Search results for: autonomous weapon systems
9008 Potentials of Underutilised Crops in the Nigerian Farming Systems for Sustainable Food Production and Economic Empowerment
Authors: Jesse Silas Mshelia, Michael Mamman Degri, Akeweta Emmanuel Samaila
Abstract:
This review was conducted in the North-Eastern part of Nigeria where there are a lot of challenges of poverty and low level of productivity of farmlands as a result of dwindling soil fertility and dependence on crops that are not so much adopted to the soil and climatic condition and the prevailing farming systems of the area which is predominantly mixed cropping. The crops that are neglected are well fitted into this system of production and yield better with the low level of input and management and give a higher profit margin. These crops, the farmers have mastered the production techniques, but do not have the scientific knowledge to improve the quality of the seed and the products hence need the intervention of modern technologies to benefit maximally from the full potentials of these crops.Keywords: farming systems, neglected crops, potentials, underutilised
Procedia PDF Downloads 3759007 Bit Error Rate Performance of MIMO Systems for Wireless Communications
Authors: E. Ghayoula, M. Haj Taieb, A. Bouallegue, J. Y. Chouinard, R. Ghayoula
Abstract:
This paper evaluates the bit error rate (BER) performance of MIMO systems for wireless communication. MIMO uses multiple transmitting antennas, multiple receiving antennas and the space-time block codes to provide diversity. MIMO transmits signal encoded by space-time block (STBC) encoder through different transmitting antennas. These signals arrive at the receiver at slightly different times. Spatially separated multiple receiving antennas are employed to provide diversity reception to combat the effect of fading in the channel. This paper presents a detailed study of diversity coding for MIMO systems. STBC techniques are implemented and simulation results in terms of the BER performance with varying number of MIMO transmitting and receiving antennas are presented. Our results show how increasing the number of both transmit and receive antenna improves system performance and reduces the bit error rate.Keywords: MIMO systems, diversity, BER, MRRC, SIMO, MISO, STBC, alamouti, SNR
Procedia PDF Downloads 4909006 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)
Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram
Abstract:
The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)
Procedia PDF Downloads 959005 The Impact of Introspective Models on Software Engineering
Authors: Rajneekant Bachan, Dhanush Vijay
Abstract:
The visualization of operating systems has refined the Turing machine, and current trends suggest that the emulation of 32 bit architectures will soon emerge. After years of technical research into Web services, we demonstrate the synthesis of gigabit switches, which embodies the robust principles of theory. Loam, our new algorithm for forward-error correction, is the solution to all of these challenges.Keywords: software engineering, architectures, introspective models, operating systems
Procedia PDF Downloads 5389004 The Underground Ecosystem of Credit Card Frauds
Authors: Abhinav Singh
Abstract:
Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem
Procedia PDF Downloads 4399003 Sustainability Impact Assessment of Construction Ecology to Engineering Systems and Climate Change
Authors: Moustafa Osman Mohammed
Abstract:
Construction industry, as one of the main contributor in depletion of natural resources, influences climate change. This paper discusses incremental and evolutionary development of the proposed models for optimization of a life-cycle analysis to explicit strategy for evaluation systems. The main categories are virtually irresistible for introducing uncertainties, uptake composite structure model (CSM) as environmental management systems (EMSs) in a practice science of evaluation small and medium-sized enterprises (SMEs). The model simplified complex systems to reflect nature systems’ input, output and outcomes mode influence “framework measures” and give a maximum likelihood estimation of how elements are simulated over the composite structure. The traditional knowledge of modeling is based on physical dynamic and static patterns regarding parameters influence environment. It unified methods to demonstrate how construction systems ecology interrelated from management prospective in procedure reflects the effect of the effects of engineering systems to ecology as ultimately unified technologies in extensive range beyond constructions impact so as, - energy systems. Sustainability broadens socioeconomic parameters to practice science that meets recovery performance, engineering reflects the generic control of protective systems. When the environmental model employed properly, management decision process in governments or corporations could address policy for accomplishment strategic plans