Search results for: autonomous collision avoidance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1025

Search results for: autonomous collision avoidance

335 Achieving Sustainable Development Through the Lens of Eco-innovation, Renewable Energy, and Human Capital

Authors: Emma Serwaa Obobisa, Winifred Essaah

Abstract:

Significant worldwide trends including urbanization, industrialization, globalization, and the impending digitization have all contributed to human prosperity. However, the majority of these advancements fail to take sustainability into account, which caused the earth to manifest its retaliation in many forms. Since the world is already well-advanced, mankind needs a mature development that instills sustainability in its acts. As a result, the United Nations established the Sustainable Development Goals (SDGs), which set forth guidelines for human behavior to ensure that the ecosystem and mankind coexist as a unified, autonomous system. The study investigates the role of eco-innovation, renewable energy consumption, human capital, environmental tax, and natural resources in achieving European Union countries' sustainable development goals. The results show that eco-innovation, renewable energy consumption, human capital, and environmental tax have a negative relationship with consumption-based CO₂ emissions but a positive relationship with natural resources. These findings suggest that governments in European Union countries commit to encouraging environmentally friendly technology advances and green investment. It also stresses the need to enforce regulations that regulate the activities of polluting firms in the region with strictness.

Keywords: sustainable development, Eco-innovation, renewable energy, CO₂ emissions

Procedia PDF Downloads 20
334 [Keynote Talk]: Three Key Ideas to Undergraduate Thesis Project Tutoring

Authors: M. T. Becerra-Traver, M. Montanero, R. Alejo, A. Antúnez, P. Cañamero, M. J. Fernández, M. Gómez, A. L. Medialdea, J. D. Martínez, A. M. Piquer-Píriz, M. J. Rabazo

Abstract:

The introduction of new subjects at university level, brought about with the implementation of the European Higher Education Area (EHEA), has meant changes for students and lecturers that, in the case of the latter, have also revealed a need for further training. In our context, one of the main changes has been the introduction of Undergraduate Thesis Projects (UTPs) in the degrees taught in our faculty: Pre-Primary and Primary Education. The aim of this paper is to analyze UTPs and to provide some suggestions that can help both students and lecturers in the process. UTPs complete the university training cycle of the Degree Studies and entail the elaboration of a written piece of work, supervised by a professor and presented to a panel in order to ensure that students acquire the required competences of these Degrees to develop an autonomous, responsible and comprehensive activity. In addition, UTPs develop students’ abilities for oral presentations and to defend and argue their own ideas. One of the first difficulties in the supervision of UTPs is that most of the students do not know how to write an academic text. To solve this problem, we propose a three-phase model based on planning, textualization and review. The implementation of this model has enabled us to see a successful evolution in the correct development of the academic dissertations that students submit at the end their degrees.

Keywords: academic task, student, tutoring, university

Procedia PDF Downloads 249
333 Effects of Crisis-Induced Emotions on in-Crisis Protective Behavior and Post-Crisis Perception: An Analysis of Survey Data for the 2015 Middle East Respiratory Syndrome in South Korea

Authors: Myoungsoon You, Heejung Son

Abstract:

Background: In the current study, we investigated the effects of emotions induced by an infectious disease outbreak on the various protective behaviors taken during the crisis and on the perception after the crisis. The investigation was based on two psychological theories of appraisal tendency and action tendency. Methods: A total of 900 participants in South Korea who experienced the 2015 Middle East Respiratory Syndrome outbreak were sampled by a professional survey agency. To assess the influence of the emotions fear and anger, a regression approach was used. The effect of emotions on various protective behaviors and perceptions was observed using a hierarchical regression method. Results: Fear and anger induced by the infectious disease outbreak were both associated with increased protective behaviors during the crisis. However, the differences between the emotions were observed. While protective behaviors with avoidance tendency (adherence to recommendations, self-mitigation), were raised by both fear and anger, protective behaviors with approach tendency (information-seeking) were increased by anger, but not fear. Regarding the effect of emotion on the risk perception after the crisis, only fear was associated with a higher level of risk perception. Conclusions: This study confirmed the role of emotions in crisis protective behaviors and post-crisis perceptions regarding an infectious disease outbreak. These findings could enhance understanding of the public’s protective behaviors during infectious disease outbreaks and afterward risk perception corresponding to emotions. The results also suggested strategies for communicating with the public that takes into account emotions that are prominently induced by crises associated with disease outbreaks.

Keywords: crisis communication, emotion, infectious disease outbreak, protective behavior, risk perception

Procedia PDF Downloads 253
332 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 342
331 A Frictional-Collisional Closure Model for the Saturated Granular Flow: Experimental Evidence and Two Phase Modelling

Authors: Yunhui Sun, Qingquan Liu, Xiaoliang Wang

Abstract:

Dense granular flows widely exist in geological flows such as debris flow, landslide, or sheet flow, where both the interparticle and solid-liquid interactions are important to modify the flow. So, a two-phase approach with both phases correctly modelled is important for a better investigation of the saturated granular flows. However, a proper closure model covering a wide range of flowing states for the solid phase is still lacking. This study first employs a chute flow experiment based on the refractive index matching method, which makes it possible to obtain internal flow information such as velocity, shear rate, granular fluctuation, and volume fraction. The granular stress is obtained based on a steady assumption. The kinetic theory is found to describe the stress dependence on the flow state well. More importantly, the granular rheology is found to be frictionally dominated under weak shear and collisionally dominated under strong shear. The results presented thus provide direct experimental evidence on a possible frictional-collisional closure model for the granular phase. The data indicates that both frictional stresses exist over a wide range of the volume fraction, though traditional theory believes it vanishes below a critical volume fraction. Based on the findings, a two-phase model is used to simulate the chute flow. Both phases are modelled as continuum media, and the inter-phase interactions, such as drag force and pressure gradient force, are considered. The frictional-collisional model is used for the closure of the solid phase stress. The profiles of the kinematic properties agree well with the experiments. This model is further used to simulate immersed granular collapse, which is unsteady in nature, to study the applicability of this model, which is derived from steady flow.

