Search results for: software reuse
4463 Reduce of the Consumption of Industrial Kilns a Pottery Kiln as Example, Recovery of Lost Energy Using a System of Heat Exchangers and Modeling of Heat Transfer Through the Walls of the Kiln
Authors: Maha Bakkari, Fatiha Lemmeni, Rachid Tadili
Abstract:
In this work, we present some characteristics of the furnace studied, its operating principle and the experimental measurements of the evolutions of the temperatures inside and outside the walls of the This work deals with the problem of energy consumption of pottery kilns whose energy consumption is relatively too high. In this work, we determined the sources of energy loss by studying the heat transfer of a pottery furnace, we proposed a recovery system to reduce energy consumption, and then we developed a numerical model modeling the transfers through the walls of the furnace and to optimize the insulation (reduce heat losses) by testing multiple insulators. The recovery and reuse of energy recovered by the recovery system will present a significant gain in energy consumption of the oven and cooking time. This research is one of the solutions that helps reduce the greenhouse effect of the planet earth, a problem that worries the world.Keywords: recovery lost energy, energy efficiency, modeling, heat transfer
Procedia PDF Downloads 884462 A New Reliability based Channel Allocation Model in Mobile Networks
Authors: Anujendra, Parag Kumar Guha Thakurta
Abstract:
The data transmission between mobile hosts and base stations (BSs) in Mobile networks are often vulnerable to failure. Thus, efficient link connectivity, in terms of the services of both base stations and communication channels of the network, is required in wireless mobile networks to achieve highly reliable data transmission. In addition, it is observed that the number of blocked hosts is increased due to insufficient number of channels during heavy load in the network. Under such scenario, the channels are allocated accordingly to offer a reliable communication at any given time. Therefore, a reliability-based channel allocation model with acceptable system performance is proposed as a MOO problem in this paper. Two conflicting parameters known as Resource Reuse factor (RRF) and the number of blocked calls are optimized under reliability constraint in this problem. The solution to such MOO problem is obtained through NSGA-II (Non-dominated Sorting Genetic Algorithm). The effectiveness of the proposed model in this work is shown with a set of experimental results.Keywords: base station, channel, GA, pareto-optimal, reliability
Procedia PDF Downloads 4094461 The Nature and Impact of Trojan Horses in Cybersecurity
Authors: Mehrab Faraghti
Abstract:
Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.Keywords: Trojan horses, cybersecurity, malware, data breach
Procedia PDF Downloads 154460 Harmonising the Circular Economy: An Analysis of 160 Papers
Authors: M. Novak, J. Dufourmount, D. Wildi, A. Sutherland, L. Sosa, J. Zimmer, E. Szabo
Abstract:
The circular economy has grounded itself amongst scholars and practitioners operating across governments and enterprises. The aim of this paper is to augment the circular economy concept by identifying common core and enabling circular business models. To this aim, we have analysed over 150 papers regarding circular activities and identified 8 clusters of business models and enablers. We have mapped and harmonised the most prominent frameworks conceptualising the circular economy. Our findings indicate that circular economy core business models include regenerative in addition to reduce, reuse and recycle activities. We further find enabling activities in design, digital technologies, knowledge development and sharing, multistakeholder collaborations, and extended corporate responsibility initiatives in various forms. We critically contrast the application of these business models across the European and African contexts. Overall, we find that seemingly varied circular economy definitions distill the same conceptual business models. We hope to contribute towards the coherence of the circular economy concept, and the continuous development of practical guidance to select and implement circular strategies.Keywords: Circular economy, content analysis, business models, definitions, enablers, frameworks
Procedia PDF Downloads 2264459 Finite Element Modeling Techniques of Concrete in Steel and Concrete Composite Members
Authors: J. Bartus, J. Odrobinak
Abstract:
The paper presents a nonlinear analysis 3D model of composite steel and concrete beams with web openings using the Finite Element Method (FEM). The core of the study is the introduction of basic modeling techniques comprehending the description of material behavior, appropriate elements selection, and recommendations for overcoming problems with convergence. Results from various finite element models are compared in the study. The main objective is to observe the concrete failure mechanism and its influence on the structural performance of numerical models of the beams at particular load stages. The bearing capacity of beams, corresponding deformations, stresses, strains, and fracture patterns were determined. The results show how load-bearing elements consisting of concrete parts can be analyzed using FEM software with various options to create the most suitable numerical model. The paper demonstrates the versatility of Ansys software usage for structural simulations.Keywords: Ansys, concrete, modeling, steel