precisely. The management and engineering limitation focuses on autocatalytic control as a close cellular system to naturally balance anthropogenic insertions or aggregation structure systems to pound equilibrium as steady stable conditions. Thereby, construction systems ecology incorporates engineering and management scheme, as a midpoint stage between biotic and abiotic components to predict constructions impact. The later outcomes’ theory of environmental obligation suggests either a procedures of method or technique that is achieved in sustainability impact of construction system ecology (SICSE), as a relative mitigation measure of deviation control, ultimately.Keywords: sustainability, environmental impact assessment, environemtal management, construction ecology
Procedia PDF Downloads 3939002 Monitoring and Evaluation of the Distributed Agricultural Machinery of the Department of Agriculture Using a Web-Based Information System with a Short Messaging Service Technology
Authors: Jimmy L. Caldoza, Erlito M. Albina
Abstract:
Information Systems are increasingly being used to monitor and assess government projects as well as improve transparency and combat corruption. With reference to existing information systems relevant to monitoring and evaluation systems adopted by various government agencies from other countries, this research paper aims to help the Philippine government, particularly the Department of Agriculture, in assessing the impact of their programs and projects on their target beneficiaries through the development of the web-based Monitoring and Evaluation Information System with the application of a short messaging system (sms) technology.Keywords: monitoring and evaluation system, web-based information system, short messaging system technology, database structure and management
Procedia PDF Downloads 1479001 Insight into the Electrocatalytic Activities of Nitrogen-Doped Graphyne and Graphdiyne Families: A First-Principles Study
Authors: Bikram K. Das, Kalyan K. Chattopadhyay
Abstract:
The advent of 2-D materials in the last decade has induced a fresh spur of growth in fuel cell technology as these materials have some highly promising traits that can be exploited to felicitate Oxygen Reduction Reaction (ORR) in an efficient way. Among the various 2-D carbon materials, graphyne (Gy) and graphdiyne (Gdy)1 with their intrinsic non-uniform charge distribution holds promises in this purpose and it is expected2 that substitutional Nitrogen (N) doping could further enhance their efficiency. In this regard, dispersive force corrected density functional theory is used to map the oxygen reduction reaction (ORR) kinetics of five different kinds of N doped graphyne and graphdiyne systems (namely αGy, βGy, γGy, RGy and 6,6,12Gy and Gdy) in alkaline medium. The best doping site for each of the Gy/ Gdy system is determined comparing the formation energies of the possible doping configurations. Similarly, the best di-oxygen (O₂) adsorption sites for the doped systems are identified by comparing the adsorption energies. O₂ adsorption on all N doped Gy/ Gdy systems is found to be energetically favorable. ORR on a catalyst surface may occur either via the Eley-Rideal (ER) or the Langmuir–Hinschelwood (LH) pathway. Systematic studies performed on the considered systems reveal that all of them favor the ER pathway. Further, depending on the nature of di-oxygen adsorption ORR can follow either associative or dissociative mechanism; the possibility of occurrence of both the mechanisms is tested thoroughly for each N doped Gy/ Gdy. For the ORR process, all the Gy/Gdy systems are observed to prefer the efficient four-electron pathway but the expected monotonically exothermic reaction pathway is found only for N doped 6,6,12Gy and RGy following the associative pathway and for N doped βGy, γGy and Gdy following the dissociative pathway. Further computation performed for these systems reveals that for N doped 6,6,12Gy, RGy, βGy, γGy and Gdy the overpotentials are 1.08 V, 0.94 V, 1.17 V, 1.21 V and 1.04 V respectively depicting N doped RGy is the most promising material, to carry out ORR in alkaline medium, among the considered ones. The stability of the ORR intermediate states with the variation of pH and electrode potentials is further explored with Pourbiax diagrams and the activities of these systems in the alkaline medium are compared with the prior reported B/N doped identical systems for ORR in an acidic medium in terms of a common descriptor.Keywords: graphdiyne, graphyne, nitrogen-doped, ORR
Procedia PDF Downloads 1289000 On Dialogue Systems Based on Deep Learning
Authors: Yifan Fan, Xudong Luo, Pingping Lin
Abstract:
Nowadays, dialogue systems increasingly become the way for humans to access many computer systems. So, humans can interact with computers in natural language. A dialogue system consists of three parts: understanding what humans say in natural language, managing dialogue, and generating responses in natural language. In this paper, we survey deep learning based methods for dialogue management, response generation and dialogue evaluation. Specifically, these methods are based on neural network, long short-term memory network, deep reinforcement learning, pre-training and generative adversarial network. We compare these methods and point out the further research directions.Keywords: dialogue management, response generation, deep learning, evaluation
Procedia PDF Downloads 1678999 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection
Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman
Abstract:
The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture
Procedia PDF Downloads 5838998 Mass Polarization in Three-Body System with Two Identical Particles
Authors: Igor Filikhin, Vladimir M. Suslov, Roman Ya. Kezerashvili, Branislav Vlahivic
Abstract:
The mass-polarization term of the three-body kinetic energy operator is evaluated for different systems which include two identical particles: A+A+B. The term has to be taken into account for the analysis of AB- and AA-interactions based on experimental data for two- and three-body ground state energies. In this study, we present three-body calculations within the framework of a potential model for the kaonic clusters K−K−p and ppK−, nucleus 3H and hypernucleus 6 ΛΛHe. The systems are well clustering as A+ (A+B) with a ground state energy E2 for the pair A+B. The calculations are performed using the method of the Faddeev equations in configuration space. The phenomenological pair potentials were used. We show a correlation between the mass ratio mA/mB and the value δB of the mass-polarization term. For bosonic-like systems, this value is defined as δB = 2E2 − E3, where E3 is three-body energy when VAA = 0. For the systems including three particles with spin(isospin), the models with average AB-potentials are used. In this case, the Faddeev equations become a scalar one like for the bosonic-like system αΛΛ. We show that the additional energy conected with the mass-polarization term can be decomposite to a sum of the two parts: exchenge related and reduced mass related. The state of the system can be described as the following: the particle A1 is bound within the A + B pair with the energy E2, and the second particle A2 is bound with the pair with the energy E3 − E2. Due to the identity of A particles, the particles A1 and A2 are interchangeable in the pair A + B. We shown that the mass polarization δB correlates with a type of AB potential using the system αΛΛ as an example.Keywords: three-body systems, mass polarization, Faddeev equations, nuclear interactions
Procedia PDF Downloads 3778997 Educational Video Capsules for Fostering Teachers Creativity
Authors: Martha Salinas, Valkyria Bernal
Abstract:
Creativity is a possible response to the profound social, economic, and global changes society is living and education is the source to develop this kind of capacity. However, institutional pressures often prevent teachers from engaging in creative teaching practices and make innovation not the main curricular focus when building learning scenarios and experiences. This study proposes and validates the use of a prototype of Educative Video – Capsules from the perspective of teacher training, presenting the different stages of design, the content plan, as well as the influences of its components and characteristics from the perspective of creativity. The paper presents literature findings of the factors that influence the innovative behavior of teachers, the beliefs of teachers about creativity and its nature, as well as the creative pedagogies that have generated better results. The results show that the disposition of teachers towards creative pedagogies improves significantly with the use of a tool that is based on the principles of microlearning and is developed in a non-academic, autonomous, and non-imposed family environment as traditional teacher training processes usually occur.Keywords: educational innovation, resistance to innovation, creativity, creative pedagogy
Procedia PDF Downloads 1578996 Reinventing Education Systems: Towards an Approach Based on Universal Values and Digital Technologies
Authors: Ilyes Athimni, Mouna Bouzazi, Mongi Boulehmi, Ahmed Ferchichi
Abstract:
The principles of good governance, universal values, and digitization are among the tools to fight corruption and improve the quality of service delivery. In recent years, these tools have become one of the most controversial topics in the field of education and a concern of many international organizations and institutions against the problem of corruption. Corruption in the education sector, particularly in higher education, has negative impacts on the quality of education systems and on the quality of administrative or educational services. Currently, the health crisis due to the spread of the COVID-19 pandemic reveals the difficulties encountered by education systems in most countries of the world. Due to the poor governance of these systems, many educational institutions were unable to continue working remotely. To respond to these problems encountered by most education systems in many countries of the world, our initiative is to propose a methodology to reinvent education systems based on global values and digital technologies. This methodology includes a work strategy for educational institutions, whether in the provision of administrative services or in the teaching method, based on information and communication technologies (ICTs), intelligence artificial, and intelligent agents. In addition, we will propose a supervisory law that will be implemented and monitored by intelligent agents to improve accountability, transparency, and accountability in educational institutions. On the other hand, we will implement and evaluate a field experience by applying the proposed methodology in the operation of an educational institution and comparing it to the traditional methodology through the results of teaching an educational program. With these specifications, we can reinvent quality education systems. We also expect the results of our proposal to play an important role at local, regional, and international levels in motivating governments of countries around the world to change their university governance policies.Keywords: artificial intelligence, corruption in education, distance learning, education systems, ICTs, intelligent agents, good governance
Procedia PDF Downloads 2138995 Large Language Model Powered Chatbots Need End-to-End Benchmarks
Authors: Debarag Banerjee, Pooja Singh, Arjun Avadhanam, Saksham Srivastava
Abstract:
Autonomous conversational agents, i.e., chatbots, are becoming an increasingly common mechanism for enterprises to provide support to customers and partners. In order to rate chatbots, especially ones powered by Generative AI tools like Large Language Models (LLMs), we need to be able to accurately assess their performance. This is where chatbot benchmarking becomes important. In this paper, authors propose the use of a benchmark that they call the E2E (End to End) benchmark and show how the E2E benchmark can be used to evaluate the accuracy and usefulness of the answers provided by chatbots, especially ones powered by LLMs. The authors evaluate an example chatbot at different levels of sophistication based on both our E2E benchmark as well as other available metrics commonly used in the state of the art and observe that the proposed benchmark shows better results compared to others. In addition, while some metrics proved to be unpredictable, the metric associated with the E2E benchmark, which uses cosine similarity, performed well in evaluating chatbots. The performance of our best models shows that there are several benefits of using the cosine similarity score as a metric in the E2E benchmark.Keywords: chatbot benchmarking, end-to-end (E2E) benchmarking, large language model, user centric evaluation.
Procedia PDF Downloads 668994 Traffic Light Detection Using Image Segmentation
Authors: Vaishnavi Shivde, Shrishti Sinha, Trapti Mishra
Abstract:
Traffic light detection from a moving vehicle is an important technology both for driver safety assistance functions as well as for autonomous driving in the city. This paper proposed a deep-learning-based traffic light recognition method that consists of a pixel-wise image segmentation technique and a fully convolutional network i.e., UNET architecture. This paper has used a method for detecting the position and recognizing the state of the traffic lights in video sequences is presented and evaluated using Traffic Light Dataset which contains masked traffic light image data. The first stage is the detection, which is accomplished through image processing (image segmentation) techniques such as image cropping, color transformation, segmentation of possible traffic lights. The second stage is the recognition, which means identifying the color of the traffic light or knowing the state of traffic light which is achieved by using a Convolutional Neural Network (UNET architecture).Keywords: traffic light detection, image segmentation, machine learning, classification, convolutional neural networks
Procedia PDF Downloads 1738993 Optimization of Solar Tracking Systems
Authors: A. Zaher, A. Traore, F. Thiéry, T. Talbert, B. Shaer
Abstract:
In this paper, an intelligent approach is proposed to optimize the orientation of continuous solar tracking systems on cloudy days. Considering the weather case, the direct sunlight is more important than the diffuse radiation in case of clear sky. Thus, the panel is always pointed towards the sun. In case of an overcast sky, the solar beam is close to zero, and the panel is placed horizontally to receive the maximum of diffuse radiation. Under partly covered conditions, the panel must be pointed towards the source that emits the maximum of solar energy and it may be anywhere in the sky dome. Thus, the idea of our approach is to analyze the images, captured by ground-based sky camera system, in order to detect the zone in the sky dome which is considered as the optimal source of energy under cloudy conditions. The proposed approach is implemented using experimental setup developed at PROMES-CNRS laboratory in Perpignan city (France). Under overcast conditions, the results were very satisfactory, and the intelligent approach has provided efficiency gains of up to 9% relative to conventional continuous sun tracking systems.Keywords: clouds detection, fuzzy inference systems, images processing, sun trackers