Keywords: closure model, collision, friction, granular flow, two-phase model

Procedia PDF Downloads 37
330 Extending BDI Multiagent Systems with Agent Norms

Authors: Francisco José Plácido da Cunha, Tassio Ferenzini Martins Sirqueira, Marx Leles Viana, Carlos José Pereira de Lucena

Abstract:

Open Multiagent Systems (MASs) are societies in which heterogeneous and independently designed entities (agents) work towards similar, or different ends. Software agents are autonomous and the diversity of interests among different members living in the same society is a fact. In order to deal with this autonomy, these open systems use mechanisms of social control (norms) to ensure a desirable social order. This paper considers the following types of norms: (i) obligation — agents must accomplish a specific outcome; (ii) permission — agents may act in a particular way, and (iii) prohibition — agents must not act in a specific way. All of these characteristics mean to encourage the fulfillment of norms through rewards and to discourage norm violation by pointing out the punishments. Once the software agent decides that its priority is the satisfaction of its own desires and goals, each agent must evaluate the effects associated to the fulfillment of one or more norms before choosing which one should be fulfilled. The same applies when agents decide to violate a norm. This paper also introduces a framework for the development of MASs that provide support mechanisms to the agent’s decision-making, using norm-based reasoning. The applicability and validation of this approach is demonstrated applying a traffic intersection scenario.

Keywords: BDI agent, BDI4JADE framework, multiagent systems, normative agents

Procedia PDF Downloads 212
329 Status and Image of the Nurse as Perceived by the Public

Authors: Salam Hadid, Mohammad Khatib

Abstract:

The International Council of Nurses-ICN defined nursing as a sphere integrating autonomous and collaborative care intended for the individual, family and community within and outside of the care setting. Nursing as a care profession has developed broadly over recent decades in terms of its essentials, expertise and primarily academically. Despite the impressive growth of the profession, there is still extreme diversity in the public’s perceptions and opinions of the profession and its professionals and in the knowledge on the fundamentals of its true function and spheres of engagement. The current study examines the existing knowledge among the general population regarding the nursing profession. The population consisted of 498 respondents, 236 women and 262 men, age 18-81. The respondents noted that nursing focuses on the technical, and the emotional aspects and promotion of health for the patient are not the nurse’s responsibility. Most of the respondents saw nurses working mainly in hospital and community-based clinic settings. They considered nursing to be a high prestige profession in general, but less prestigious among respondents exposed to healthcare provision. Most of the respondents considered nursing to be a humane profession but without independence and with no need for academic studies. The findings are incompatible with the definition of nursing and its spheres of action as defined in the ICN Code of Ethics. Two suggestions are to work through nursing schools addressing the student nurses, as ambassadors for the profession. The second is using the healthcare encounter between the nursing staff and the public to improve the image of nurses.

Keywords: ethics, nurse image, public, nursing

Procedia PDF Downloads 272
328 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 38
327 The Effect of Costus igneus Extract on Learning and Memory in Normal and Diabetic Rats

Authors: Shalini Adiga, Shashikant Chetty, Jisha, Shobha Kamath

Abstract:

Background: Moderate impairment of learning and memory has been observed in both type 1 and 2 diabetes mellitus in humans and experimental animals. A Change in glucose utilization and oxidative stress that occur in diabetes are considered the main reasons for cognitive dysfunction. Objective: Costus igneus (CI) which is known to possess hypoglycemic activity was evaluated in this study for its effect on learning and memory in normal and diabetic rats. Methods: Wistar rats were divided into control, CI-alcoholic extract treated normal (250 and 500mg/kg), diabetic control and CI-treated diabetic groups. CI treatment was continued for 4 weeks. For induction of diabetes, a single dose of streptozotocin was injected (30 mg/kg i.p). Entrance latency and time spent in the dark room during acquisition and at 24 and 48h after an aversive shock in a passive avoidance model was used as an index of learning and memory. Glutathione and malondialdehyde levels in brain and blood glucose were measured. Data was analysed using ANOVA. Results: During the three trials in exploration test, the diabetic control rats exhibited no significant change in entrance latency or in the total time spent in the dark compartment. During retention testing, the entrance latency of the diabetic treated groups was two times less at 24h and three times less at 48h after aversive stimulus as compared to diabetic rats. The normal drug-treated rats showed similar behaviour as the saline control. Treatment with CI significantly reduced the raised blood sugar and MDA levels of diabetic rats. Conclusion: Costus igneus prevented the cognitive dysfunction in diabetic rats which can be attributed to its antioxidant and antihyperglycemic activities.

