Search results for: nonuniformly distributed edge tension
2644 Ikat: Undaunted Journey of a Traditional Textile Practice, a Sublime Connect of Traditionality with Modernity and Calibration for Eco-Sustainable Options
Authors: Purva Khurana
Abstract:
Traditional textile crafts are universally found to have been significantly impeded by the uprise of innovative technologies, but sustained human endeavor, in sync with dynamic market nuances, holds key to these otherwise getting fast-extinct marvels. The metamorphosis of such art-forms into niche markets pre-supposes sharp concentration on adaptability. The author has concentrated on the ancient handicraft of Ikat in Andhra Pradesh (India), a manifestation of their cultural heritage and esoteric cottage industry, so very intrinsic to the development and support of local economy and identity. Like any other traditional practice, ikat weaving has been subjected to the challenges of modernization. However, owing to its unique character, personalize production and adaptability, both of material and process, ikat weaving has stood the test of time by way of judiciously embellishing innovation with contemporary taste. To survive as a living craft as also to justify its role as a universal language of aesthetic sensibility, it is imperative that ikat tradition should lend itself continuous process of experiments, change and growth. Besides, the instant paper aims to examine the contours of ikat production process from its pure form, to more fashion and market oriented production, with upgraded process, material and tools. Over the time, it has adapted well to new style-paradigms, duly matching up with the latest fashion trends, in tandem with the market-sensitivities. Apart, it is an effort to investigate how this craft could respond constructively to the pressure of contemporary technical developments in order to be at cutting edge, while preserving its integrity. In order to approach these issues, the methodology adopted is, conceptual analysis of the craft practices, its unique strength and how they could be used to advance the craft in relation to the emergence of technical developments. The paper summarizes the result of the study carried out by the author on the peculiar advantages of suitably- calibrated vat dyes over natural dyes, in terms of its recycling ability and eco-friendly properties, thus holding definite edge, both in terms of socio-economic as well as environmental concerns.Keywords: craft, eco-friendly dyes, ikat, metamorphosis
Procedia PDF Downloads 1742643 Secure Texting Used in a Post-Acute Pediatric Skilled Nursing Inpatient Setting: A Multidisciplinary Care Team Driven Communication System with Alarm and Alert Notification Management
Authors: Bency Ann Massinello, Nancy Day, Janet Fellini
Abstract:
Background: The use of an appropriate mode of communication among the multidisciplinary care team members regarding coordination of care is an extremely complicated yet important patient safety initiative. Effective communication among the team members(nursing staff, medical staff, respiratory therapists, rehabilitation therapists, patient-family services team…) become essential to develop a culture of trust and collaboration to deliver the highest quality care to patients are their families. The inpatient post-acute pediatrics, where children and their caregivers come for continuity of care, is no exceptions to the increasing use of text messages as a means to communication among clinicians. One such platform is the Vocera Communications (Vocera Smart Mobile App called Vocera Edge) allows the teams to use the application and share sensitive patient information through an encrypted platform using IOS company provided shared and assigned mobile devices. Objective: This paper discusses the quality initiative of implementing the transition from Vocera Smartbage to Vocera Edge Mobile App, technology advantage, use case expansion, and lessons learned about a secure alternative modality that allows sending and receiving secure text messages in a pediatric post-acute setting using an IOS device. This implementation process included all direct care staff, ancillary teams, and administrative teams on the clinical units. Methods: Our institution launched this transition from voice prompted hands-free Vocera Smartbage to Vocera Edge mobile based app for secure care team texting using a big bang approach during the first PDSA cycle. The pre and post implementation data was gathered using a qualitative survey of about 500 multidisciplinary team members to determine the ease of use of the application and its efficiency in care coordination. The technology was further expanded in its use by implementing clinical alerts and alarms notification using middleware integration with patient monitoring (Masimo) and life safety (Nurse call) systems. Additional use of the smart mobile iPhone use include pushing out apps like Lexicomp and Up to Date to have it readily available for users for evident-based practice in medication and disease management. Results: Successful implementation of the communication system in a shared and assigned model with all of the multidisciplinary teams in our pediatric post-acute setting. In just a 3-monthperiod post implementation, we noticed a 14% increase from 7,993 messages in 6 days in December 2020 to 9,116messages in March 2021. This confirmed that all clinical and non-clinical teams were using this mode of communication for coordinating the care for their patients. System generated data analytics used in addition to the pre and post implementation staff survey for process evaluation. Conclusion: A secure texting option using a mobile device is a safe and efficient mode for care team communication and collaboration using technology in real time. This allows for the settings like post-acute pediatric care areas to be in line with the widespread use of mobile apps and technology in our mainstream healthcare.Keywords: nursing informatics, mobile secure texting, multidisciplinary communication, pediatrics post acute care
