Search results for: large eddy simulation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11357

Search results for: large eddy simulation

3437 Mothering in Self- Defined Challenging Circumstances: A Photo-Elicitation Study of Motherhood and the Role of Social Media

Authors: Joanna Apps, Elena Markova

Abstract:

Concepts of the ideal mother and ideal mothering are disseminated through familial experiences, religious and cultural depictions of mothers and the national media. In recent years social media can also be added to the channels by which mothers and motherhood are socially constructed. However, the gulf between these depictions, -or in the case of social media ‘self-curations’ - of motherhood and lived experience has never been wider, particularly for women in disadvantaged or difficult circumstances. We report on a study of four lone mothers who were living with one or more of the following: limiting long term illness, large families, in temporary accommodation and on low incomes. The mothers were interviewed 3 times and invited to take a series of photos reflecting their lives in between each of the interviews. These photographs were used to ground the interviews in lived experience and as stimuli to discuss how the images within them compared to portrayals of mothers and motherhood that participants were exposed to on social media. The objectives of the study were to explore how mothers construct their identity in challenging and disadvantaged circumstances; to consider what their photographs of everyday life tell us about their experiences and understand the impact idealised images of motherhood have on real mothers in difficult circumstances. The results suggested that the mothers both strived to adhere to certain ideals of motherhood and acknowledged elements of these as partially or wholly impossible to achieve. The lack of depictions, in both national and social media, of motherhood that corresponded with their lived experience inhibited the mothers’ use of social media. Other themes included: lack of control, frustration and strain; and parental pride, love, humour, resilience, and hope.

Keywords: motherhood, social media, photography, poverty

Procedia PDF Downloads 155
3436 A Study on the Different Components of a Typical Back-Scattered Chipless RFID Tag Reflection

Authors: Fatemeh Babaeian, Nemai Chandra Karmakar

Abstract:

Chipless RFID system is a wireless system for tracking and identification which use passive tags for encoding data. The advantage of using chipless RFID tag is having a planar tag which is printable on different low-cost materials like paper and plastic. The printed tag can be attached to different items in the labelling level. Since the price of chipless RFID tag can be as low as a fraction of a cent, this technology has the potential to compete with the conventional optical barcode labels. However, due to the passive structure of the tag, data processing of the reflection signal is a crucial challenge. The captured reflected signal from a tag attached to an item consists of different components which are the reflection from the reader antenna, the reflection from the item, the tag structural mode RCS component and the antenna mode RCS of the tag. All these components are summed up in both time and frequency domains. The effect of reflection from the item and the structural mode RCS component can distort/saturate the frequency domain signal and cause difficulties in extracting the desired component which is the antenna mode RCS. Therefore, it is required to study the reflection of the tag in both time and frequency domains to have a better understanding of the nature of the captured chipless RFID signal. The other benefits of this study can be to find an optimised encoding technique in tag design level and to find the best processing algorithm the chipless RFID signal in decoding level. In this paper, the reflection from a typical backscattered chipless RFID tag with six resonances is analysed, and different components of the signal are separated in both time and frequency domains. Moreover, the time domain signal corresponding to each resonator of the tag is studied. The data for this processing was captured from simulation in CST Microwave Studio 2017. The outcome of this study is understanding different components of a measured signal in a chipless RFID system and a discovering a research gap which is a need to find an optimum detection algorithm for tag ID extraction.

Keywords: antenna mode RCS, chipless RFID tag, resonance, structural mode RCS

Procedia PDF Downloads 186
3435 Agile Implementation of 'PULL' Principles in a Manufacturing Process Chain for Aerospace Composite Parts

Authors: Torsten Mielitz, Dietmar Schulz, York C. Roth

Abstract:

Market forecasts show a significant increase in the demand for aircraft within the next two decades and production rates will be adapted accordingly. Improvements and optimizations in the industrial system are becoming more important to cope with future challenges in manufacturing and assembly. Highest quality standards have to be met for aerospace parts, whereas cost effective production in industrial systems and methodologies are also a key driver. A look at other industries like e.g., automotive shows well established processes to streamline existing manufacturing systems. In this paper, the implementation of 'PULL' principles in an existing manufacturing process chain for a large scale composite part is presented. A nonlinear extrapolation based on 'Little's Law' showed a risk of a significant increase of parts needed in the process chain to meet future demand. A project has been set up to mitigate the risk whereas the methodology has been changed from a traditional milestone approach in the beginning towards an agile way of working in the end in order to facilitate immediate benefits in the shop-floor. Finally, delivery rates could be increased avoiding more semi-finished parts in the process chain (work in progress & inventory) by the successful implementation of the 'PULL' philosophy in the shop-floor between the work stations. Lessons learned during the running project as well as implementation and operations phases are discussed in order to share best practices.