Keywords: Costus igneous, diabetes, learning and memory, cognitive dysfunction

Procedia PDF Downloads 331
326 Purpose in Procurement: Much Discussed, Less Conceptualized – An Exploratory Study of CPO Perceptions Based on the Gioia Methodology

Authors: Laurin Zemmrich, Nicolai Stickler

Abstract:

With the ongoing debate over how to incorporate sustainability, resilience, and value creation into business strategies, many procurement departments are put under pressure by governments, consumers, non-governmental organizations, and other stakeholders to disclose more information about their supply chains. According to practitioners and experts, procurement benefits the supply chain by increasing transparency and accountability, recruiting new suppliers, and supporting sustainable and ethical sourcing strategies. While most procurement departments establish these objectives, the bulk of activities are not carried out or are not regularly monitored. With the full potential of targeted sourcing still to be realized, procurement executives, in particular, are seeking for short-term cost-cutting impacts to appease external shareholders. We overcome this limitation by using an abductive approach to research and integrating empirical data from a Gioia methodology study design with relevant literature. Our analysis demonstrates that the procurement department has six essential levers aligned with sustainability, resilience, and value creation objectives and contributes to developing a new intra- and interorganizational purpose within the supply chain. Three enablers are identified as having a value-creating effect on supply chain interactions. Additionally, we discovered two impacts that alter the power balance between buyers and suppliers during transactions and have a cost-cutting or cost-avoiding effect. While cost-cutting, cost-avoidance, and dependency-reduction impacts are desirable, redistributing power may also have negative consequences. The article establishes a first strategy framework for evaluating the influence of the procurement department on supply chain transactions, allowing managers to understand better and apply the sourcing function inside a supply chain and embed it throughout the business.

Keywords: supply chain management, resilience, sustainability, value creation, purpose

Procedia PDF Downloads 95
325 Integrating AI Visualization Tools to Enhance Student Engagement and Understanding in AI Education

Authors: Yong Wee Foo, Lai Meng Tang

Abstract:

Artificial Intelligence (AI), particularly the usage of deep neural networks for hierarchical representations from data, has found numerous complex applications across various domains, including computer vision, robotics, autonomous vehicles, and other scientific fields. However, their inherent “black box” nature can sometimes make it challenging for early researchers or school students of various levels to comprehend and trust the results they produce. Consequently, there has been a growing demand for reliable visualization tools in engineering and science education to help learners understand, trust, and explain a deep learning network. This has led to a notable emphasis on the visualization of AI in the research community in recent years. AI visualization tools are increasingly being adopted to significantly improve the comprehension of complex topics in deep learning. This paper proposes a novel approach to empower students to actively explore the inner workings of deep neural networks by combining the student-centered learning approach of flipped classroom models with the investigative power of AI visualization tools, namely, the TensorFlow Playground, the Local Interpretable Model-agnostic Explanations (LIME), and the SHapley Additive exPlanations (SHAP), for delivering an AI education curriculum. Combining the two factors is vital in fostering ownership, responsibility, and critical thinking skills in the age of AI.

Keywords: deep learning, explainable AI, AI visualization, representation learning

Procedia PDF Downloads 40
324 Identification of Vehicle Dynamic Parameters by Using Optimized Exciting Trajectory on 3- DOF Parallel Manipulator

Authors: Di Yao, Gunther Prokop, Kay Buttner

Abstract:

Dynamic parameters, including the center of gravity, mass and inertia moments of vehicle, play an essential role in vehicle simulation, collision test and real-time control of vehicle active systems. To identify the important vehicle dynamic parameters, a systematic parameter identification procedure is studied in this work. In the first step of the procedure, a conceptual parallel manipulator (virtual test rig), which possesses three rotational degrees-of-freedom, is firstly proposed. To realize kinematic characteristics of the conceptual parallel manipulator, the kinematic analysis consists of inverse kinematic and singularity architecture is carried out. Based on the Euler's rotation equations for rigid body dynamics, the dynamic model of parallel manipulator and derivation of measurement matrix for parameter identification are presented subsequently. In order to reduce the sensitivity of parameter identification to measurement noise and other unexpected disturbances, a parameter optimization process of searching for optimal exciting trajectory of parallel manipulator is conducted in the following section. For this purpose, the 321-Euler-angles defined by parameterized finite-Fourier-series are primarily used to describe the general exciting trajectory of parallel manipulator. To minimize the condition number of measurement matrix for achieving better parameter identification accuracy, the unknown coefficients of parameterized finite-Fourier-series are estimated by employing an iterative algorithm based on MATLAB®. Meanwhile, the iterative algorithm will ensure the parallel manipulator still keeps in an achievable working status during the execution of optimal exciting trajectory. It is showed that the proposed procedure and methods in this work can effectively identify the vehicle dynamic parameters and could be an important application of parallel manipulator in the fields of parameter identification and test rig development.