Procedia PDF Downloads 1962642 Blockchain: Institutional and Technological Disruptions in the Public Sector
Authors: Maria Florencia Ferrer, Saulo Fabiano Amancio-Vieira
Abstract:
The use of the blockchain in the public sector is present today and no longer the future of disruptive institutional and technological models. There are still some cultural barriers and resistance to the proper use of its potential. This research aims to present the strengths and weaknesses of using a public-permitted and distributed network in the context of the public sector. Therefore, bibliographical/documentary research was conducted to raise the main aspects of the studied platform, focused on the use of the main demands of the public sector. The platform analyzed was LACChain, which is a global alliance composed of different actors in the blockchain environment, led by the Innovation Laboratory of the Inter-American Development Bank Group (IDB Lab) for the development of the blockchain ecosystem in Latin America and the Caribbean. LACChain provides blockchain infrastructure, which is a distributed ratio technology (DLT). The platform focuses on two main pillars: community and infrastructure. It is organized as a consortium for the management and administration of an infrastructure classified as public, following the ISO typologies (ISO / TC 307). It is, therefore, a network open to any participant who agrees with the established rules, which are limited to being identified and complying with the regulations. As benefits can be listed: public network (open to all), decentralized, low transaction cost, greater publicity of transactions, reduction of corruption in contracts / public acts, in addition to improving transparency for the population in general. It is also noteworthy that the platform is not based on cryptocurrency and is not anonymous; that is, it is possible to be regulated. It is concluded that the use of record platforms, such as LACChain, can contribute to greater security on the part of the public agent in the migration process of their informational applications.Keywords: blockchain, LACChain, public sector, technological disruptions
Procedia PDF Downloads 1722641 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy
Authors: Neda Seyyedi, Reza Berangi
Abstract:
Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.Keywords: VOIP networks, flooding attacks, entropy, computer networks
Procedia PDF Downloads 4052640 Comparative Study of Fatigue and Drowsiness in the Night-Time Passenger Transportation Industry in Japan
Authors: Hiroshi Ikeda
Abstract:
In this research, a questionnaire survey was conducted to measure nap, drowsiness and fatigue of drivers who work long shifts, to discuss about the work environment and health conditions for taxi and bus drivers who work at night time. The questionnaire sheet used for this research was organized into the following categories: tension/tiredness, drowsiness while driving, and the nap situation during night-time work. The number of taxi drivers was 127 and the number of bus drivers was 40. Concerning the results of a comparison of nap hours of taxi and bus drivers, the taxi drivers’ nap hours are overwhelmingly shorter, and also the frequency of drivers who feel drowsiness is higher. The burden on bus drivers does not change because of the system of a two-driver rotation shift. In particular, the working environment of the taxi driver may lead to greater fatigue accumulation than the bus driver’s environment.Keywords: bus and taxi, drowsiness, fatigue, nap
Procedia PDF Downloads 3272639 Statistical Modeling of Local Area Fading Channels Based on Triply Stochastic Filtered Marked Poisson Point Processes
Authors: Jihad Daba, Jean-Pierre Dubois
Abstract:
Multi path fading noise degrades the performance of cellular communication, most notably in femto- and pico-cells in 3G and 4G systems. When the wireless channel consists of a small number of scattering paths, the statistics of fading noise is not analytically tractable and poses a serious challenge to developing closed canonical forms that can be analysed and used in the design of efficient and optimal receivers. In this context, noise is multiplicative and is referred to as stochastically local fading. In many analytical investigation of multiplicative noise, the exponential or Gamma statistics are invoked. More recent advances by the author of this paper have utilized a Poisson modulated and weighted generalized Laguerre polynomials with controlling parameters and uncorrelated noise assumptions. In this paper, we investigate the statistics of multi-diversity stochastically local area fading channel when the channel consists of randomly distributed Rayleigh and Rician scattering centers with a coherent specular Nakagami-distributed line of sight component and an underlying doubly stochastic Poisson process driven by a lognormal intensity. These combined statistics form a unifying triply stochastic filtered marked Poisson point process model.Keywords: cellular communication, femto and pico-cells, stochastically local area fading channel, triply stochastic filtered marked Poisson point process
Procedia PDF Downloads 4482638 The Road to Tunable Structures: Comparison of Experimentally Characterised and Numerical Modelled Auxetic Perforated Sheet Structures
Authors: Arthur Thirion
Abstract:
Auxetic geometries allow the generation of a negative Poisson ratio (NPR) in conventional materials. This behaviour allows materials to have certain improved mechanical properties, including impact resistance and altered synclastic behaviour. This means these structures have significant potential when it comes to applications as chronic wound dressings. To this end, 6 different "perforated sheet" structure types were 3D printed. These structures all had variations of key geometrical features included cell length and angle. These were tested in compression and tension to assess their Poisson ratio. Both a positive and negative Poisson ratio was generated by the structures depending on the loading. The a/b ratio followed by θ has been shown to impact the Poisson ratio significantly. There is still a significant discrepancy between modelled and observed behaviour.Keywords: auxetic materials, 3D printing, negative Poisson's ratio, tunable Poisson's ratio