Keywords: aerospace composite part manufacturing, PULL principles, shop-floor implementation, lessons learned

Procedia PDF Downloads 167
3434 ZnS and Graphene Quantum Dots Nanocomposite as Potential Electron Acceptor for Photovoltaics

Authors: S. M. Giripunje, Shikha Jindal

Abstract:

Zinc sulphide (ZnS) quantum dots (QDs) were synthesized successfully via simple sonochemical method. X-ray diffraction (XRD), scanning electron microscopy (SEM) and high resolution transmission electron microscopy (HRTEM) analysis revealed the average size of QDs of the order of 3.7 nm. The band gap of the QDs was tuned to 5.2 eV by optimizing the synthesis parameters. UV-Vis absorption spectra of ZnS QD confirm the quantum confinement effect. Fourier transform infrared (FTIR) analysis confirmed the formation of single phase ZnS QDs. To fabricate the diode, blend of ZnS QDs and P3HT was prepared and the heterojunction of PEDOT:PSS and the blend was formed by spin coating on indium tin oxide (ITO) coated glass substrate. The diode behaviour of the heterojunction was analysed, wherein the ideality factor was found to be 2.53 with turn on voltage 0.75 V and the barrier height was found to be 1.429 eV. ZnS-Graphene QDs nanocomposite was characterised for the surface morphological study. It was found that the synthesized ZnS QDs appear as quasi spherical particles on the graphene sheets. The average particle size of ZnS-graphene nanocomposite QDs was found to be 8.4 nm. From voltage-current characteristics of ZnS-graphene nanocomposites, it is observed that the conductivity of the composite increases by 104 times the conductivity of ZnS QDs. Thus the addition of graphene QDs in ZnS QDs enhances the mobility of the charge carriers in the composite material. Thus, the graphene QDs, with high specific area for a large interface, high mobility and tunable band gap, show a great potential as an electron-acceptors in photovoltaic devices.

Keywords: graphene, heterojunction, quantum confinement effect, quantum dots(QDs), zinc sulphide(ZnS)

Procedia PDF Downloads 148
3433 Biomphalaria alexandrina Snail as a Bio-Indicator of Pollution With Manganese Metal and Its Effect on Physiological, Immunological, Histopathological Parameters and Larvicidal Potencies

Authors: Amina M. Ibrahim, Ahmed A. Abdel-Haleem, Rania G. Taha

Abstract:

Metal pollution results in many dangerous consequences to the environment and human health due to the bioaccumulation in their tissues. The present study aims to measure the bioaccumulation factor of the Manganese (Mn) heavy metal in Biomphlaria alexandrina snails' tissues and water samples. The present results showed the concentration of Mn heavy metal in water (87.5 mg/l) and its bioaccumulation factor in Helisoma duryi tissue was higher than that in tissues of Physa acuta and B. alexandrina snails. Results showed that 87.5 mg/l Mn concentration had miracidial and cercaricidal activities. Also, this concentration decreased the mean total number of the hemocytes after exposure for 24h or 48h, while increased both the mean mortality and phagocytic indices of the hemocytes of exposed snails. It caused alterations in the cytomorphology of the hemocytes of exposed snails after 24 or 48h, where, the granulocytes had irregular cell membrane, and forming pseudopodia. Besides, both levels of Testosterone (T) and Estradiol (E) were increased after exposure to 87.5mg/l Mn metal compared to the control group. Also, it increased MDA (Malonaldehyde) and TAC (Total antioxidant capacity) contents, while, decreased SOD (superoxide dismutase). Besides, it caused great histopathological damages in both hermaphrodite and digestive glands, represented in the degeneration of the gonadal, digestive, secretory cells and the connective tissues. Therefore, B. alexandrina might be used as sensitive bio-indicator of pollution with Mn heavy metal to avoid ethics rules; beside they are easily available and large in number.

Keywords: manganese metal, B. alexandrina, hormonal alterations, histopathology

Procedia PDF Downloads 51
3432 MXene-Based Self-Sensing of Damage in Fiber Composites

Authors: Latha Nataraj, Todd Henry, Micheal Wallock, Asha Hall, Christine Hatter, Babak Anasori, Yury Gogotsi

Abstract:

Multifunctional composites with enhanced strength and toughness for superior damage tolerance are essential for advanced aerospace and military applications. Detection of structural changes prior to visible damage may be achieved by incorporating fillers with tunable properties such as two-dimensional (2D) nanomaterials with high aspect ratios and more surface-active sites. While 2D graphene with large surface areas, good mechanical properties, and high electrical conductivity seems ideal as a filler, the single-atomic thickness can lead to bending and rolling during processing, requiring post-processing to bond to polymer matrices. Lately, an emerging family of 2D transition metal carbides and nitrides, MXenes, has attracted much attention since their discovery in 2011. Metallic electronic conductivity and good mechanical properties, even with increased polymer content, coupled with hydrophilicity make MXenes a good candidate as a filler material in polymer composites and exceptional as multifunctional damage indicators in composites. Here, we systematically study MXene-based (Ti₃C₂) coated on glass fibers for fiber reinforced polymer composite for self-sensing using microscopy and micromechanical testing. Further testing is in progress through the investigation of local variations in optical, acoustic, and thermal properties within the damage sites in response to strain caused by mechanical loading.

Keywords: damage sensing, fiber composites, MXene, self-sensing

Procedia PDF Downloads 116
3431 Iterative Method for Lung Tumor Localization in 4D CT

Authors: Sarah K. Hagi, Majdi Alnowaimi

Abstract:

In the last decade, there were immense advancements in the medical imaging modalities. These advancements can scan a whole volume of the lung organ in high resolution images within a short time. According to this performance, the physicians can clearly identify the complicated anatomical and pathological structures of lung. Therefore, these advancements give large opportunities for more advance of all types of lung cancer treatment available and will increase the survival rate. However, lung cancer is still one of the major causes of death with around 19% of all the cancer patients. Several factors may affect survival rate. One of the serious effects is the breathing process, which can affect the accuracy of diagnosis and lung tumor treatment plan. We have therefore developed a semi automated algorithm to localize the 3D lung tumor positions across all respiratory data during respiratory motion. The algorithm can be divided into two stages. First, a lung tumor segmentation for the first phase of the 4D computed tomography (CT). Lung tumor segmentation is performed using an active contours method. Then, localize the tumor 3D position across all next phases using a 12 degrees of freedom of an affine transformation. Two data set where used in this study, a compute simulate for 4D CT using extended cardiac-torso (XCAT) phantom and 4D CT clinical data sets. The result and error calculation is presented as root mean square error (RMSE). The average error in data sets is 0.94 mm ± 0.36. Finally, evaluation and quantitative comparison of the results with a state-of-the-art registration algorithm was introduced. The results obtained from the proposed localization algorithm show a promising result to localize alung tumor in 4D CT data.