Keywords: parameter identification, parallel manipulator, singularity architecture, dynamic modelling, exciting trajectory

Procedia PDF Downloads 240
323 Fires in Historic Buildings: Assessment of Evacuation of People by Computational Simulation

Authors: Ivana R. Moser, Joao C. Souza

Abstract:

Building fires are random phenomena that can be extremely violent, and safe evacuation of people is the most guaranteed tactic in saving lives. The correct evacuation of buildings, and other spaces occupied by people, means leaving the place in a short time and by the appropriate way. It depends on the perception of spaces by the individual, the architectural layout and the presence of appropriate routing systems. As historical buildings were constructed in other times, when, as in general, the current security requirements were not available yet, it is necessary to adapt these spaces to make them safe. Computer models of evacuation simulation are widely used tools for assessing the safety of people in a building or agglomeration sites and these are associated with the analysis of human behaviour, makes the results of emergency evacuation more correct and conclusive. The objective of this research is the performance evaluation of historical interest buildings, regarding the safe evacuation of people, through computer simulation, using PTV Viswalk software. The buildings objects of study are the Colégio Catarinense, centennial building, located in the city of Florianópolis, Santa Catarina / Brazil. The software used uses the variables of human behaviour, such as: avoid collision with other pedestrians and avoid obstacles. Scenarios were run on the three-dimensional models and the contribution to safety in risk situations was verified as an alternative measure, especially in the impossibility of applying those measures foreseen by the current fire safety codes in Brazil. The simulations verified the evacuation time in situations of normality and emergency situations, as well as indicate the bottlenecks and critical points of the studied buildings, to seek solutions to prevent and correct these undesirable events. It is understood that adopting an advanced computational performance-based approach promotes greater knowledge of the building and how people behave in these specific environments, in emergency situations.

Keywords: computer simulation, escape routes, fire safety, historic buildings, human behavior

Procedia PDF Downloads 169
322 Experimental Evaluation of Stand Alone Solar Driven Membrane Distillation System

Authors: Mejbri Sami, Zhani Khalifa, Zarzoum Kamel, Ben Bacha Habib, Koschikowski Joachim, Pfeifle Daniel

Abstract:

Many places worldwide, especially arid and semi-arid remote regions, are suffering from the lack of drinkable water and the situation will be aggravated in the near future. Furthermore, remote areas are characterised by lack of conventional energy sources, skilled personnel and maintenance facilities. Therefore, the development of small to medium size, stand-alone and robust solar desalination systems is needed to provide independent fresh water supply in remote areas. This paper is focused on experimental studies on compact membrane distillation (MD) solar desalination prototype located at the Mechanical Engineering Department site, Kairouan University, Kairouan, Tunisia. The pilot system is designed and manufactured as a part of a research and development project funded by the MESRS/BMBF. The pilot system is totally autonomous. The electrical energy required to operate the unit is generated through a field of 4 m² of photovoltaic panels, and the heating of feed water is provided by a field of 6 m² of solar collectors. The Kairouan plant performance of the first few months of operation is presented. The highest freshwater production of 150 L/d is obtained on a sunny day in July of 633 W/m²d.

Keywords: experimental, membrane distillation, solar desalination, Permeat gap

Procedia PDF Downloads 112
321 Transverse Momentum Dependent Factorization and Evolution for Spin Physics

Authors: Bipin Popat Sonawane

Abstract:

After 1988 Electron muon Collaboration (EMC) announcement of measurement of spin dependent structure function, it has been found that it has become a need to understand spin structure of a hadron. In the study of three-dimensional spin structure of a proton, we need to understand the foundation of quantum field theory in terms of electro-weak and strong theories using rigorous mathematical theories and models. In the process of understanding the inner dynamical stricture of proton we need understand the mathematical formalism in perturbative quantum chromodynamics (pQCD). In QCD processes like proton-proton collision at high energy we calculate cross section using conventional collinear factorization schemes. In this calculations, parton distribution functions (PDFs) and fragmentation function are used which provide the information about probability density of finding quarks and gluons ( partons) inside the proton and probability density of finding final hadronic state from initial partons. In transverse momentum dependent (TMD) PDFs and FFs, collectively called as TMDs, take an account for intrinsic transverse motion of partons. The TMD factorization in the calculation of cross sections provide a scheme of hadronic and partonic states in the given QCD process. In this study we review Transverse Momentum Dependent (TMD) factorization scheme using Collins-Soper-Sterman (CSS) Formalism. CSS formalism considers the transverse momentum dependence of the partons, in this formalism the cross section is written as a Fourier transform over a transverse position variable which has physical interpretation as impact parameter. Along with this we compare this formalism with improved CSS formalism. In this work we study the TMD evolution schemes and their comparison with other schemes. This would provide description in the process of measurement of transverse single spin asymmetry (TSSA) in hadro-production and electro-production of J/psi meson at RHIC, LHC, ILC energy scales. This would surely help us to understand J/psi production mechanism which is an appropriate test of QCD.

Keywords: QCD, PDF, TMD, CSS

Procedia PDF Downloads 46
320 Meteorological Risk Assessment for Ships with Fuzzy Logic Designer

Authors: Ismail Karaca, Ridvan Saracoglu, Omer Soner

Abstract:

Fuzzy Logic, an advanced method to support decision-making, is used by various scientists in many disciplines. Fuzzy programming is a product of fuzzy logic, fuzzy rules, and implication. In marine science, fuzzy programming for ships is dramatically increasing together with autonomous ship studies. In this paper, a program to support the decision-making process for ship navigation has been designed. The program is produced in fuzzy logic and rules, by taking the marine accidents and expert opinions into account. After the program was designed, the program was tested by 46 ship accidents reported by the Transportation Safety Investigation Center of Turkey. Wind speed, sea condition, visibility, day/night ratio have been used as input data. They have been converted into a risk factor within the Fuzzy Logic Designer application and fuzzy rules set by marine experts. Finally, the expert's meteorological risk factor for each accident is compared with the program's risk factor, and the error rate was calculated. The main objective of this study is to improve the navigational safety of ships, by using the advance decision support model. According to the study result, fuzzy programming is a robust model that supports safe navigation.