Procedia PDF Downloads 1162637 A Distributed Smart Battery Management System – sBMS, for Stationary Energy Storage Applications
Authors: António J. Gano, Carmen Rangel
Abstract:
Currently, electric energy storage systems for stationary applications have known an increasing interest, namely with the integration of local renewable energy power sources into energy communities. Li-ion batteries are considered the leading electric storage devices to achieve this integration, and Battery Management Systems (BMS) are decisive for their control and optimum performance. In this work, the advancement of a smart BMS (sBMS) prototype with a modular distributed topology is described. The system, still under development, has a distributed architecture with modular characteristics to operate with different battery pack topologies and charge capacities, integrating adaptive algorithms for functional state real-time monitoring and management of multicellular Li-ion batteries, and is intended for application in the context of a local energy community fed by renewable energy sources. This sBMS system includes different developed hardware units: (1) Cell monitoring units (CMUs) for interfacing with each individual cell or module monitoring within the battery pack; (2) Battery monitoring and switching unit (BMU) for global battery pack monitoring, thermal control and functional operating state switching; (3) Main management and local control unit (MCU) for local sBMS’s management and control, also serving as a communications gateway to external systems and devices. This architecture is fully expandable to battery packs with a large number of cells, or modules, interconnected in series, as the several units have local data acquisition and processing capabilities, communicating over a standard CAN bus and will be able to operate almost autonomously. The CMU units are intended to be used with Li-ion cells but can be used with other cell chemistries, with output voltages within the 2.5 to 5 V range. The different unit’s characteristics and specifications are described, including the different implemented hardware solutions. The developed hardware supports both passive and active methods for charge equalization, considered fundamental functionalities for optimizing the performance and the useful lifetime of a Li-ion battery package. The functional characteristics of the different units of this sBMS system, including different process variables data acquisition using a flexible set of sensors, can support the development of custom algorithms for estimating the parameters defining the functional states of the battery pack (State-of-Charge, State-of-Health, etc.) as well as different charge equalizing strategies and algorithms. This sBMS system is intended to interface with other systems and devices using standard communication protocols, like those used by the Internet of Things. In the future, this sBMS architecture can evolve to a fully decentralized topology, with all the units using Wi-Fi protocols and integrating a mesh network, making unnecessary the MCU unit. The status of the work in progress is reported, leading to conclusions on the system already executed, considering the implemented hardware solution, not only as fully functional advanced and configurable battery management system but also as a platform for developing custom algorithms and optimizing strategies to achieve better performance of electric energy stationary storage devices.Keywords: Li-ion battery, smart BMS, stationary electric storage, distributed BMS
Procedia PDF Downloads 1002636 Global Historical Distribution Range of Brown Bear (Ursus Arctos)
Authors: Tariq Mahmood, Faiza Lehrasab, Faraz Akrim, Muhammad Sajid nadeem, Muhammad Mushtaq, Unza waqar, Ayesha Sheraz, Shaista Andleeb
Abstract:
Brown bear (Ursus arctos), a member of the family Ursidae, is distributed in a wide range of habitats in North America, Europe and Asia. Suspectedly, the global distribution range of brown bears is decreasing at the moment due to various factors. The carnivore species is categorized as ‘Least Concern’ globally by the IUCN Red List of Threatened Species. However, there are some fragmented, small populations that are on the verge of extinction, as is in Pakistan, where the species is listed as ‘Critically Endangered’, with a declining population trend. Importantly, the global historical distribution range of brown bears is undocumented. Therefore, in the current study, we reconstructed and estimated the historical distribution range of brown bears using QGIS software and also analyzed the network of protected areas in the past and current ranges of the species. Results showed that brown bear was more widely distributed in historic times, encompassing 52.6 million km² area as compared to their current distribution of 38.8 million km², resulting in a total range contraction of up to approximately 28 %. In the past, a total of N = 62,234 protected Areas, covering approximately 3.89 million km² were present in the distribution range of the species, while now a total of N= 33,313 Protected Areas, covering approximately 2.75 million km² area, are present in the current distribution range of the brown bear. The brown bear distribution range in the protected areas has also contracted by 1.15 million km² and the total percentage reduction of PAs is 29%.Keywords: brown bear, historic distribution, range contraction, protected areas
Procedia PDF Downloads 602635 Efficient Modeling Technique for Microstrip Discontinuities
Authors: Nassim Ourabia, Malika Ourabia