Keywords: automated algorithm , computed tomography, lung tumor, tumor localization

Procedia PDF Downloads 596
3430 Dynamic and Thermal Characteristics of Three-Dimensional Turbulent Offset Jet

Authors: Ali Assoudi, Sabra Habli, Nejla Mahjoub Saïd, Philippe Bournot, Georges Le Palec

Abstract:

Studying the flow characteristics of a turbulent offset jet is an important topic among researchers across the world because of its various engineering applications. Some of the common examples include: injection and carburetor systems, entrainment and mixing process in gas turbine and boiler combustion chambers, Thrust-augmenting ejectors for V/STOL aircrafts and HVAC systems, environmental dischargers, film cooling and many others. An offset jet is formed when a jet discharges into a medium above a horizontal solid wall parallel to the axis of the jet exit but which is offset by a certain distance. The structure of a turbulent offset-jet can be described by three main regions. Close to the nozzle exit, an offset jet possesses characteristic features similar to those of free jets. Then, the entrainment of fluid between the jet, the offset wall and the bottom wall creates a low pressure zone, forcing the jet to deflect towards the wall and eventually attaches to it at the impingement point. This is referred to as the Coanda effect. Further downstream after the reattachment point, the offset jet has the characteristics of a wall jet flow. Therefore, the offset jet has characteristics of free, impingement and wall jets, and it is relatively more complex compared to these types of flows. The present study examines the dynamic and thermal evolution of a 3D turbulent offset jet with different offset height ratio (the ratio of the distance from the jet exit to the impingement bottom wall and the jet nozzle diameter). To achieve this purpose a numerical study was conducted to investigate a three-dimensional offset jet flow through the resolution of the different governing Navier–Stokes’ equations by means of the finite volume method and the RSM second-order turbulent closure model. A detailed discussion has been provided on the flow and thermal characteristics in the form of streamlines, mean velocity vector, pressure field and Reynolds stresses.

Keywords: offset jet, offset ratio, numerical simulation, RSM

Procedia PDF Downloads 301
3429 A Prediction of Cutting Forces Using Extended Kienzle Force Model Incorporating Tool Flank Wear Progression

Authors: Wu Peng, Anders Liljerehn, Martin Magnevall

Abstract:

In metal cutting, tool wear gradually changes the micro geometry of the cutting edge. Today there is a significant gap in understanding the impact these geometrical changes have on the cutting forces which governs tool deflection and heat generation in the cutting zone. Accurate models and understanding of the interaction between the work piece and cutting tool leads to improved accuracy in simulation of the cutting process. These simulations are useful in several application areas, e.g., optimization of insert geometry and machine tool monitoring. This study aims to develop an extended Kienzle force model to account for the effect of rake angle variations and tool flank wear have on the cutting forces. In this paper, the starting point sets from cutting force measurements using orthogonal turning tests of pre-machined flanches with well-defined width, using triangular coated inserts to assure orthogonal condition. The cutting forces have been measured by dynamometer with a set of three different rake angles, and wear progression have been monitored during machining by an optical measuring collaborative robot. The method utilizes the measured cutting forces with the inserts flank wear progression to extend the mechanistic cutting forces model with flank wear as an input parameter. The adapted cutting forces model is validated in a turning process with commercial cutting tools. This adapted cutting forces model shows the significant capability of prediction of cutting forces accounting for tools flank wear and different-rake-angle cutting tool inserts. The result of this study suggests that the nonlinear effect of tools flank wear and interaction between the work piece and the cutting tool can be considered by the developed cutting forces model.

Keywords: cutting force, kienzle model, predictive model, tool flank wear

Procedia PDF Downloads 103
3428 Influence of Gender, Race, and Psychiatric Disorders on Sun Protective Behavior and Outcomes: A Population-Based Study

Authors: Holly D. Shan, Monique L. Bautista Neughebauer

Abstract:

Sunscreen usage is emphasized in public health strategy as it reduces the risk of sunburns and skin cancers. This study aims to explore factors that influence sun protective behavior and outcomes. Data was received from the National Health Interview Survey (NHIS) 2020. Adults were asked how often they wore sunscreen when outside on a sunny day. Consistent use (“always”) of sunscreen, the incidence of sunburn within a year, and ever having a diagnosis of skin melanoma were compared by gender, race, and the diagnosis of anxiety, depression, and dementia. Individuals identifying as a mixed race were excluded. Statistical analysis was adjusted for large-scale surveys using STATA VSN 7.0, and a two-sided p<0.05 was considered significant. Of the 37,352 participants (53.18% females, 75.01% white, 10.49% black, 0.76% Indian Americans,5.60% Asian), 13.11% had a diagnosis of anxiety, 14.78% depression, and 0.84% dementia. Females wore sunscreen more often than males (24.72% vs. 10.91%, p<0.001). White individuals wore sunscreen most frequently; black individuals the least (17.37% vs. 6.49%, p<0.001). White individuals had the highest rate of sunburn (25.61%, p<0.001) and a history of skin melanoma (3.38%, p<0.001). Participants with anxiety, depression, and dementia all had statistically significantly decreased sunscreen use and increased frequency of sunburn compared to the general population. Only those with dementia had an increased incidence of skin melanoma (2.85% vs. 1.22%, p=0.009). Dermatologists and public health professionals should consider gender, race, and psychiatric comorbidities when counseling patients on sun protection.