Procedia PDF Downloads 1224458 "Revolutionizing Geographic Data: CADmapper's Automated Precision in CAD Drawing Transformation"
Authors: Toleen Alaqqad, Kadi Alshabramiy, Suad Zaafarany, Basma Musallam
Abstract:
CADmapper is a significant tool of software for transforming geographic data into realistic CAD drawings. It speeds up and simplifies the conversion process by automating it. This allows architects, urban planners, engineers, and geographic information system (GIS) experts to solely concentrate on the imaginative and scientific parts of their projects. While the future incorporation of AI has the potential for further improvements, CADmapper's current capabilities make it an indispensable asset in the business. It covers a combination of 2D and 3D city and urban area models. The user can select a specific square section of the map to view, and the fee is based on the dimensions of the area being viewed. The procedure is straightforward: you choose the area you want, then pick whether or not to include topography. 3D architectural data (if available), followed by selecting whatever design program or CAD style you want to publish the document which contains more than 200 free broad town plans in DXF format. If you desire to specify a bespoke area, it's free up to 1 km2.Keywords: cadmaper, gdata, 2d and 3d data conversion, automated cad drawing, urban planning software
Procedia PDF Downloads 684457 Design and Thermal Analysis of a Concrete House in Libya Using BEopt
Authors: Gamal Alamri, Tariq Iqbal
Abstract:
This paper presents an optimum designs and thermal analysis of concrete house in the hot climate of Libya. For this goal we have used BEopt software (building energy optimization) that provides capabilities for estimating residential building design and thermal analysis. The most area of the house that is exposed to the sunlight’s is the roof leading to heat gain. Therefore, house cooling consumes high energy. The cooling energy consumption is three times the heating energy consumption. In order to maintain comfortable indoor conditions in a low-energy house, the entire building envelope needs to be perfectly insulated and prevented from air leakages. Insulated roof is selected to reduce cooling demand, and the paper presents details and BEopt simulation results. Designed house needs 12.02mmbtus/year. Furthermore, the modeling indicates that the designed house is close to achieving the Passive standard.Keywords: concrete house design, thermal analysis, hot climate, BEopt software
Procedia PDF Downloads 4124456 BER Analysis of Energy Detection Spectrum Sensing in Cognitive Radio Using GNU Radio
Authors: B. Siva Kumar Reddy, B. Lakshmi
Abstract:
Cognitive Radio is a turning out technology that empowers viable usage of the spectrum. Energy Detector-based Sensing is the most broadly utilized spectrum sensing strategy. Besides, it is a lot of generic as receivers does not like any information on the primary user's signals, channel data, of even the sort of modulation. This paper puts forth the execution of energy detection sensing for AM (Amplitude Modulated) signal at 710 KHz, FM (Frequency Modulated) signal at 103.45 MHz (local station frequency), Wi-Fi signal at 2.4 GHz and WiMAX signals at 6 GHz. The OFDM/OFDMA based WiMAX physical layer with convolutional channel coding is actualized utilizing USRP N210 (Universal Software Radio Peripheral) and GNU Radio based Software Defined Radio (SDR). Test outcomes demonstrated the BER (Bit Error Rate) augmentation with channel noise and BER execution is dissected for different Eb/N0 (the energy per bit to noise power spectral density ratio) values.Keywords: BER, Cognitive Radio, GNU Radio, OFDM, SDR, WiMAX
Procedia PDF Downloads 5034455 Hybridization and Dynamic Performance Analysis of Three-Wheeler Electric Auto Rickshaw
Authors: Muhammad Asghar, A. I. Bhatti, T. Izhar
Abstract:
The three-wheeled auto-rickshaw with a two or four-stroke Gasoline, Liquid Petrolium Gas (LPG) or Compressed Natural Gas (CNG) engine is a petite, highly maneuverable vehicle and best suited for the small and heavily-congested roads and is an affordable means of transportation in Pakistan cities. However due to in-efficient engine design, it is a main cause of air-pollution in the shape of white smoke (CO2) (greenhouse gases) at the tail pipe. Due to the environmental pollution, a huge number of battery powered vehicles have been imported from all over the world to fulfill the need of country. Effect of degree of hybridization on fuel economy and acceleration performance has been discussed in this paper. From mild to full hybridization stages have been examined. Optimal level of hybridization ranges depending on the total driving power of vehicle are suggested. The degree of hybridization is varied and fuel economy is seen accordingly by using Advisor (NREL) software. The novel vehicle drive-train is modeled and simulated in the Advisor software.Keywords: advisor, hybridization, fuel economy, Three-Wheeled Rickshaw
Procedia PDF Downloads 5674454 Medical Knowledge Management since the Integration of Heterogeneous Data until the Knowledge Exploitation in a Decision-Making System
Authors: Nadjat Zerf Boudjettou, Fahima Nader, Rachid Chalal