Abstract:
A new and efficient method is presented for the analysis of arbitrarily shaped discontinuities. The technique obtains closed form expressions for the equivalent circuits which are used to model these discontinuities. Then it would be easy to handle and to characterize complicated structures like T and Y junctions, truncated junctions, arbitrarily shaped junctions, cascading junctions, and more generally planar multiport junctions. Another advantage of this method is that the edge line concept for arbitrary shape junctions operates with real parameters circuits. The validity of the method was further confirmed by comparing our results for various discontinuities (bend, filters) with those from HFSS as well as from other published sources.Keywords: CAD analysis, contour integral approach, microwave circuits, s-parameters
Procedia PDF Downloads 5162634 Fatigue Crack Initiation of Al-Alloys: Effect of Heat Treatment Condition
Authors: M. Benachour, N. Benachour, M. Benguediab
Abstract:
In this investigation an empirical study was made on fatigue crack initiation on 7075 T6 and 7075 T71 al-alloys under constant amplitude loading. At initiation stage, local strain approach at the notch was applied. Single Edge Notch Tensile specimen with semi circular notch is used. Based on experimental results, effect of mean stress, is highlights on fatigue initiation life. Results show that fatigue life initiation is affected by notch geometry and mean stress.Keywords: fatigue crack initiation, al-alloy, mean stress, heat treatment state
Procedia PDF Downloads 2332633 Wireless Communication in Sunlight
Authors: Karmveer Sheoran
Abstract:
To make wireless communication a vast success is to use sunlight for wireless communication. We can use sunlight in upper atmosphere to encode messages to efficiently use sunlight. This use of sunlight for wireless communication will need encoders which will encode sunlight according to our message and then resultant will be spread in all atmospheres wherever sunlight goes, it will take our messages with it. With minimum requirement of cost in equipment used at the edge of atmosphere is where sunlight is being encoded. In this way a very high efficient wireless communication system can be designed. On receiver side we will need light detectors which will detect sunlight variations and will finally give the information contained i it. Sunlight can be encoded at a very high speed that nobody will be annoyed by flickering. It will be most sophisticated and efficient wireless communication ever designed. There are far more possibilities in this sunlight communication. Let us call it “Sunlight Communication".Keywords: sunlight communication, emerging trends, wireless communication, wifi
Procedia PDF Downloads 4022632 An Online Mastery Learning Method Based on a Dynamic Formative Evaluation
Authors: Jeongim Kang, Moon Hee Kim, Seong Baeg Kim
Abstract:
This paper proposes a novel e-learning model that is based on a dynamic formative evaluation. On evaluating the existing format of e-learning, conditions regarding repetitive learning to achieve mastery, causes issues for learners to lose tension and become neglectful of learning. The dynamic formative evaluation proposed is able to supplement limitation of the existing approaches. Since a repetitive learning method does not provide a perfect feedback, this paper puts an emphasis on the dynamic formative evaluation that is able to maximize learning achievement. Through the dynamic formative evaluation, the instructor is able to refer to the evaluation result when making estimation about the learner. To show the flow chart of learning, based on the dynamic formative evaluation, the model proves its effectiveness and validity.Keywords: online learning, dynamic formative evaluation, mastery learning, repetitive learning method, learning achievement
Procedia PDF Downloads 5102631 Uncertainty Quantification of Crack Widths and Crack Spacing in Reinforced Concrete
Authors: Marcel Meinhardt, Manfred Keuser, Thomas Braml
Abstract:
Cracking of reinforced concrete is a complex phenomenon induced by direct loads or restraints affecting reinforced concrete structures as soon as the tensile strength of the concrete is exceeded. Hence it is important to predict where cracks will be located and how they will propagate. The bond theory and the crack formulas in the actual design codes, for example, DIN EN 1992-1-1, are all based on the assumption that the reinforcement bars are embedded in homogeneous concrete without taking into account the influence of transverse reinforcement and the real stress situation. However, it can often be observed that real structures such as walls, slabs or beams show a crack spacing that is orientated to the transverse reinforcement bars or to the stirrups. In most Finite Element Analysis studies, the smeared crack approach is used for crack prediction. The disadvantage of this model is that the typical strain localization of a crack on element level can’t be seen. The crack propagation in concrete is a discontinuous process characterized by different factors such as the initial random distribution of defects or the scatter of material properties. Such behavior presupposes the elaboration of adequate models and methods of simulation because traditional mechanical approaches deal mainly with average material parameters. This paper concerned with the modelling of the initiation and the propagation of cracks in reinforced concrete structures considering the influence of transverse reinforcement and the real stress distribution in reinforced concrete (R/C) beams/plates in bending action. Therefore, a parameter study was carried out to investigate: (I) the influence of the transversal reinforcement to the stress distribution in concrete in bending mode and (II) the crack initiation in dependence of the diameter and distance of the transversal reinforcement to each other. The numerical investigations on the crack initiation