Keywords: sun protective behavior, psychiatric disorder, melanoma, sunburn

Procedia PDF Downloads 86
3427 Research on Spatial Distribution of Service Facilities Based on Innovation Function: A Case Study of Zhejiang University Zijin Co-Maker Town

Authors: Zhang Yuqi

Abstract:

Service facilities are the boosters for the cultivation and development of innovative functions in innovative cluster areas. At the same time, reasonable service facilities planning can better link the internal functional blocks. This paper takes Zhejiang University Zijin Co-Maker Town as the research object, based on the combination of network data mining and field research and verification, combined with the needs of its internal innovative groups. It studies the distribution characteristics and existing problems of service facilities and then proposes a targeted planning suggestion. The main conclusions are as follows: (1) From the perspective of view, the town is rich in general life-supporting services, but lacking of provision targeted and distinctive service facilities for innovative groups; (2) From the perspective of scale structure, small-scale street shops are the main business form, lack of large-scale service center; (3) From the perspective of spatial structure, service facilities layout of each functional block is too fragile to fit the characteristics of 2aggregation- distribution' of innovation and entrepreneurial activities; (4) The goal of optimizing service facilities planning should be guided for fostering function of innovation and entrepreneurship and meet the actual needs of the innovation and entrepreneurial groups.

Keywords: the cultivation of innovative function, Zhejiang University Zijin Co-Maker Town, service facilities, network data mining, space optimization advice

Procedia PDF Downloads 109
3426 Healing to Be a Man or Living in the Truth: Comparison on the Concept of Healing between Foucault and Chan

Authors: Jing Li Hong

Abstract:

This study compared Michel Foucault’s thoughts and the Chan School’s thoughts on the idea of healing. Healing is not an unfamiliar idea in Buddhist thoughts. The paired concepts of illness and medicine are often used as a metaphor to describe the relationship between people and truth. Foucault investigated the topic of care of self in his later studies and dedicated a large portion of his final semester course at the Collège de France in 1984 to discuss the meaning of Socrates’s offering of a sacrifice to the god of medicine in Phaedo. Foucault indicated a key preposition in ancient philosophy, namely healing. His idea of healing also addressed the relationship between subject and truth. From this relationship, Foucault unraveled his novel study on truth, namely the technologies of the self, with an emphasis on the care of self. Whereas numerous philosophers ask obvious questions such as ‘what is truth’ and ‘how to learn about truth,’ Foucault proposed distinct questions such as ‘what is our relationship to truth’ and ‘how does our relationship with truth turn us into who we are now?’ Thus, healing in both Buddhist and Foucault’s thoughts is related to the relationship between being and truth. This study first reviews Buddhist and Foucault’s ideas of healing to explicate what is illness and what is medicine. Because Buddhist thoughts cover an extensive scope, this study focuses on the thoughts of the Chan School. The second part is a discussion on medicine (treatment), specifically what is used as the medicine for the illness in both thoughts, and how can this medicine treat the illness. This part includes a description and comparison of the use of concepts of negation in these two thought groups. Finally, the subjects that practice the technologies of the self in both groups are compared from the idea of care of self; in other words, the differences between the subjects formed by the different relationships between being and truth are analyzed.

Keywords: Chan, heterogeneous, living style, language of paradox, Michel Foucault, negation, parrhesia, the care of self

Procedia PDF Downloads 175
3425 Risk Factors and Biomarkers for the Recurrence of Ovarian Endometrioma: About the Immunoreactivity of Progesterone Receptor Isoform B and Nuclear Factor Kappa B.

Authors: Ae Ra Han, Taek Hoo Lee, Sun Zoo Kim, Hwa Young Lee

Abstract:

Introduction: Ovarian endometrioma is one of the important causes of poor ovarian reserve and up to half of them have recurred. However, the treatment for recurrence prevention has limited efficiency and repeated surgical management makes worsen the ovarian reserve. To find better management for recurrence prevention, we investigated risk factors and biomarkers for the recurrence of ovarian endometrioma. Methods: The medical records of women with the history of surgical dissection for ovarian endometrioma were collected. After exclusion of the cases with concurrent hysterectomy, been menopaused during follow-up, incomplete medical record, and loss of follow-up, a total of 134 women were enrolled. Immunohistochemical staining for progesterone receptor isoform B (PR-B) and nuclear factor kappa B (NFκB) was done with the fixed tissue blocks of their endometriomas which were collected at the time of surgery. Results: Severity of dysmenorrhea and co-existence of adenomyosis had significant correlation with recurrence of endometrioma. Increased PR-B (P = .041) and decreased NFκB (P = .036) immunoreactivity were found in recurrent group. Serum CA-125 level at the time of recurrence was higher than the highest level of CA-125 during follow-up in unrecurred group (55.6 vs. 21.3 U/mL, P = .014). Conclusion: We found that the severity of dysmenorrhea and coexistence of adenomyosis are risk factors for recurrence of ovarian endometrioma, and serial follow-up of CA-125 is effective to detect and prevent the recurrence. However, to determine the possibility of immunoreactivity of PR-B and NFκB as biomarkers for ovarian endometrioma, further studies of various races and large numbers with prospective design are needed.