Abstract:
Knowledge management is to acquire and represent knowledge relevant to a domain, a task or a specific organization in order to facilitate access, reuse and evolution. This usually means building, maintaining and evolving an explicit representation of knowledge. The next step is to provide access to that knowledge, that is to say, the spread in order to enable effective use. Knowledge management in the medical field aims to improve the performance of the medical organization by allowing individuals in the care facility (doctors, nurses, paramedics, etc.) to capture, share and apply collective knowledge in order to make optimal decisions in real time. In this paper, we propose a knowledge management approach based on integration technique of heterogeneous data in the medical field by creating a data warehouse, a technique of extracting knowledge from medical data by choosing a technique of data mining, and finally an exploitation technique of that knowledge in a case-based reasoning system.Keywords: data warehouse, data mining, knowledge discovery in database, KDD, medical knowledge management, Bayesian networks
Procedia PDF Downloads 3964453 Exploring the Potential of Blockchain to Improve Higher Education
Authors: Tony Cripps, Larry Kimber
Abstract:
This paper will begin by briefly explaining how blockchain technology works. Then, after highlighting a few of the ways it promises to heavily impact all aspects of the digital landscape, the focus will shift to Blockchain in the field of education, with specific emphasis placed on practical applications in foreign language education. Blockchain is a decentralized Internet-based software application that guarantees truth in transactions. This means whenever two parties engage in a transaction using Blockchain, it is time-stamped, added to a block of other transactions, and then permanently attached to an unalterable ‘chain’ of blocks. The potential for developing applications with Blockchain is therefore immense, since software systems that ensure the impossibility of outside tampering are invaluable. Innovative ideas in every imaginable domain are presently being entertained and Blockchain in education is no exception. For instance, records kept within and between institutions of students’ grade performance, academic achievement and verification of assignment/course completion are just a few examples of how this new technology might potentially be used to revolutionize education. It is hoped that this paper will be of use to all educators interested in the application of technology in the field of education.Keywords: blockchain, disruption, potential, technology
Procedia PDF Downloads 1384452 Consolidating Service Engineering Ontologies Building Service Ontology from SOA Modeling Language (SoaML)
Authors: Purnomo Yustianto, Robin Doss, Suhardi, Novianto Budi Kurniawan
Abstract:
As a term for characterizing a process of devising a service system, the term ‘service engineering’ is still regarded as an ‘open’ research challenge due to unspecified details and conflicting perspectives. This paper presents consolidated service engineering ontologies in collecting, specifying and defining relationship between components pertinent within the context of service engineering. The ontologies are built by way of literature surveys from the collected conceptual works by collating various concepts into an integrated ontology. Two ontologies are produced: general service ontology and software service ontology. The software-service ontology is drawn from the informatics domain, while the generalized ontology of a service system is built from both a business management and the information system perspective. The produced ontologies are verified by exercising conceptual operationalizations of the ontologies in adopting several service orientation features and service system patterns. The proposed ontologies are demonstrated to be sufficient to serve as a basis for a service engineering framework.Keywords: engineering, ontology, service, SoaML
Procedia PDF Downloads 1914451 An Intensional Conceptualization Model for Ontology-Based Semantic Integration
Authors: Fateh Adhnouss, Husam El-Asfour, Kenneth McIsaac, AbdulMutalib Wahaishi, Idris El-Feghia
Abstract:
Conceptualization is an essential component of semantic ontology-based approaches. There have been several approaches that rely on extensional structure and extensional reduction structure in order to construct conceptualization. In this paper, several limitations are highlighted relating to their applicability to the construction of conceptualizations in dynamic and open environments. These limitations arise from a number of strong assumptions that do not apply to such environments. An intensional structure is strongly argued to be a natural and adequate modeling approach. This paper presents a conceptualization structure based on property relations and propositions theory (PRP) to the model ontology that is suitable for open environments. The model extends the First-Order Logic (FOL) notation and defines the formal representation that enables interoperability between software systems and supports semantic integration for software systems in open, dynamic environments.Keywords: conceptualization, ontology, extensional structure, intensional structure