and propagation were carried out with a 2D reinforced concrete structure subjected to quasi static loading and given boundary conditions. To model the uncertainty in the tensile strength of concrete in the Finite Element Analysis correlated normally and lognormally distributed random filed with different correlation lengths were generated. The paper also presents and discuss different methods to generate random fields, e.g. the Covariance Matrix Decomposition Method. For all computations, a plastic constitutive law with softening was used to model the crack initiation and the damage of the concrete in tension. It was found that the distributions of crack spacing and crack widths are highly dependent of the used random field. These distributions are validated to experimental studies on R/C panels which were carried out at the Laboratory for Structural Engineering at the University of the German Armed Forces in Munich. Also, a recommendation for parameters of the random field for realistic modelling the uncertainty of the tensile strength is given. The aim of this research was to show a method in which the localization of strains and cracks as well as the influence of transverse reinforcement on the crack initiation and propagation in Finite Element Analysis can be seen.Keywords: crack initiation, crack modelling, crack propagation, cracks, numerical simulation, random fields, reinforced concrete, stochastic
Procedia PDF Downloads 1572630 A Case Study on Tension Drop of Cable-band Bolts in Suspension Bridge
Authors: Sihyun Park, Hyunwoo Kim, Wooyoung Jung, Dongwoo You
Abstract:
Regular maintenance works are very important on the axial forces of the cable-band bolts in suspension bridges. The band bolts show stress reduction for several reasons, including cable wire creep, the bolt relaxation, load fluctuation and cable rearrangements, etc., with time. In this study, with respect to the stress reduction that occurs over time, we carried out the theoretical review of the main cause based on the field measurements. As a result, the main cause of reduction in the cable-band bolt axial force was confirmed by the plastic deformation of the zinc plating layer used in the main cable wire, and thus, the theoretical process was established for the practical use in the field.Keywords: cable-band Bolts, field test, maintenance, stress reduction
Procedia PDF Downloads 3322629 Acacia mearnsii De Wild-A New Scourge on Cork Oak Forests of El Kala National Park (North-Eastern Algeria)
Authors: Samir Chekchaki, ArifaBeddiar
Abstract:
Nowadays, more and more species are introduced outside their natural range. If most of them remain difficult, some may adopt a much more dynamic behavior. Indeed, we have witnessed in recent decades, the development of high forests of Acacia mearnsii in El Kala National Park. Introduced indefinitely, this leguminous intended to make money (nitrogen supply for industrial plantations of Eucalyptus), became one of the most invasive and more costly in terms of forest management. It has crossed all barriers: it has acclimatized, naturalized and then expanded through diverse landscapes; entry into competition with native species such as cork oak and altered ecosystem functioning. Therefore, it is interesting to analyze this new threat by relying on plants as bio-indicator for assessing biodiversity at different scales. We have identified the species present in several plots distributed in a range of vegetation types subjected to different degrees of disturbance by using the braun-blanquet method. Fifty-six species have been recorded. They are distributed in 48 genera and 29 families. The analysis of the relative frequency of species correlated with relative abundance clearly shows that the Acacia mearnsii feels marginalized. The ecological analysis of this biological invasion shows that disruption of either natural or anthropogenic origin (fire, prolonged drought, cut) represent the factors that exacerbate invasion by opening invasion windows. The lifting of seeds of Acacia mearnsii lasting physical dormancy (and variable) is ensured by the thermal shock in relation to its heliophilous character.Keywords: Acacia mearnsii De Wild, El Kala National park, fire, invasive, vegetation
Procedia PDF Downloads 3572628 Efficient DNN Training on Heterogeneous Clusters with Pipeline Parallelism
Abstract:
Pipeline parallelism has been widely used to accelerate distributed deep learning to alleviate GPU memory bottlenecks and to ensure that models can be trained and deployed smoothly under limited graphics memory conditions. However, in highly heterogeneous distributed clusters, traditional model partitioning methods are not able to achieve load balancing. The overlap of communication and computation is also a big challenge. In this paper, HePipe is proposed, an efficient pipeline parallel training method for highly heterogeneous clusters. According to the characteristics of the neural network model pipeline training task, oriented to the 2-level heterogeneous cluster computing topology, a training method based on the 2-level stage division of neural network modeling and partitioning is designed to improve the parallelism. Additionally, a multi-forward 1F1B scheduling strategy is designed to accelerate the training time of each stage by executing the computation units in advance to maximize the overlap between the forward propagation communication and backward propagation computation. Finally, a dynamic recomputation strategy based on task memory requirement prediction is proposed to improve the fitness ratio of task and memory, which improves the throughput of the cluster and solves the memory shortfall problem caused by memory differences in heterogeneous clusters. The empirical results show that HePipe improves the training speed by 1.6×−2.2× over the existing asynchronous pipeline baselines.Keywords: pipeline parallelism, heterogeneous cluster, model training, 2-level stage partitioning