Keywords: endometriosis, recurrence, biomarker, risk factor

Procedia PDF Downloads 549
3424 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 401
3423 Design and Simulation of an Inter-Satellite Optical Wireless Communication System Using Diversity Techniques

Authors: Sridhar Rapuru, D. Mallikarjunreddy, Rajanarendra Sai

Abstract:

In this reign of the internet, the access of any multimedia file to the users at any time with a superior quality is needed. To achieve this goal, it is very important to have a good network without any interruptions between the satellites along with various earth stations. For that purpose, a high speed inter-satellite optical wireless communication system (IsOWC) is designed with space and polarization diversity techniques. IsOWC offers a high bandwidth, small size, less power requirement and affordable when compared with the present microwave satellite systems. To improve the efficiency and to reduce the propagation delay, inter-satellite link is established between the satellites. High accurate tracking systems are required to establish the reliable connection between the satellites as they have their own orbits. The only disadvantage of this IsOWC system is laser beam width is narrower than the RF because of this highly accurate tracking system to meet this requirement. The satellite uses the 'ephemerides data' for rough pointing and tracking system for fine pointing to the other satellite. In this proposed IsOWC system, laser light is used as a wireless connectedness between the source and destination and free space acts as the channel to carry the message. The proposed system will be designed, simulated and analyzed for 6000km with an improvement of data rate over previously existing systems. The performance parameters of the system are Q-factor, eye opening, bit error rate, etc., The proposed system for Inter-satellite Optical Wireless Communication System Design Using Diversity Techniques finds huge scope of applications in future generation communication purposes.

Keywords: inter-satellite optical wireless system, space and polarization diversity techniques, line of sight, bit error rate, Q-factor

Procedia PDF Downloads 260
3422 Tailoring of ECSS Standard for Space Qualification Test of CubeSat Nano-Satellite

Authors: B. Tiseo, V. Quaranta, G. Bruno, G. Sisinni

Abstract:

There is an increasing demand of nano-satellite development among universities, small companies, and emerging countries. Low-cost and fast-delivery are the main advantages of such class of satellites achieved by the extensive use of commercial-off-the-shelf components. On the other side, the loss of reliability and the poor success rate are limiting the use of nano-satellite to educational and technology demonstration and not to the commercial purpose. Standardization of nano-satellite environmental testing by tailoring the existing test standard for medium/large satellites is then a crucial step for their market growth. Thus, it is fundamental to find the right trade-off between the improvement of reliability and the need to keep their low-cost/fast-delivery advantages. This is particularly even more essential for satellites of CubeSat family. Such miniaturized and standardized satellites have 10 cm cubic form and mass no more than 1.33 kilograms per 1 unit (1U). For this class of nano-satellites, the qualification process is mandatory to reduce the risk of failure during a space mission. This paper reports the description and results of the space qualification test campaign performed on Endurosat’s CubeSat nano-satellite and modules. Mechanical and environmental tests have been carried out step by step: from the testing of the single subsystem up to the assembled CubeSat nano-satellite. Functional tests have been performed during all the test campaign to verify the functionalities of the systems. The test duration and levels have been selected by tailoring the European Space Agency standard ECSS-E-ST-10-03C and GEVS: GSFC-STD-7000A.

Keywords: CubeSat, nano-satellite, shock, testing, vibration

Procedia PDF Downloads 176
3421 Cache Analysis and Software Optimizations for Faster on-Chip Network Simulations

Authors: Khyamling Parane, B. M. Prabhu Prasad, Basavaraj Talawar

Abstract:

Fast simulations are critical in reducing time to market in CMPs and SoCs. Several simulators have been used to evaluate the performance and power consumed by Network-on-Chips. Researchers and designers rely upon these simulators for design space exploration of NoC architectures. Our experiments show that simulating large NoC topologies take hours to several days for completion. To speed up the simulations, it is necessary to investigate and optimize the hotspots in simulator source code. Among several simulators available, we choose Booksim2.0, as it is being extensively used in the NoC community. In this paper, we analyze the cache and memory system behaviour of Booksim2.0 to accurately monitor input dependent performance bottlenecks. Our measurements show that cache and memory usage patterns vary widely based on the input parameters given to Booksim2.0. Based on these measurements, the cache configuration having least misses has been identified. To further reduce the cache misses, we use software optimization techniques such as removal of unused functions, loop interchanging and replacing post-increment operator with pre-increment operator for non-primitive data types. The cache misses were reduced by 18.52%, 5.34% and 3.91% by employing above technology respectively. We also employ thread parallelization and vectorization to improve the overall performance of Booksim2.0. The OpenMP programming model and SIMD are used for parallelizing and vectorizing the more time-consuming portions of Booksim2.0. Speedups of 2.93x and 3.97x were observed for the Mesh topology with 30 × 30 network size by employing thread parallelization and vectorization respectively.

Keywords: cache behaviour, network-on-chip, performance profiling, vectorization

Procedia PDF Downloads 189
3420 Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems

Authors: Chuan-Ching Sue, Kai-Chun Chuang

Abstract:

Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay.