Keywords: calculation of risk factor, fuzzy logic, fuzzy programming for ship, safety navigation of ships

Procedia PDF Downloads 162
319 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis

Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo

Abstract:

The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.

Keywords: IoT, ethical concerns, privacy, safety, security, smart devices

Procedia PDF Downloads 61
318 Quantitative Evaluation of Supported Catalysts Key Properties from Electron Tomography Studies: Assessing Accuracy Using Material-Realistic 3D-Models

Authors: Ainouna Bouziane

Abstract:

The ability of Electron Tomography to recover the 3D structure of catalysts, with spatial resolution in the subnanometer scale, has been widely explored and reviewed in the last decades. A variety of experimental techniques, based either on Transmission Electron Microscopy (TEM) or Scanning Transmission Electron Microscopy (STEM) have been used to reveal different features of nanostructured catalysts in 3D, but High Angle Annular Dark Field imaging in STEM mode (HAADF-STEM) stands out as the most frequently used, given its chemical sensitivity and avoidance of imaging artifacts related to diffraction phenomena when dealing with crystalline materials. In this regard, our group has developed a methodology that combines image denoising by undecimated wavelet transforms (UWT) with automated, advanced segmentation procedures and parameter selection methods using CS-TVM (Compressed Sensing-total variation minimization) algorithms to reveal more reliable quantitative information out of the 3D characterization studies. However, evaluating the accuracy of the magnitudes estimated from the segmented volumes is also an important issue that has not been properly addressed yet, because a perfectly known reference is needed. The problem particularly complicates in the case of multicomponent material systems. To tackle this key question, we have developed a methodology that incorporates volume reconstruction/segmentation methods. In particular, we have established an approach to evaluate, in quantitative terms, the accuracy of TVM reconstructions, which considers the influence of relevant experimental parameters like the range of tilt angles, image noise level or object orientation. The approach is based on the analysis of material-realistic, 3D phantoms, which include the most relevant features of the system under analysis.

Keywords: electron tomography, supported catalysts, nanometrology, error assessment

Procedia PDF Downloads 59
317 Study Variation of Blade Angle on the Performance of the Undershot Waterwheel on the Pico Scale

Authors: Warjito, Kevin Geraldo, Budiarso, Muhammad Mizan, Rafi Adhi Pranata, Farhan Rizqi Syahnakri

Abstract:

According to data from 2021, the number of households in Indonesia that have access to on-grid electricity is claimed to have reached 99.28%, which means that around 0.7% of Indonesia's population (1.95 million people) still have no proper access to electricity and 38.1% of it comes from remote areas in Nusa Tenggara Timur. Remote areas are classified as areas with a small population of 30 to 60 families, have limited infrastructure, have scarce access to electricity and clean water, have a relatively weak economy, are behind in access to technological innovation, and earn a living mostly as farmers or fishermen. These people still need electricity but can’t afford the high cost of electricity from national on-grid sources. To overcome this, it is proposed that a hydroelectric power plant driven by a pico-hydro turbine with an undershot water wheel will be a suitable pico-hydro turbine technology because of the design, materials and installation of the turbine that is believed to be easier (i.e., operational and maintenance) and cheaper (i.e., investment and operating costs) than any other type. The comparative study of the angle of the undershot water wheel blades will be discussed comprehensively. This study will look into the best variation of curved blades on an undershot water wheel that produces maximum hydraulic efficiency. In this study, the blade angles were varied by 180 ̊, 160 ̊, and 140 ̊. Two methods of analysis will be used, which are analytical and numerical methods. The analytical method will be based on calculations of the amount of torque and rotational speed of the turbine, which is used to obtain the input and output power of the turbine. Whereas the numerical method will use the ANSYS application to simulate the flow during the collision with the designed turbine blades. It can be concluded, based on the analytical and numerical methods, that the best angle for the blade is 140 ̊, with an efficiency of 43.52% for the analytical method and 37.15% for the numerical method.

Keywords: pico hydro, undershot waterwheel, blade angle, computational fluid dynamics

Procedia PDF Downloads 57
316 A Study on the Optimum Shoulder Width in the Tunnel Considering Driving Safety

Authors: Somyoung Shin, Donghun Jeong, Yeoil Yun

Abstract:

South Korea continuously installed tunnels in consideration of the safety and operation efficiency, and the number of installed tunnels has doubled over the past ten years. The tunnel section is designed based on the guidelines, but the tunnel entrance becomes narrow due to dark adaptation and pressure. In fact, around 13% of traffic in expressways of Japan happens at the entrance, leading to congestion and rear-ends collision accidents. Therefore, this study aims to analyze the stability from the expansion of the shoulder width in the tunnel entrance by applying a virtual reality driving simulator in order to reduce the accidents that happen in the tunnel entrance. To compare the driving stability based on the changes in the width of the right shoulder under the same condition, a virtual reality driving simulator is used to conduct an experiment on 30 subjects in their 20s to 60s and to provide a more practical virtual reality driving environment, and an experiment map is designed based on actual roads as the background to conduct the experiment. The right shoulder is classified into 2.5m and 3.0m based on the design guidelines of the expressways and the road structure installation regulations. The experimenters' experiment order is decided randomly. As a result of analyzing the average speed, it was displayed as 100.73km/h when the shoulder width was 2.5m and 101.69km/h when the shoulder width was 3.0m and as a result of conducting t-test analysis, the p-value appeared as more than 0.05 in the significance level of 95%, so it was statistically insignificant. Also, as a result of analyzing the speed deviation between the average driving speed of the analyzed interval and the average driving speed upon entering the tunnel, it was displayed as 3.06km/h when the shoulder width was 2.5m and 1.87km/h when the shoulder width was 3.0m and as a result of conducting t-test analysis, the p-value appeared as less than 0.05 in the significance level of 95%, so it was statistically significant. This means that when the shoulder width is 3.0m, there is stability in terms of the driving stability compared to when it is 2.5m. Therefore, it is considered that when new roads are constructed in Korea, the right shoulder width should be installed as 3.0m to enhance the driving stability.

Keywords: driving stability, shoulder width, tunnel, virtual reality driving simulator

Procedia PDF Downloads 177
315 Morphology and Risk Factors for Blunt Aortic Trauma in Car Accidents: An Autopsy Study

Authors: Ticijana Prijon, Branko Ermenc

Abstract:

Background: Blunt aortic trauma (BAT) includes various morphological changes that occur during deceleration, acceleration and/or body compression in traffic accidents. The various forms of BAT, from limited laceration of the intima to complete transection of the aorta, depends on the force acting on the vessel wall and the tolerance of the aorta to injury. The force depends on the change in velocity, the dynamics of the accident and of the seating position in the car. Tolerance to aortic injury depends on the anatomy, histological structure and pathomorphological alterations due to aging or disease of the aortic wall.An overview of the literature and medical documentation reveals that different terms are used to describe certain forms of BAT, which can lead to misinterpretation of findings or diagnoses. We therefore, propose a classification that would enable uniform systematic screening of all forms of BAT. We have classified BAT into three morphologycal types: TYPE I (intramural), TYPE II (transmural) and TYPE III (multiple) aortic ruptures with appropriate subtypes. Methods: All car accident casualties examined at the Institute of Forensic Medicine from 2001 to 2009 were included in this retrospective study. Autopsy reports were used to determine the occurrence of each morphological type of BAT in deceased drivers, front seat passengers and other passengers in cars and to define the morphology of BAT in relation to the accident dynamics and the age of the fatalities. Results: A total of 391 fatalities in car accidents were included in the study. TYPE I, TYPE II and TYPE III BAT were observed in 10,9%, 55,6% and 33,5%, respectively. The incidence of BAT in drivers, front seat and other passengers was 36,7%, 43,1% and 28,6%, respectively. In frontal collisions, the incidence of BAT was 32,7%, in lateral collisions 54,2%, and in other traffic accidents 29,3%. The average age of fatalities with BAT was 42,8 years and of those without BAT 39,1 years. Conclusion: Identification and early recognition of the risk factors of BAT following a traffic accident is crucial for successful treatment of patients with BAT. Front seat passengers over 50 years of age who have been injured in a lateral collision are the most at risk of BAT.

Keywords: aorta, blunt trauma, car accidents, morphology, risk factors

Procedia PDF Downloads 489
314 Fibromyalgia and Personality: A Review of the Different Personality Types Identified

Authors: Lize Tibiriçá, Ronnie Lee, Samantha Behbahani

Abstract:

Fibromyalgia (FM) is a musculoskeletal disorder affecting men and women of different ages and cultures. The cause of this disorder is unknown; however, studies suggest an etiology that involves biological and psychosocial factors. Few studies have shown that a personality type such as neuroticism is associated with chronic pain conditions. Past research has explored whether patients with FM present with a specific personality trait. However, studies have used different methods (i.e. Minnesota Multiphasic Personality Inventory (MMPI), Sociotropy and Autonomy Scale (SAS) and Dysfunctional Attitude Scale (DAS), Tridimensional Personality Questionnaire or Temperament and Character Inventory (TCI), Karolinska scale of personality, Big Five Inventory or NEO Personality Inventory) to explore the connection between FM and a personality type. They have identified personality types that present similar characteristics but vary in the name (i.e. high harm avoidance and low novelty seeking, psychasthenia/muscular tension/somatic anxiety, neuroticism). Although Zuckerman-Kuhlman Personality Questionnaire and the Big Five Inventory differ in terms of content and structure, both of them identify neuroticism as the personality type of FM patients, and the former also identifies these patients as having a low sociability personality trait. Previous research also shows a trend of sociotropic personality style with FM patients that also suffer from Major Depressive Disorder. Participants in these studies were, for the most part, adult female and researchers have recognized that as a limitation and whether their findings can be generalized to men and younger patients with FM. Furthermore, most studies reviewed were conducted in Europe (i.e. Spain) and had a cross-sectional design. Future research should replicate past studies in different countries and consider conducting a longitudinal study. Although it is suspected that FM course is modulated by FM patients’ personality, it is not known whether individuals with similar personalities will develop FM. This review sought to explain the differences and similarities between the personality types identified. Limitations in the studies reviewed were addressed, and considerations for future research and treatment were discussed.

