
Environmental problems are considered a vital social issue in terms of the world’s problems with pollution, environmental degradation, and resource depletion. And populism is about appropriating the social issues according to the social condition for mobilizing a mass and constructing a ‘general will’. Populism encourages a move towards a common cause, it channelizes the emotions of the ‘common people’ towards a nation and nature. The Gandhian ideology has been received as a dominant ideology and the ‘only’ solution to environmental problems. This paper strives to understand the symmetry of environmentalism and Gandhianismi.e., how the debate on the environment in India has been primarily studied through the Gandhian ideology. The Indian Social Sciences visualize the broader issues of the environment from these perspectives, thus, making it a hegemonic approach. Being anti pluralist rhetoric is major rhetoric in the becoming of a populist. This paper shall focus on the idea that how this hegemonic construction of Gandhian ideology in the debates on environmentalism has contributed to the making of anti-pluralistic rhetoric. This anti-pluralistic rhetoric has eliminated the possibility of a pluralistic perspective in the debates on the environment. The quest for a moral inspiration embedded in Gandhianism, whose situatedness is found in the Hindu Social order, seems to have been completely rationalized through the larger politics of knowledge and thus making it appear as the only way forward when it is not.Keywords: environmental populism, gandhianism, populist rhetoric, environmentalism
Procedia PDF Downloads 117583 Bystanders' Behavior during Emergencies
Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport
Abstract:
The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping
Procedia PDF Downloads 122582 Printing Thermal Performance: An Experimental Exploration of 3DP Polymers for Facade Applications
Authors: Valeria Piccioni, Matthias Leschok, Ina Cheibas, Illias Hischier, Benjamin Dillenburger, Arno Schlueter, Matthias Kohler, Fabio Gramazio
Abstract:
The decarbonisation of the building sector requires the development of building components that provide energy efficiency while producing minimal environmental impact. Recent advancements in large-scale 3D printing have shown that it is possible to fabricate components with embedded performances that can be tuned for their specific application. We investigate the potential of polymer 3D printing for the fabrication of translucent facade components. In this study, we explore the effect of geometry on thermal insulation of printed cavity structures following a Hot Box test method. The experimental results are used to calibrate a finite-element simulation model which can support the informed design of 3D printed insulation structures. We show that it is possible to fabricate components providing thermal insulation ranging from 1.7 to 0.95 W/m2K only by changing the internal cavity distribution and size. Moreover, we identify design guidelines that can be used to fabricate components for different climatic conditions and thermal insulation requirements. The research conducted provides the first insights into the thermal behaviour of polymer 3DP facades on a large scale. These can be used as design guidelines for further research toward performant and low-embodied energy 3D printed facade components.Keywords: 3D printing, thermal performance, polymers, facade components, hot-box method
Procedia PDF Downloads 181581 Large-Eddy Simulations for Aeronautical Systems
Authors: R. R. Mankbadi
Abstract:
There are several technologically-important flow situations in which there is a need to control the outcome of the fluid flow. This could include flow separation, drag, noise, as well as particulate separations, to list only a few. One possible approach is the passive control, in which the design geometry is changed. An alternative approach is the Active Flow Control (AFC) technology in which an actuator is embedded in the flow field to change the outcome. Examples of AFC are pulsed jets, synthetic jets, plasma actuators, heating, and cooling, etc. In this work will present an overview of the development of this field. Some examples will include Airfoil Noise Suppression: Large-Eddy Simulations (LES) is used to simulate the effect of synthetic jet actuator on controlling the far field sound of a transitional airfoil. The results show considerable suppression of the noise if the synthetic jet is operated at frequencies. Mixing Enhancement and suppression: Results will be presented to show that imposing acoustic excitations at the nozzle exit can lead to enhancement or reduction of the jet plume mixing. In vertical takeoff of Aircrafts or in Space Launch, we will present results on the effects of water injection on reducing noise, and on protecting the structure and payload from fatigue damage. Other applications will include airfoil-gust interaction and propulsion systems optimizations.Keywords: aeroacoustics, flow control, aerodynamics, large eddy simulations
Procedia PDF Downloads 287580 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 71579 Investigation on Polymer Based Nano-Silver as Food Packaging Materials
Authors: A. M. Metak, T. T. Ajaal, Amal Metak, Tawfik Ajaal
Abstract:
Commercial nanocomposite food packaging type nano-silver containers were characterised using scanning electron microscopy (SEM) and energy-dispersive X-Ray spectroscopy (EDX). The presence of nanoparticles consistent with the incorporation of 1% nano-silver (Ag) and 0.1% titanium dioxide (TiO2) nanoparticle into polymeric materials formed into food containers was confirmed. Both nanomaterials used in this type of packaging appear to be embedded in a layered configuration within the bulk polymer. The dimensions of the incorporated nanoparticles were investigated using X-Ray diffraction (XRD) and determined by calculation using the Scherrer Formula; these were consistent with Ag and TiO2 nanoparticles in the size range 20-70nm both were spherical shape nanoparticles. Antimicrobial assessment of the nanocomposite container has also been performed and the results confirm the antimicrobial activity of Ag and TiO2 nanoparticles in food packaging containers. Migration assessments were performed in a wide range of food matrices to determine the migration of nanoparticles from the packages. The analysis was based on the relevant European safety directives and involved the application of inductively coupled plasma mass spectrometry (ICP-MS) to identify the range of migration risk. The data pertain to insignificance levels of migration of Ag and TiO2 nanoparticles into the selected food matrices.Keywords: nano-silver, antimicrobial food packaging, migration, titanium dioxide
Procedia PDF Downloads 368