Keywords: peer-to-peer, live video streaming system, flash crowd, start-up delay, access control

Procedia PDF Downloads 312
3419 Ethnopharmacological Survey of Medicinal Plants Used in Southwest Algeria to Treat Gastro-Intestinal Ailments

Authors: Karima Sekkoum Abdelkrim Cheriti, Leila Feguigui

Abstract:

Algeria has a large plant biodiversity accounting more than 4125 species (123 Families) and is endowed with resources of medicinal plants growing on various bioclimatic zones from subhumide to semi-arid and Saharan. On the other hand, the ethnopharmacology investigation remains the principal way to improve, evaluate, and finding bioactive substances derived from medicinal plants. In continuation of our works in Saharan ethpharmacopeae and phytochemistry of Saharan medicinal plants, we focus our attention on the importance of local ethnopharmacology especially to treat gastro-intestinal disorders in the south west of Algeria (El Baydh, Naama and Bechar region) as platform for bioactive substances discovery and further development. Our present investigation deals with an ethnopharmacological study on medicinal plants used for the treatment of gastro-intestinal disorders in the south west of Algeria. The study presents the uses of plants in local traditional herbal medicines, determines the homogeneity of informant traditional knowledge and the preferred medicinal plants used to treat gastro-intestinal disorders. The results indicated that Asteraceae and Lamiaceae are the most locally used families and medicines were prepared in the form of powder or infusion and used orally. Aerial parts were the most frequently used plant part. Thus, the results can be used as platform for bioactive substances discovery and further development especially for the preferred plant species used in the treatment of gastro-intestinal disorders.

Keywords: ethnopharmacology, gastro-intestinal, phytochemical, South Algeria, Sahara, endemic species

Procedia PDF Downloads 289
3418 Field Evaluation of Pile Behavior in Sandy Soil Underlain by Clay

Authors: R. Bakr, M. Elmeligy, A. Ibrahim

Abstract:

When the building loads are relatively small, challenges are often facing the foundation design especially when inappropriate soil conditions exist. These may be represented in the existence of soft soil in the upper layers of soil while sandy soil or firm cohesive soil exist in the deeper layers. In such cases, the design becomes infeasible if the piles are extended to the deeper layers, especially when there are sandy layers existing at shallower depths underlain by stiff clayey soil. In this research, models of piles terminated in sand underlain by clay soils are numerically simulated by different modelling theories. Finite element software, Plaxis 3-D Foundation was used to evaluate the pile behavior under different loading scenarios. The standard static load test according to ASTM D-1143 was simulated and compared with the real-life loading scenario. The results showed that the pile behavior obtained from the current static load test do not realistically represent that obtained from real-life loading. Attempts were carried out to capture the proper numerical loading scenario that simulates the pile behavior in real-life loading including the long-term effect. A modified method based on this research findings is proposed for the static pile loading tests. Field loading tests were carried out to validate the new method. Results obtained from both numerical and field tests by using the modified method prove that this method is more accurate in predicting the pile behavior in sand soil underlain by clay more than the current standard static load.

Keywords: numerical simulation, static load test, pile behavior, sand underlain with clay, creep

Procedia PDF Downloads 321
3417 Digital Twin for Retail Store Security

Authors: Rishi Agarwal

Abstract:

Digital twins are emerging as a strong technology used to imitate and monitor physical objects digitally in real time across sectors. It is not only dealing with the digital space, but it is also actuating responses in the physical space in response to the digital space processing like storage, modeling, learning, simulation, and prediction. This paper explores the application of digital twins for enhancing physical security in retail stores. The retail sector still relies on outdated physical security practices like manual monitoring and metal detectors, which are insufficient for modern needs. There is a lack of real-time data and system integration, leading to ineffective emergency response and preventative measures. As retail automation increases, new digital frameworks must control safety without human intervention. To address this, the paper proposes implementing an intelligent digital twin framework. This collects diverse data streams from in-store sensors, surveillance, external sources, and customer devices and then Advanced analytics and simulations enable real-time monitoring, incident prediction, automated emergency procedures, and stakeholder coordination. Overall, the digital twin improves physical security through automation, adaptability, and comprehensive data sharing. The paper also analyzes the pros and cons of implementation of this technology through an Emerging Technology Analysis Canvas that analyzes different aspects of this technology through both narrow and wide lenses to help decision makers in their decision of implementing this technology. On a broader scale, this showcases the value of digital twins in transforming legacy systems across sectors and how data sharing can create a safer world for both retail store customers and owners.

Keywords: digital twin, retail store safety, digital twin in retail, digital twin for physical safety

Procedia PDF Downloads 65
3416 Performance Study of Classification Algorithms for Consumer Online Shopping Attitudes and Behavior Using Data Mining

Authors: Rana Alaa El-Deen Ahmed, M. Elemam Shehab, Shereen Morsy, Nermeen Mekawie

Abstract:

With the growing popularity and acceptance of e-commerce platforms, users face an ever increasing burden in actually choosing the right product from the large number of online offers. Thus, techniques for personalization and shopping guides are needed by users. For a pleasant and successful shopping experience, users need to know easily which products to buy with high confidence. Since selling a wide variety of products has become easier due to the popularity of online stores, online retailers are able to sell more products than a physical store. The disadvantage is that the customers might not find products they need. In this research the customer will be able to find the products he is searching for, because recommender systems are used in some ecommerce web sites. Recommender system learns from the information about customers and products and provides appropriate personalized recommendations to customers to find the needed product. In this paper eleven classification algorithms are comparatively tested to find the best classifier fit for consumer online shopping attitudes and behavior in the experimented dataset. The WEKA knowledge analysis tool, which is an open source data mining workbench software used in comparing conventional classifiers to get the best classifier was used in this research. In this research by using the data mining tool (WEKA) with the experimented classifiers the results show that decision table and filtered classifier gives the highest accuracy and the lowest accuracy classification via clustering and simple cart.