Procedia PDF Downloads 182627 A History of Knowledge Management: A Chronological Account from the 1970s to 2017
Authors: Alexslis N. Maindze
Abstract:
Knowledge management (KM) has become an imperative to modern business growth, competitive edge, and sustainability. Though there has been extensive research in the field, this literature overview showcases massive gaps that exist on the coverage of the field’s rich and fascinating history. Particularly, accounts of the history of KM are inconsistent and fragmentary in breadth and depth. This paper presents new insights into the history of KM from the early 70s when the actual coinage ‘knowledge management’ entered the literature. It reveals how knowledge over the years was shrouded in secrecy and subsumed by technology. It makes a clear distinction between the histories of the debate around knowledge and that of KM. The paper also finds a history of KM filled with skepticisms and engulfed by an ‘intellectual paradox’.Keywords: knowledge management history, secrecy, skepticism, intellectual paradox
Procedia PDF Downloads 2202626 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 1542625 In Situ Production of Nano-Cu on a Cotton Fabric Surface by Ink-Jet Printing
Authors: N. Zoghi, Laleh Maleknia , M. E. Olya
Abstract:
The nano-Cu particles were produced on cotton fabric substrate by ink-jet printing technology with water-soluble ink, which was based on copper. The surface tension and viscosity of the prepared inks were evaluated. The ink-jet printing process was repeated 1, 3, and 5 times in order to evaluate variations in the optical properties by changing thickness of printed film. Following initial drying of the printed film, the samples were annealed at different temperatures (150 °C, 200 °C and 250 °C) to determine the optimum temperature for the parameters set out in this experiment. The prepared nano-Cu particles were characterized by XRD and UV spectroscopy. The appearance of printed image and the nano-Cu particles morphology were observed by SEM. The results demonstrated that the ink-jet printing technology can be used to produce nano-particles on the cotton fabrics surface.Keywords: ink-jet printing, nano-cu, fabric ink, in situ production, cotton fabric, water-soluble ink, morphology
Procedia PDF Downloads 4282624 Load Balancing Technique for Energy - Efficiency in Cloud Computing
Authors: Rani Danavath, V. B. Narsimha
Abstract:
Cloud computing is emerging as a new paradigm of large scale distributed computing. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., three service models, and four deployment networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics models. Load balancing is one of the main challenges in cloud computing, which is required to distribute the dynamic workload across multiple nodes, to ensure that no single node is overloaded. It helps in optimal utilization of resources, enhancing the performance of the system. The goal of the load balancing is to minimize the resource consumption and carbon emission rate, that is the direct need of cloud computing. This determined the need of new metrics energy consumption and carbon emission for energy-efficiency load balancing techniques in cloud computing. Existing load balancing techniques mainly focuses on reducing overhead, services, response time and improving performance etc. In this paper we introduced a Technique for energy-efficiency, but none of the techniques have considered the energy consumption and carbon emission. Therefore, our proposed work will go towards energy – efficiency. So this energy-efficiency load balancing technique can be used to improve the performance of cloud computing by balancing the workload across all the nodes in the cloud with the minimum resource utilization, in turn, reducing energy consumption, and carbon emission to an extent, which will help to achieve green computing.Keywords: cloud computing, distributed computing, energy efficiency, green computing, load balancing, energy consumption, carbon emission
Procedia PDF Downloads 4492623 Towards an Understanding of Breaking and Coalescence Process in Bitumen Emulsions
Authors: Abdullah Khan, Per Redelius, Nicole Kringos
Abstract:
The breaking and coalescence process in bitumen emulsion strongly influence the performance of the cold mix asphalt (CMA) and this phase separation process is affected by the physio-chemical changes happening at the bitumen/water interface. In this paper, coalescence experiments of two bitumen droplets in an emulsion environment have been carried out by a newly developed test procedure. In this study, different types of emulsifiers were selected to understand the coalescence process with respect to changes in the water phase surface tension due to addition of different surfactants and other additives such as salts. The research showed that the relaxation kinetics of bitumen droplets varied with the type of emulsifier, its concentration as well as with and without presence of salt in the water phase. Moreover, kinetics of the coalescence process was also investigated with the temperature variation.Keywords: bitumen emulsions, breaking and coalescence, cold mix asphalt, emulsifiers, relaxation, salts
Procedia PDF Downloads 3382622 Vibration-Based Monitoring of Tensioning Stay Cables of an Extradosed Bridge
Authors: Chun-Chung Chen, Bo-Han Lee, Yu-Chi Sung
Abstract:
Monitoring the status of tensioning force of stay cables is a significant issue for the assessment of structural safety of extradosed bridges. Moreover, it is known that there is a high correlation between the existing tension force and the vibration frequencies of cables. This paper presents the characteristic of frequencies of stay cables of a field extradosed bridge by using vibration-based monitoring methods. The vibration frequencies of each stay cables were measured in stages from the beginning to the completion of bridge construction. The result shows that the vibration frequency variation trend of different lengths of cables at each measured stage is different. The observed feature can help the application of the bridge long-term monitoring system and contribute to the assessment of bridge safety.Keywords: vibration-based method, extradosed bridges, bridge health monitoring, bridge stay cables