Keywords: chronic pain, fibromyalgia, neuroticism, personality type

Procedia PDF Downloads 302
313 Folk Media and Political Movement: A Case Study on the Bodos of North East India

Authors: Faguna Barmahalia

Abstract:

Politics of ethnic identity in the north-east India is well-known phenomenon. The ethnic assertion in this region is mostly linguistic and cultural in nature. Most of the ethnic groups in the north-east region have been demanding either autonomous or separate state to maintain their socio-cultural identity. After the Indian Independence, the ethnic groups of people think that they have not developed till. Despite having many natural resources, North East India remained backward in terms of economic, education as well as politics. In this scenario, many educated and middle-class elite people have involved in working for the all-round development of their community. The Bodos are one of the major tribes in North Eeast India. In Assam, the Bodos are assumed by themselves to be exploited and suppressed by the Assamese Hindu society. Consequently, the socio-cultural identity movement has emerged among the Bodos.The main aims of my study are: i. to focus on how the Bodos of Assam are using the folk media in their political movement and iii. To analyse the role of folklore towards serving the ethnic unity and nationalism among the Bodos. Methodology: The study is based on the primary and secondary sources. Interview and observation method was conducted for collecting the primary data. For secondary source, some printed books, magazines and others materials published by the distinguished publishers and websites have been used.

Keywords: media, culture, nationalism, politics

Procedia PDF Downloads 191
312 A Generic Middleware to Instantly Sync Intensive Writes of Heterogeneous Massive Data via Internet

Authors: Haitao Yang, Zhenjiang Ruan, Fei Xu, Lanting Xia

Abstract:

Industry data centers often need to sync data changes reliably and instantly from a large-scale of heterogeneous autonomous relational databases accessed via the not-so-reliable Internet, for which a practical universal sync middle of low maintenance and operation costs is most wanted, but developing such a product and adapting it for various scenarios are a very sophisticated and continuous practice. The authors have been devising, applying, and optimizing a generic sync middleware system, named GSMS since 2006, holding the principles or advantages that the middleware must be SyncML-compliant and transparent to data application layer logic, need not refer to implementation details of databases synced, does not rely on host computer operating systems deployed, and its construction is light weighted and hence, of low cost. A series of ultimate experiments with GSMS sync performance were conducted for a persuasive example of a source relational database that underwent a broad range of write loads, say, from one thousand to one million intensive writes within a few minutes. The tests proved that GSMS has achieved an instant sync level of well below a fraction of millisecond per record sync, and GSMS’ smooth performances under ultimate write loads also showed it is feasible and competent.

Keywords: heterogeneous massive data, instantly sync intensive writes, Internet generic middleware design, optimization

Procedia PDF Downloads 100
311 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 133
310 Student's Perception on the Relationship between Teacher's Supportive Teaching, Thwarting Teaching, Their Needed Satisfaction, Frustration, and Motivational Regulation at Vocational High School

Authors: Chi C. Lin, Chih. H. Hsieh, Chi H. Lin

Abstract:

The present study attempted to develop and test a self-determination theory dual-process model among teachers’ need supportive teaching, need thwarting teaching, and students’ need satisfaction, need frustration, and motivation regulation on vocational high school learners. This study adopted a survey questionnaire method. Participants were 736 (472 males, 264 females) vocational high school students in Taiwan. The instrument included five sets: the Teachers’ Need Supportive Teaching Scale, the Teachers’ Need Thwart Teaching Scale, the Need Satisfaction Scale, the Need Frustration Scale, and the Motivational Regulation Scale. A Structural equation modeling was used for the data analyses, results indicated that (1) teachers’ need supportive teaching had direct effects on students’ need satisfaction; (2) teachers’ thwarting teaching also had a direct effect on students’ need frustration; (3) teachers’ need supportive teaching had a negative direct effect on students’ need frustration; (4) students’ need satisfaction had direct effects on their autonomous motivation and control motivation, respectively; (5) students’ need frustration also had direct effects on their control motivation and motivation, respectively; (6) the model proposed in this study fit mostly with the empirical data.

Keywords: motivational regulation, need satisfaction, need frustration, supportive teaching, thwart teaching, vocational high school students

Procedia PDF Downloads 114
309 MEET (Maximise the Erasmus Experience Together): Gains, Challenges and Proposals

Authors: Susana Olmos, Catherine Spencer

Abstract:

Every year our School in DIT (Dublin Institute of Technology) hosts approximately 80 Erasmus students from partner universities across Europe. Our own students are required to spend a compulsory 3rd year abroad on study and/or work placements. This is an extremely rewarding experience for all of the students, however, it can also be a challenging one. With this in mind, we started a project which aimed to make this transition as easy and productive as possible. The project, which is called MEET: Maximise the Erasmus Experience Together, focuses on the students’ own active engagement in learning and preparation – outside of the classroom –and their own self-directed pursuit of opportunities to develop their confidence and preparedness, which would work as an important foundation for the transformative learning that study abroad implies. We focussed on creating more structured opportunities where Erasmus students from our partner universities (currently studying at DIT) and our second-year students could interact and learn from each other, and in so doing improve both their language and intercultural skills. Our experience so far has been quite positive and we have seen how students taking part in this project have developed as autonomous learners as well as enhanced both their linguistic and intercultural knowledge. As the linguistic element of our project was one of our main priorities, we asked the students to keep a reflective diary on the activities that were organised by the group in the TL. Also, we use questionnaires as well as personal interviews to assess their development. However, there are challenges and proposals we would make to bring this project forward for the near future.