Keywords: classification, data mining, machine learning, online shopping, WEKA

Procedia PDF Downloads 344
3415 Spatial Temporal Change of COVID-19 Vaccination Condition in the US: An Exploration Based on Space Time Cube

Authors: Yue Hao

Abstract:

COVID-19 vaccines not only protect individuals but society as a whole. In this case, having an understanding of the change and trend of vaccination conditions may shed some light on revising and making up-to-date policies regarding large-scale public health promotions and calls in order to lead and encourage the adoption of COVID-19 vaccines. However, vaccination status change over time and vary from place to place hidden patterns that were not fully explored in previous research. In our research, we took advantage of the spatial-temporal analytical methods in the domain of geographic information science and captured the spatial-temporal changes regarding COVID-19 vaccination status in the United States during 2020 and 2021. After conducting the emerging hot spots analysis on both the state level data of the US and county level data of California we found that: (1) at the macroscopic level, there is a continuously increasing trend of the vaccination rate in the US, but there is a variance on the spatial clusters at county level; (2) spatial hotspots and clusters with high vaccination amount over time were clustered around the west and east coast in regions like California and New York City where are densely populated with considerable economy conditions; (3) in terms of the growing trend of the daily vaccination among, Los Angeles County alone has very high statistics and dramatic increases over time. We hope that our findings can be valuable guidance for supporting future decision-making regarding vaccination policies as well as directing new research on relevant topics.

Keywords: COVID-19 vaccine, GIS, space time cube, spatial-temporal analysis

Procedia PDF Downloads 75
3414 Plant Identification Using Convolution Neural Network and Vision Transformer-Based Models

Authors: Virender Singh, Mathew Rees, Simon Hampton, Sivaram Annadurai

Abstract:

Plant identification is a challenging task that aims to identify the family, genus, and species according to plant morphological features. Automated deep learning-based computer vision algorithms are widely used for identifying plants and can help users narrow down the possibilities. However, numerous morphological similarities between and within species render correct classification difficult. In this paper, we tested custom convolution neural network (CNN) and vision transformer (ViT) based models using the PyTorch framework to classify plants. We used a large dataset of 88,000 provided by the Royal Horticultural Society (RHS) and a smaller dataset of 16,000 images from the PlantClef 2015 dataset for classifying plants at genus and species levels, respectively. Our results show that for classifying plants at the genus level, ViT models perform better compared to CNN-based models ResNet50 and ResNet-RS-420 and other state-of-the-art CNN-based models suggested in previous studies on a similar dataset. ViT model achieved top accuracy of 83.3% for classifying plants at the genus level. For classifying plants at the species level, ViT models perform better compared to CNN-based models ResNet50 and ResNet-RS-420, with a top accuracy of 92.5%. We show that the correct set of augmentation techniques plays an important role in classification success. In conclusion, these results could help end users, professionals and the general public alike in identifying plants quicker and with improved accuracy.

Keywords: plant identification, CNN, image processing, vision transformer, classification

Procedia PDF Downloads 91
3413 Financial Capacity, Governance, and Corporate Engagement in Environmental Protection

Authors: Lubica Hikkerova, Jean-Michel Sahut

Abstract:

Environmental protection remains a global challenge but, since 2012, there has been a progressive decline in corporate engagement in environmental protection issues. This study seeks to investigate the role of financial capacity and governance in improving the level of environmental engagement of companies. The regression technique is applied to data on 351 large European companies from the ASSET4-ESG database for the 2007-2015 period. Firstly, the results show that the companies in the sample are fairly engaged in environmental protection, with a strong dispersion representing nearly four times the average. This means that the companies in the sample do not share the same level of engagement in matters of environmental protection, some being more committed than others. Secondly, the results reveal that the financial capacity of the company, as assessed through its indicators, has a significant effect on its level of environmental protection engagement in the present sample. This effect is more positive the higher the profits the company makes, and more negative the more heavily indebted or, the higher the rates of dividends it pays per share. Lastly, the results also show that a better quality of governance plays an important role in the decision to undertake actions leading to environmental protection. More specifically, the degree of management implication in the running of the business, the respect of the rights of the shareholders, the effectiveness of the control exerted by the board of directors, and, to a lesser extent, the independence of the audit committee, are variables which have a positive and significant influence on the level of environmental engagement of companies.

Keywords: financial capacity, corporate governance, environmental engagement, stakeholder theory, theory of organizational legitimacy, theory of resources and capabilities

Procedia PDF Downloads 183
3412 Impact of Extension Services Pastoralists’ Vulnerability to Climate Change in Northern Guinea Savannah of Nigeria

Authors: Sidiqat A. Aderinoye-Abdulwahab, Lateef L. Adefalu, Jubril O. Animashaun

Abstract:

Pastoralists in Nigeria are situated in dry regions - where water and pasture for livestock are particularly scarce, as well as areas with poor availability of social amenities and infrastructure. This study therefore explored how extension service could be used to reduce the exposure of nomads to effects of seasonality, climate change, and the poor environmental conditions. The study was carried out in Northern guinea Savannah region of Nigeria because pastoralists have settled there in large numbers due to desertification and low rainfall in the arid regions. A multi-stage sampling procedure was used to arrive at the selection of two states (Kwara and Nassarawa) in the region. A total of 63 respondents were randomly chosen using simple random sampling. Focus group discussions and questionnaire were used to gather information while the data was analysed using content analysis. The facilities required by the sampled households are milking machine, cheese making machine, and preservatives to increase the shelf life of cheese. Whilst, the extension service required are demonstration on cheese making, training and seminars on animal husbandry. Additionally, livestock of pastoralists often encroach on farmers’ plots which usually result in pastoralist-farmer conflicts. The study thus recommends diversification of economic activity from livestock to non-livestock related activities as well as creation of grazing routes to reduce pastoralist/farmer conflict.