Procedia PDF Downloads 1462621 Vortex Flows under Effects of Buoyant-Thermocapillary Convection
Authors: Malika Imoula, Rachid Saci, Renee Gatignol
Abstract:
A numerical investigation is carried out to analyze vortex flows in a free surface cylinder, driven by the independent rotation and differentially heated boundaries. As a basic uncontrolled isothermal flow, we consider configurations which exhibit steady axisymmetric toroidal type vortices which occur at the free surface; under given rates of the bottom disk uniform rotation and for selected aspect ratios of the enclosure. In the isothermal case, we show that sidewall differential rotation constitutes an effective kinematic means of flow control: the reverse flow regions may be suppressed under very weak co-rotation rates, while an enhancement of the vortex patterns is remarked under weak counter-rotation. However, in this latter case, high rates of counter-rotation reduce considerably the strength of the meridian flow and cause its confinement to a narrow layer on the bottom disk, while the remaining bulk flow is diffusion dominated and controlled by the sidewall rotation. The main control parameters in this case are the rotational Reynolds number, the cavity aspect ratio and the rotation rate ratio defined. Then, the study proceeded to consider the sensitivity of the vortex pattern, within the Boussinesq approximation, to a small temperature gradient set between the ambient fluid and an axial thin rod mounted on the cavity axis. Two additional parameters are introduced; namely, the Richardson number Ri and the Marangoni number Ma (or the thermocapillary Reynolds number). Results revealed that reducing the rod length induces the formation of on-axis bubbles instead of toroidal structures. Besides, the stagnation characteristics are significantly altered under the combined effects of buoyant-thermocapillary convection. Buoyancy, induced under sufficiently high Ri, was shown to predominate over the thermocapillay motion; causing the enhancement (suppression) of breakdown when the rod is warmer (cooler) than the ambient fluid. However, over small ranges of Ri, the sensitivity of the flow to surface tension gradients was clearly evidenced and results showed its full control over the occurrence and location of breakdown. In particular, detailed timewise evolution of the flow indicated that weak thermocapillary motion was sufficient to prevent the formation of toroidal patterns. These latter detach from the surface and undergo considerable size reduction while moving towards the bulk flow before vanishing. Further calculations revealed that the pattern reappears with increasing time as steady bubble type on the rod. However, in the absence of the central rod and also in the case of small rod length l, the flow evolved into steady state without any breakdown.Keywords: buoyancy, cylinder, surface tension, toroidal vortex
Procedia PDF Downloads 3582620 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel
Authors: Afif J. Arabi
Abstract:
On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory
Procedia PDF Downloads 442619 Improvement a Lower Bound of Energy for Some Family of Graphs, Related to Determinant of Adjacency Matrix
Authors: Saieed Akbari, Yousef Bagheri, Amir Hossein Ghodrati, Sima Saadat Akhtar
Abstract:
Let G be a simple graph with the vertex set V (G) and with the adjacency matrix A (G). The energy E (G) of G is defined to be the sum of the absolute values of all eigenvalues of A (G). Also let n and m be number of edges and vertices of the graph respectively. A regular graph is a graph where each vertex has the same number of neighbours. Given a graph G, its line graph L(G) is a graph such that each vertex of L(G) represents an edge of G; and two vertices of L(G) are adjacent if and only if their corresponding edges share a common endpoint in G. In this paper we show that for every regular graphs and also for every line graphs such that (G) 3 we have, E(G) 2nm + n 1. Also at the other part of the paper we prove that 2 (G) E(G) for an arbitrary graph G.Keywords: eigenvalues, energy, line graphs, matching number
Procedia PDF Downloads 2322618 Antibacterial Wound Dressing Based on Metal Nanoparticles Containing Cellulose Nanofibers
Authors: Mohamed Gouda
Abstract:
Antibacterial wound dressings based on cellulose nanofibers containing different metal nanoparticles (CMC-MNPs) were synthesized using an electrospinning technique. First, the composite of carboxymethyl cellulose containing different metal nanoparticles (CMC/MNPs), such as copper nanoparticles (CuNPs), iron nanoparticles (FeNPs), zinc nanoparticles (ZnNPs), cadmium nanoparticles (CdNPs) and cobalt nanoparticles (CoNPs) were synthesized, and finally, these composites were transferred to the electrospinning process. Synthesized CMC-MNPs were characterized using scanning electron microscopy (SEM) coupled with high-energy dispersive X-ray (EDX) and UV-visible spectroscopy used to confirm nanoparticle formation. The SEM images clearly showed regular flat shapes with semi-porous surfaces. All MNPs were well distributed inside the backbone of the cellulose without aggregation. The average particle diameters were 29-39 nm for ZnNPs, 29-33 nm for CdNPs, 25-33 nm for CoNPs, 23-27 nm for CuNPs and 22-26 nm for FeNPs. Surface morphology, water uptake and release of MNPs from the nanofibers in water and antimicrobial efficacy were studied. SEM images revealed that electrospun CMC-MNPs nanofibers are smooth and uniformly distributed without bead formation with average fiber diameters in the range of 300 to 450 nm. Fiber diameters were not affected by the presence of MNPs. TEM images showed that MNPs are present in/on the electrospun CMC-MNPs nanofibers. The diameter of the electrospun nanofibers containing MNPs was in the range of 300–450 nm. The MNPs were observed to be spherical in shape. The CMC-MNPs nanofibers showed good hydrophilic properties and had excellent antibacterial activity against the Gram-negative bacteria Escherichia coli and the Gram-positive bacteria Staphylococcus aureus.Keywords: electrospinning technique, metal nanoparticles, cellulosic nanofibers, wound dressing