Procedia PDF Downloads 1164450 Empirical Investigation for the Correlation between Object-Oriented Class Lack of Cohesion and Coupling
Authors: Jehad Al Dallal
Abstract:
The design of the internal relationships among object-oriented class members (i.e., attributes and methods) and the external relationships among classes affects the overall quality of the object-oriented software. The degree of relatedness among class members is referred to as class cohesion and the degree to which a class is related to other classes is called class coupling. Well designed classes are expected to exhibit high cohesion and low coupling values. In this paper, using classes of three open-source Java systems, we empirically investigate the relation between class cohesion and coupling. In the empirical study, five lack-of-cohesion metrics and eight coupling metrics are considered. The empirical study results show that class cohesion and coupling internal quality attributes are inversely correlated. The strength of the correlation highly depends on the cohesion and coupling measurement approaches.Keywords: class cohesion measure, class coupling measure, object-oriented class, software quality
Procedia PDF Downloads 2364449 Translation and Adaptation of Computer Assisted ASPIRA Smoking Prevention Program in Romania
Authors: Z. Abram, V. Nadasan, J. Balint, J. L. Ferencz
Abstract:
Introduction: Online smoking prevention programs became popular in the last time. In order to extend the use of such programs, existing applications can be adapted and translated in the native languages of the target groups. It is the first time that in Romania such a software was implemented. Our goal was to provide a computer-aided intervention with attractive content targeting high school students who are familiar with information and communication technology. Material and methods: ASPIRA is the Romanian/Hungarian adapted version of a smoking prevention program created in USA. Prior to apply the questionnaire and ASPIRA online program which contains five modules that include tests, videos and interactive games, the program was tested in some IT laboratories on a group of schoolchildren and students. The pilot study questionnaires were completed considering the opinions of young people and the functionality of the software. Results: Above 90% of participants reported a good or very good impression about the ASPIRA program. Only a small minority found that the program included some parts which were too long or reported the existence of any technical problems regarding the functionality of the software. 76% of the participants had little or very little difficulty in understanding the messages presented by the English speaking characters. Only 7.5% of the participants thought that the program included content that was not appropriate for the local culture. Conclusions: The vast majority of students reported favorite impressions about ASPIRA online program. High school students and boys were more critical. Language and cultural barriers did not have the potential to reduce in a significant manner the effectiveness of the tested program.Keywords: smoking prevention, ASPIRA online program, youth opinions, language/cultural barriers
Procedia PDF Downloads 2624448 Initial Observations of the Utilization of Zoom Software for Synchronous English as a Foreign Language Oral Communication Classes at a Japanese University
Authors: Paul Nadasdy
Abstract:
In 2020, oral communication classes at many universities in Japan switched to online and hybrid lessons because of the coronavirus pandemic. Teachers had to adapt their practices immediately and deal with the challenges of the online environment. Even for experienced teachers, this still presented a problem as many had not conducted online classes before. Simultaneously, for many students, this type of learning was completely alien to them, and they had to adapt to the challenges faced by communicating in English online. This study collected data from 418 first grade students in the first semester of English communication classes at a technical university in Tokyo, Japan. Zoom software was used throughout the learning period. Though there were many challenges in the setting up and implementation of Zoom classes at the university, the results indicated that the students enjoyed the format and made the most of the circumstances. This proved the robustness of the course that was taught in regular lessons and the adaptability of teachers and students to challenges in a very short timeframe.Keywords: zoom, hybrid lessons, communicative english, online teaching
Procedia PDF Downloads 854447 Structural Morphing on High Performance Composite Hydrofoil to Postpone Cavitation
Authors: Fatiha Mohammed Arab, Benoit Augier, Francois Deniset, Pascal Casari, Jacques Andre Astolfi
Abstract:
For the top high performance foiling yachts, cavitation is often a limiting factor for take-off and top speed. This work investigates solutions to delay the onset of cavitation thanks to structural morphing. The structural morphing is based on compliant leading and trailing edge, with effect similar to flaps. It is shown here that the commonly accepted effect of flaps regarding the control of lift and drag forces can also be used to postpone the inception of cavitation. A numerical and experimental study is conducted in order to assess the effect of the geometric parameters of hydrofoil on their hydrodynamic performances and in cavitation inception. The effect of a 70% trailing edge and a 30% leading edge of NACA 0012 is investigated using Xfoil software at a constant Reynolds number 106. The simulations carried out for a range flaps deflections and various angles of attack. So, the result showed that the lift coefficient increase with the increase of flap deflection, but also with the increase of angle of attack and enlarged the bucket cavitation. To evaluate the efficiency of the Xfoil software, a 2D analysis flow over a NACA 0012 with leading and trailing edge flap was studied using Fluent software. The results of the two methods are in a good agreement. To validate the numerical approach, a passive adaptive composite model is built and tested in the hydrodynamic tunnel at the Research Institute of French Naval Academy. The model shows the ability to simulate the effect of flap by a LE and TE structural morphing due to hydrodynamic loading.Keywords: cavitation, flaps, hydrofoil, panel method, xfoil
Procedia PDF Downloads 1764446 A Novel Algorithm for Parsing IFC Models
Authors: Raninder Kaur Dhillon, Mayur Jethwa, Hardeep Singh Rai
Abstract:
Information technology has made a pivotal progress across disparate disciplines, one of which is AEC (Architecture, Engineering and Construction) industry. CAD is a form of computer-aided building modulation that architects, engineers and contractors use to create and view two- and three-dimensional models. The AEC industry also uses building information modeling (BIM), a newer computerized modeling system that can create four-dimensional models; this software can greatly increase productivity in the AEC industry. BIM models generate open source IFC (Industry Foundation Classes) files which aim for interoperability for exchanging information throughout the project lifecycle among various disciplines. The methods developed in previous studies require either an IFC schema or MVD and software applications, such as an IFC model server or a Building Information Modeling (BIM) authoring tool, to extract a partial or complete IFC instance model. This paper proposes an efficient algorithm for extracting a partial and total model from an Industry Foundation Classes (IFC) instance model without an IFC schema or a complete IFC model view definition (MVD). Procedia PDF Downloads 3004445 Analysis of Backward Supply Chain in Beverages Industry of Pakistan
Authors: Faisal Mehmood
Abstract:
In this globalization era, the supply chain management has acquired strategic importance in diverse business environments. In the current highly competitive business environment, the success of any business considerably depends on the efficiency of the supply chain. Management has now realized that due to the inefficiency of any member of supply chain, the profitability of the business will be affected. This paper proposes an analysis of backward supply chain in the beverages industry of Pakistan. Although reuse of products and materials is a common phenomenon, companies have long ignored this important part of the supply chain, known as backward supply chain or reverse logistics. The beverage industry is among the pioneers of backward supply chain or reverse logistics in Pakistan. The empty glass bottles are returned back from the point of consumption to the warehouse for refilling and reusability purposes. Due to the lack of information on reverse flow of logistics and more attention on the forward distribution, beverages industry in Pakistan is facing high rate of inefficiencies and ineffectiveness. Analysis of backward or reverse logistics practiced in beverages industry is the subject of this study in which framework dictating the current needs of market will be developed.Keywords: backward supply chain, reverse logistics, refilling, re-usability
Procedia PDF Downloads 3484444 Drying of Agro-Industrial Wastes Using an Indirect Solar Dryer
Authors: N. Metidji, N. Kasbadji Merzouk, O. Badaoui, R. Sellami, A. Djebli
Abstract:
The Agro-industry is considered as one of the most waste producing industrial fields as a result of food processing. Upgrading and reuse of these wastes as animal or poultry food seems to be a promising alternative. Combined with the use of clean energy resources, the recovery process would contribute more to the environment protection. It is in this framework that a new solar dryer has been designed in the Unit of Solar Equipments Development. Indirect solar drying has, also, many advantages compared to natural sun drying. In fact, the first does not cause product degradation as it is protected by the drying chamber from direct sun, insects and exterior environment. The aim of this work is to study the drying kinetics of waste, generated during the processing of orange to make fruit juice, by using an indirect forced convection solar dryer at 50 °C and 60 °C, the rate of moisture removal from the product to be dried has been found to be directly related to temperature, humidity and flow rate. The characterization of these parameters has allowed the determination of the appropriate drying time for this product namely orange waste.Keywords: solar energy, solar dryer, energy conversion, orange drying, forced convection solar dryer
Procedia PDF Downloads 3564443 Reliability Analysis of Steel Columns under Buckling Load in Second-Order Theory