Keywords: erasmus, intercultural competence, linguistic competence, extra curriculum activities

Procedia PDF Downloads 356
308 University Lecturers' Attitudes towards Learner Autonomy in the EFL Context in Vietnam

Authors: Nhung T. Bui

Abstract:

Part of the dilemma facing educational reforms in Vietnam as in other Asian contexts is how to encourage more independence in students’ learning approaches. Since 2005, the Ministry of Education and Training of Vietnam has included the students’ ability to learn independently in its national education objectives. While learner autonomy has been viewed as a goal in the teaching and learning English as a foreign language (EFL) and there has been a considerable literature on strategies to stimulate autonomy in learners, teachers’ voices have rarely been heard. Given that teachers play a central role in helping their students to be more autonomous, especially in an inherent Confucian heritage culture like Vietnam, their attitudes towards learner autonomy should be investigated before any practical implementations could be undertaken. This paper reports significant findings of a survey questionnaire with 262 lecturers of English from 5 universities in Hanoi, Vietnam giving opinions regarding the practices and prospects of learner autonomy in their classrooms. The study reveals that lecturers perceive they should be more responsible than their students in all class-related activities; they most appreciate their students’ ability to learn cooperatively and that they consider stimulating students’ interest as the most important teaching strategy to promote learner autonomy. Lecturers, then, are strongly suggested to gradually ‘empower’ their students through the application of out-of-classroom activities; of learning activities which requires collaboration and team spirit; and of activities which could boost students’ interest in learning English.

Keywords: English as a foreign language, higher education, learner autonomy, Vietnam

Procedia PDF Downloads 247
307 Psychodidactic Strategies to Facilitate Flow of Logical Thinking in Preparation of Academic Documents

Authors: Deni Stincer Gomez, Zuraya Monroy Nasr, Luis Pérez Alvarez

Abstract:

The preparation of academic documents such as thesis, articles and research projects is one of the requirements of the higher educational level. These documents demand the implementation of logical argumentative thinking which is experienced and executed with difficulty. To mitigate the effect of these difficulties this study designed a thesis seminar, with which the authors have seven years of experience. It is taught in a graduate program in Psychology at the National Autonomous University of Mexico. In this study the authors use the Toulmin model as a mental heuristic and for the application of a set of psychodidactic strategies that facilitate the elaboration of the plot and culmination of the thesis. The efficiency in obtaining the degree in the groups exposed to the seminar has increased by 94% compared to the 10% that existed in the generations that were not exposed to the seminar. In this article the authors will emphasize the psychodidactic strategies used. The Toulmin model alone does not guarantee the success achieved. A set of actions of a psychological nature (almost psychotherapeutic) and didactics of the teacher also seem to contribute. These are actions that derive from an understanding of the psychological, epistemological and ontogenetic obstacles and the most frequent errors in which thought tends to fall when it is demanded a logical course. The authors have grouped the strategies into three groups: 1) strategies to facilitate logical thinking, 2) strategies to strengthen the scientific self and 3) strategies to facilitate the act of writing the text. In this work the authors delve into each of them.

Keywords: psychodidactic strategies, logical thinking, academic documents, Toulmin model

Procedia PDF Downloads 158
306 Protein-Enrichment of Oilseed Meals by Triboelectrostatic Separation

Authors: Javier Perez-Vaquero, Katryn Junker, Volker Lammers, Petra Foerst

Abstract:

There is increasing importance to accelerate the transition to sustainable food systems by including environmentally friendly technologies. Our work focuses on protein enrichment and fractionation of agricultural side streams by dry triboelectrostatic separation technology. Materials are fed in particulate form into a system dispersed in a highly turbulent gas stream, whereby the high collision rate of particles against surfaces and other particles greatly enhances the electrostatic charge build-up over the particle surface. A subsequent step takes the charged particles to a delimited zone in the system where there is a highly uniform, intense electric field applied. Because the charge polarity acquired by a particle is influenced by its chemical composition, morphology, and structure, the protein-rich and fiber-rich particles of the starting material get opposite charge polarities, thus following different paths as they move through the region where the electric field is present. The output is two material fractions, which differ in their respective protein content. One is a fiber-rich, low-protein fraction, while the other is a high-protein, low-fiber composition. Prior to testing, materials undergo a milling process, and some samples are stored under controlled humidity conditions. In this way, the influence of both particle size and humidity content was established. We used two oilseed meals: lupine and rapeseed. In addition to a lab-scale separator to perform the experiments, the triboelectric separation process could be successfully scaled up to a mid-scale belt separator, increasing the mass feed from g/sec to kg/hour. The triboelectrostatic separation technology opens a huge potential for the exploitation of so far underutilized alternative protein sources. Agricultural side-streams from cereal and oil production, which are generated in high volumes by the industries, can further be valorized by this process.

Keywords: bench-scale processing, dry separation, protein-enrichment, triboelectrostatic separation

Procedia PDF Downloads 167