Keywords: arid region, coping strategies, livestock, livelihood

Procedia PDF Downloads 381
3411 Modeling Core Flooding Experiments for Co₂ Geological Storage Applications

Authors: Avinoam Rabinovich

Abstract:

CO₂ geological storage is a proven technology for reducing anthropogenic carbon emissions, which is paramount for achieving the ambitious net zero emissions goal. Core flooding experiments are an important step in any CO₂ storage project, allowing us to gain information on the flow of CO₂ and brine in the porous rock extracted from the reservoir. This information is important for understanding basic mechanisms related to CO₂ geological storage as well as for reservoir modeling, which is an integral part of a field project. In this work, a different method for constructing accurate models of CO₂-brine core flooding will be presented. Results for synthetic cases and real experiments will be shown and compared with numerical models to exhibit their predictive capabilities. Furthermore, the various mechanisms which impact the CO₂ distribution and trapping in the rock samples will be discussed, and examples from models and experiments will be provided. The new method entails solving an inverse problem to obtain a three-dimensional permeability distribution which, along with the relative permeability and capillary pressure functions, constitutes a model of the flow experiments. The model is more accurate when data from a number of experiments are combined to solve the inverse problem. This model can then be used to test various other injection flow rates and fluid fractions which have not been tested in experiments. The models can also be used to bridge the gap between small-scale capillary heterogeneity effects (sub-core and core scale) and large-scale (reservoir scale) effects, known as the upscaling problem.

Keywords: CO₂ geological storage, residual trapping, capillary heterogeneity, core flooding, CO₂-brine flow

Procedia PDF Downloads 63
3410 Removal of Lead (Pb) by the Microorganism Isolated from the Effluent of Lead Acid Battery Scrap

Authors: Harikrishna Yadav Nanganuru, Narasimhulu Korrapati

Abstract:

The demand for the lead (Pb) in the battery industry has been growing for last twenty years. On an average about 2.35 million tons of lead is used in the battery industry. According to the survey of supply and demand battery industry is using 75% of lead produced every year. Due to the increase in battery scrap, secondary lead production has been increasing in this decade. Europe and USA together account for 75% of the world’s secondary lead production. The effluent from used battery scrap consists of high concentrations of lead. Unauthorized disposal of spent batteries, which contain intolerable concentration of lead, into landfills or municipal water canals causes release of Pb into the environment. Lead is one of the toxic heavy metals that have large damaging effects on the human health. Due to its persistence and toxicity, the presence of Pb in drinking water is considered as a special concern. Accumulation of Pb in the human body for long period of time can result in the malfunctioning of some organs. Many technologies have been developed for the removal of lead using microorganisms. In this paper, effluent was taken from the spent battery scrap and was characterized by inductively coupled plasma atomic emission spectrometer. Microorganisms play an important role in removal of lead from the contaminated sites. So, the bacteria were isolated from the effluent. Optimum conditions for the microbial growth and applied for the lead removal. These bacterial cells were immobilized and used for the removal of Pb from the known concentration of metal solution. Scanning electron microscopic (SEM) studies were shown that the Pb was efficiently adsorbed by the immobilized bacteria. From the results of Atomic Absorption Spectroscopy (AAS), 83.40 percentage of Pb was removed in a batch culture.

Keywords: adsorption, effluent, immobilization, lead (Pb)

Procedia PDF Downloads 448
3409 Binderless Naturally-extracted Metal-free Electrocatalyst for Efficient NOₓ Reduction

Authors: Hafiz Muhammad Adeel Sharif, Tian Li, Changping Li

Abstract:

Recently, the emission of nitrogen-sulphur oxides (NOₓ, SO₂) has become a global issue and causing serious threats to health and the environment. Catalytic reduction of NOx and SOₓ gases into friendly gases is considered one of the best approaches. However, regeneration of the catalyst, higher bond-dissociation energy for NOx, i.e., 150.7 kcal/mol, escape of intermediate gas (N₂O, a greenhouse gas) with treated flue-gas, and limited activity of catalyst remains a great challenge. Here, a cheap, binderless naturally-extracted bass-wood thin carbon electrode (TCE) is presented, which shows excellent catalytic activity towards NOx reduction. The bass-wood carbonization at 900 ℃ followed by thermal activation in the presence of CO2 gas at 750 ℃. The thermal activation resulted in an increase in epoxy groups on the surface of the TCE and enhancement in the surface area as well as the degree of graphitization. The TCE unique 3D strongly inter-connected network through hierarchical micro/meso/macro pores that allow large electrode/electrolyte interface. Owing to these characteristics, the TCE exhibited excellent catalytic efficiency towards NOx (~83.3%) under ambient conditions and enhanced catalytic response under pH and sulphite exposure as well as excellent stability up to 168 hours. Moreover, a temperature-dependent activity trend was found where the highest catalytic activity was achieved at 80 ℃, beyond which the electrolyte became evaporative and resulted in a performance decrease. The designed electrocatalyst showed great potential for effective NOx-reduction, which is highly cost-effective, green, and sustainable.

Keywords: electrocatalyst, NOx-reduction, bass-wood electrode, integrated wet-scrubbing, sustainable

Procedia PDF Downloads 73
3408 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 101