Authors: Hamed Abshari, M. Reza Emami Azadi, Madjid Sadegh Azar
Abstract:
For studying the overall instability of members of steel structures, there are several methods in which overall buckling and geometrical imperfection effects are considered in analysis. In first section, these methods are compared and ability of software to apply these methods is studied. Buckling loads determined from theoretical methods and software is compared for 2D one bay, one and two stories steel frames. To consider actual condition, buckling loads of three steel frames that have various dimensions are calculated and compared. Also, uncertainties that exist in loading and modeling of structures such as geometrical imperfection, yield stress, and modulus of elasticity in buckling load of 2D framed steel structures have been studied. By performing these uncertainties to each reliability analysis procedures (first-order, second-order, and simulation methods of reliability), one index of reliability from each procedure is determined. These values are studied and compared.Keywords: buckling, second-order theory, reliability index, steel columns
Procedia PDF Downloads 4934442 Visual Intelligence: Perception, Image and Manipulation in Visual Communication
Authors: Poojitha Vemula
Abstract:
Understanding how we use image manipulation to communicate through an audience’s perceptions and conceive visual intelligence. With the use of many software and high-end skills, designers have developed a third eye to combine two different visuals and create the desired image by using photoshop and other software skills. The purpose of visual intelligence is to convey a message to the targeted audience. For instance, the images of models are retouched on their skin to make it more convincing and draw attention from the audience. There are many ways of manipulating an image, such as double exposure, retouching photography inks or paint airbrushing and piecing photos together, or enhancing the brightness and contrast. To understand visual intelligence, a questionnaire survey as well as research was conducted on how image manipulation is used by both the audience and the designers. This depends on the message that needs to be conveyed by the brands. For instance, Fair & Lovely, a brightening cream for ladies use a lot of retouching and effects to show the dramatic change the cream takes effect on dark or dusky faces. Thus the designer’s role is to use their third eye to incorporate the message into visuals. The research and questionnaire survey concludes the perceptions and manipulations used in visual communication. However this is all to make an effortless communication between the designer and the audience by using the skills of the designer and the features provided by the software. The objective of visual intelligence is to covet the message of the brands that advertise their products or services by using visuals through softwares. Conveying a message through visual intelligence requires an audiences perceptions and understanding from the visuals created by the artists or designers. Visual intelligence determines how we use our technical skills to retouch and manipulate an image for a better understanding to convey the message to the targeted audience. This also bridges the communication between the brand and the audience.Keywords: graphic design, visual communication, convey messages, photoshop, image manipulation
Procedia PDF Downloads 2224441 Optimization of a Cone Loudspeaker Parameter of Design Parameters by Analysis of a Narrow Acoustic Sound Pathway
Authors: Yue Hu, Xilu Zhao, Takao Yamaguchi, Manabu Sasajima, Yoshio Koike, Akira Hara
Abstract:
This study tried optimization of design parameter of a cone loudspeaker unit as an example of the high flexibility of the products design. We developed an acoustic analysis software program that considers the impact of damping caused by air viscosity. In sound reproduction, it is difficult to each design the parameter of the loudspeaker. To overcome the limitation of the design problem in practice, this paper proposes a new an acoustic analysis algorithm to optimize design the parameter of the loudspeaker. The material character of cone paper and the loudspeaker edge was the design parameter, and the vibration displacement of the cone paper was the objective function. The results of the analysis were compared with the predicted value. They had high accuracy to the predicted value. These results suggest that, though the parameter design is difficult by experience and intuition, it can be performed comparatively easily using the optimization design by the developed acoustic analysis software.Keywords: air viscosity, loudspeaker, cone paper, edge, optimization
Procedia PDF Downloads 4014440 A Comparative Study of the Challenges of E-Learning in Nigerian Universities
Authors: J. N. Anene, A. A. Bello, C. C. Anene
Abstract:
The paper carried out a comparative study of the challenges of e-learning in Nigerian universities. The purpose of the study was to determine if there was a significant difference in the challenges faced by students in e-learning in Nigerian Universities. A total of two hundred and twenty-eight students from nine universities constituted the sample for the study. A simple random sampling technique was employed in selecting thirty–two students from one of each university in the six geo-political zones of Nigeria. The questionnaire based on 'yes or no' and column charts constituted the instrument employed in the study. Percentages were used to analyse 'yes or no' while column charts were used to compare responds of the students. The finding of the study revealed that majority of students in all the universities under study claimed that their universities lacked appropriate software, that good quality educational content online was lacking, they also agreed that sustainability of e-learning was not prioritized, that they had no access to appropriate content for ICT-enhanced learning and training and that they had access to affordable and reliable computers. For lecturers, the computer certification should be the first on the list of promotion requirements. The finding of the study revealed that students from seven out of nine universities confirmed that their universities lack of appropriate software whereas the other two claimed that they have appropriate software. Also, out of nine universities, two disagreed to the fact that good quality educational content online lacked, whereas seven agreed that they lacked good quality educational content online. The finding of the study also revealed that most of the respondents in almost all the university under study agreed that sustainability of e-learning was not prioritized. The study recommended among other that the Nigerian Government should make concerted effort to provide the enablement for all lecturers and students to become computer literate. This should be done within a time frame, and at the end of the computer course, certificates should be issued, and no student should graduate in his or her field of study without passing the computer course.Keywords: e-learning, developing countries, computer literacy, ICT
Procedia PDF Downloads 3374439 Classifying and Analysis 8-Bit to 8-Bit S-Boxes Characteristic Using S-Box Evaluation Characteristic
Authors: Muhammad Luqman, Yusuf Kurniawan
Abstract:
S-Boxes is one of the linear parts of the cryptographic algorithm. The existence of S-Box in the cryptographic algorithm is needed to maintain non-linearity of the algorithm. Nowadays, modern cryptographic algorithms use an S-Box as a part of algorithm process. Despite the fact that several cryptographic algorithms today reuse theoretically secure and carefully constructed S-Boxes, there is an evaluation characteristic that can measure security properties of S-Boxes and hence the corresponding primitives. Analysis of an S-Box usually is done using manual mathematics calculation. Several S-Boxes are presented as a Truth Table without any mathematical background algorithm. Then, it’s rather difficult to determine the strength of Truth Table S-Box without a mathematical algorithm. A comprehensive analysis should be applied to the Truth Table S-Box to determine the characteristic. Several important characteristics should be owned by the S-Boxes, they are Nonlinearity, Balancedness, Algebraic degree, LAT, DAT, differential delta uniformity, correlation immunity and global avalanche criterion. Then, a comprehensive tool will be present to automatically calculate the characteristics of S-Boxes and determine the strength of S-Box. Comprehensive analysis is done on a deterministic process to produce a sequence of S-Boxes characteristic and give advice for a better S-Box construction.Keywords: cryptographic properties, Truth Table S-Boxes, S-Boxes characteristic, deterministic process
Procedia PDF Downloads 3654438 Numerical Simulation of the Bond Behavior Between Concrete and Steel Reinforcing Bars in Specialty Concrete
Authors: Camille A. Issa, Omar Masri
Abstract:
In the study, the commercial finite element software Abaqus was used to develop a three-dimensional nonlinear finite element model capable of simulating the pull-out test of reinforcing bars from underwater concrete. The results of thirty-two pull-out tests that have different parameters were implemented in the software to study the effect of the concrete cover, the bar size, the use of stirrups, and the compressive strength of concrete. The interaction properties used in the model provided accurate results in comparison with the experimental bond-slip results, thus the model has successfully simulated the pull-out test. The results of the finite element model are used to better understand and visualize the distribution of stresses in each component of the model, and to study the effect of the various parameters used in this study including the role of the stirrups in preventing the stress from reaching to the sides of the specimens.Keywords: pull-out test, bond strength, underwater concrete, nonlinear finite element analysis, abaqus
Procedia PDF Downloads 4424437 Study on the Demolition Waste Management in Malaysia Construction Industry
Authors: Gunalan Vasudevan
Abstract:
The Malaysia construction industry generates a large quantity of construction and demolition waste nowadays. In the handbook for demolition work only comprised small portion of demolition waste management. It is important to study and determine the ways to provide a practical guide for the professional in the building industry about handling the demolition waste. In general, demolition defined as tearing down or wrecking of structural work or architectural work of the building and other infrastructures work such as road, bridge and etc. It’s a common misconception that demolition is nothing more than taking down a structure and carrying the debris to a landfill. On many projects, 80-90% of the structure is kept for reuse or recycling which help the owner to save cost. Demolition contractors required a lot of knowledge and experience to minimize the impact of demolition work to the existing surrounding area. For data collecting method, postal questionnaires and interviews have been selected to collect data. Questionnaires have distributed to 80 respondents from the construction industry in Klang Valley. 67 of 80 respondents have replied the questionnaire while 4 people have interviewed. Microsoft Excel and Statistical Package for Social Science version 17.0 were used to analyze the data collected.Keywords: demolition, waste management, construction material, Malaysia
Procedia PDF Downloads 4454436 Optimal Cropping Pattern in an Irrigation Project: A Hybrid Model of Artificial Neural Network and Modified Simplex Algorithm
Authors: Safayat Ali Shaikh
Abstract:
Software has been developed for optimal cropping pattern in an irrigation project considering land constraint, water availability constraint and pick up flow constraint using modified Simplex Algorithm. Artificial Neural Network Models (ANN) have been developed to predict rainfall. AR (1) model used to generate 1000 years rainfall data to train the ANN. Simulation has been done with expected rainfall data. Eight number crops and three types of soil class have been considered for optimization model. Area under each crop and each soil class have been quantified using Modified Simplex Algorithm to get optimum net return. Efficacy of the software has been tested using data of large irrigation project in India.Keywords: artificial neural network, large irrigation project, modified simplex algorithm, optimal cropping pattern
Procedia PDF Downloads 2034435 Optimization of Adsorption Performance of Lignocellulosic Waste Pretreatment and Chemical Modification
Authors: Bendjelloul Meriem, Elandaloussi El Hadj
Abstract:
In this work, we studied the effectiveness of a lignocellulosic waste (wood sawdust) for the removal of cadmium Cd (II) in aqueous solution. The adsorbent material SBO-CH2-CO2Na has been prepared by alkaline pretreatment of wood sawdust followed by a chemical modification with sodium salt of chloroacetic acid. The characterization of the as-prepared material by FTIR has proven that the grafting of acetate spacer took actually place in the lignocellulosic backbone by the appearance of characteristic band of carboxylic groups in the IR spectrum. The removal study of Cd2+ by SBO-CH2-CO2Na material at the solid-liquid interface was carried out by kinetics, sorption isotherms, effect of temperature and thermodynamic parameters were evaluated. The last part of this work was dedicated to assess the regenerability of the adsorbent material after three reuse cycles. The results indicate that SBO-CH2-CO2Na matrix possesses a high effectiveness in removing Cd (II) with an adsorption capacity of 222.22 mg/g, yet a better value that those of many low-cost adsorbents so far reported in the literature. The results found in the course of this study suggest that ionic exchange is the most appropriate mechanism involved in the removal of cadmium ions.Keywords: adsorption, cadmium, isotherms, lignocellulosic, regenerability
Procedia PDF Downloads 3334434 Application of Federated Learning in the Health Care Sector for Malware Detection and Mitigation Using Software-Defined Networking Approach
Authors: A. Dinelka Panagoda, Bathiya Bandara, Chamod Wijetunga, Chathura Malinda, Lakmal Rupasinghe, Chethana Liyanapathirana
Abstract:
This research takes us forward with the concepts of Federated Learning and Software-Defined Networking (SDN) to introduce an efficient malware detection technique and provide a mitigation mechanism to give birth to a resilient and automated healthcare sector network system by also adding the feature of extended privacy preservation. Due to the daily transformation of new malware attacks on hospital Integrated Clinical Environment (ICEs), the healthcare industry is at an undefinable peak of never knowing its continuity direction. The state of blindness by the array of indispensable opportunities that new medical device inventions and their connected coordination offer daily, a factor that should be focused driven is not yet entirely understood by most healthcare operators and patients. This solution has the involvement of four clients in the form of hospital networks to build up the federated learning experimentation architectural structure with different geographical participation to reach the most reasonable accuracy rate with privacy preservation. While the logistic regression with cross-entropy conveys the detection, SDN comes in handy in the second half of the research to stack up the initial development phases of the system with malware mitigation based on policy implementation. The overall evaluation sums up with a system that proves the accuracy with the added privacy. It is no longer needed to continue with traditional centralized systems that offer almost everything but not privacy.Keywords: software-defined network, federated learning, privacy, integrated clinical environment, decentralized learning, malware detection, malware mitigation
Procedia PDF Downloads 190