Procedia PDF Downloads 3292617 Interfacial Instability and Mixing Behavior between Two Liquid Layers Bounded in Finite Volumes
Authors: Lei Li, Ming M. Chai, Xiao X. Lu, Jia W. Wang
Abstract:
The mixing process of two liquid layers in a cylindrical container includes the upper liquid with higher density rushing into the lower liquid with lighter density, the lower liquid rising into the upper liquid, meanwhile the two liquid layers having interactions with each other, forming vortices, spreading or dispersing in others, entraining or mixing with others. It is a complex process constituted of flow instability, turbulent mixing and other multiscale physical phenomena and having a fast evolution velocity. In order to explore the mechanism of the process and make further investigations, some experiments about the interfacial instability and mixing behavior between two liquid layers bounded in different volumes are carried out, applying the planar laser induced fluorescence (PLIF) and the high speed camera (HSC) techniques. According to the results, the evolution of interfacial instability between immiscible liquid develops faster than theoretical rate given by the Rayleigh-Taylor Instability (RTI) theory. It is reasonable to conjecture that some mechanisms except the RTI play key roles in the mixture process of two liquid layers. From the results, it is shown that the invading velocity of the upper liquid into the lower liquid does not depend on the upper liquid's volume (height). Comparing to the cases that the upper and lower containers are of identical diameter, in the case that the lower liquid volume increases to larger geometric space, the upper liquid spreads and expands into the lower liquid more quickly during the evolution of interfacial instability, indicating that the container wall has important influence on the mixing process. In the experiments of miscible liquid layers’ mixing, the diffusion time and pattern of the liquid interfacial mixing also does not depend on the upper liquid's volumes, and when the lower liquid volume increases to larger geometric space, the action of the bounded wall on the liquid falling and rising flow will decrease, and the liquid interfacial mixing effects will also attenuate. Therefore, it is also concluded that the volume weight of upper heavier liquid is not the reason of the fast interfacial instability evolution between the two liquid layers and the bounded wall action is limited to the unstable and mixing flow. The numerical simulations of the immiscible liquid layers’ interfacial instability flow using the VOF method show the typical flow pattern agree with the experiments. However the calculated instability development is much slower than the experimental measurement. The numerical simulation of the miscible liquids’ mixing, which applying Fick’s diffusion law to the components’ transport equation, shows a much faster mixing rate than the experiments on the liquids’ interface at the initial stage. It can be presumed that the interfacial tension plays an important role in the interfacial instability between the two liquid layers bounded in finite volume.Keywords: interfacial instability and mixing, two liquid layers, Planar Laser Induced Fluorescence (PLIF), High Speed Camera (HSC), interfacial energy and tension, Cahn-Hilliard Navier-Stokes (CHNS) equations
Procedia PDF Downloads 2482616 Axisymmetric Nonlinear Analysis of Point Supported Shallow Spherical Shells
Authors: M. Altekin, R. F. Yükseler
Abstract:
Geometrically nonlinear axisymmetric bending of a shallow spherical shell with a point support at the apex under linearly varying axisymmetric load was investigated numerically. The edge of the shell was assumed to be simply supported or clamped. The solution was obtained by the finite difference and the Newton-Raphson methods. The thickness of the shell was considered to be uniform and the material was assumed to be homogeneous and isotropic. Sensitivity analysis was made for two geometrical parameters. The accuracy of the algorithm was checked by comparing the deflection with the solution of point supported circular plates and good agreement was obtained.Keywords: Bending, Nonlinear, Plate, Point support, Shell.
Procedia PDF Downloads 2642615 Sustainability of Healthcare Insurance in India: A Review of Health Insurance Scheme Launched by States in India
Authors: Mohd Zuhair, Ram Babu Roy
Abstract:
This paper presents an overview of the accessibility, design, and functioning of health insurance plans launched by state governments in India. In recent years, the governments of several states in India have come forward to provide health insurance coverage for the low-income group and rural population to reduce the out of pocket expenditure (OPE) on healthcare. Different health insurance schemes have different structures and offerings which differ in the different demographic factors. This study will portray a comparative analysis of the various health insurance schemes by analyzing different offerings and finance generation of the schemes. The comparative analysis will explain the lesson to be learned from these schemes and extend the existing knowledge of the health insurance in India. This would help in recognizing tension between various drivers and identifying issues pertaining to the sustainability of health insurance schemes in India.Keywords: health insurance, out of pocket expenditure, universal healthcare, sustainability
Procedia PDF Downloads 238