Procedia PDF Downloads 1928992 Science of Social Work: Recognizing Its Existence as a Scientific Discipline by a Method Triangulation
Authors: Sandra Mendes
Abstract:
Social Work has encountered over time with multivariate requests in the field of its action, provisioning frameworks of knowledge and praxis. Over the years, we have observed a transformation of society and, consequently, of the public who deals with the social work practitioners. Both, training and profession have had need to adapt and readapt the ways of doing, bailing up theories to action, while action unfolds emancipation of new theories. The theoretical questioning of this subject lies on classical authors from social sciences, and contemporary authors of Social Work. In fact, both enhance, in the design of social work, an integration and social cohesion function, creating a culture of action and theory, attributing to its method a relevant function, which shall be promoter of social changes in various dimensions of both individual and collective life, as well as scientific knowledge. On the other hand, it is assumed that Social Work, through its professionalism and through the academy, is now closer to distinguish itself from other Social Sciences as an autonomous scientific field, being, however, in the center of power struggles. This paper seeks to fill the gap in social work literature about the study of the scientific field of this area of knowledge.Keywords: field theory, knowledge, science, social work
Procedia PDF Downloads 3558991 Transgressing Boundaries for Encouraging Critical Thinking: Reflections on the Integration of Active Pedagogy and Transnational Exchange into Social Work Education
Authors: Rosemary R. Carlton, Roxane Caron
Abstract:
Almost three decades ago, bell hooks (1994) identified the classroom as “the most radical space of possibility in the academy”. A feminist scholar, educator, and activist, hooks urged educators to transgress the boundaries of what might be customary or considered acceptable in teaching, thus encouraging the pursuit of new ways of knowing and different strategies for sharing knowledge. This paper reflects upon a particular response to hooks’ still relevant call for transgression in teaching. Specifically, this paper reports on the design, implementation, and preliminary analysis of a social work course integrating active pedagogy and transnational exchange to encourage students’ critical thinking and autonomous learning in their development as social workers in a global context. The bachelor’s level course, Pratiques spécifiques: Projet international, was developed collaboratively across three francophone institutions of higher learning in Belgium, Canada, and France: the Haute École de Namur-Liège-Luxembourg (Hénallux); the Université de Montréal; and, the Institut d’enseignement supérieur et professionnel, l’IRTS Paris Île-de-France. The driving aims of the course are to promote autonomous learning and critical thinking through a lens of transnational understandings of social problems -competencies indispensable to students’ development as social workers. The course is offered to two paired cohorts, one addressing the subject of “migrations” (Canada/France) and the other the subject of “sexual exploitation” (Canada/Belgium). Through the adaptation of a critical pedagogy of problem-based learning, students are called upon to actively engage in acquiring and applying knowledge to respond to “real life” social issues relating to migration or sexual exploitation. At the conclusion of the course, each cohort of students is brought together for a week-long intensive period of transnational exchange either at the Université de Montréal in Canada or at Hénallux in Belgium. Extending the bounds of the classroom across international borders allows students novel opportunities to deepen and expand their understandings of issues relating to predefined social issues and to critically examine associated social work practices. The paper opens with a presentation of the social work course. Specifically, the authors will outline their adaptation of a pedagogy of problem-based learning integrating transnational exchange in the design and implementation of the course. Returning to hooks’ notion of transgression in teaching, the paper offers a preliminary analysis of how and with what effect the course provides opportunities to transgress hierarchical student-teacher relationships; transgress conventional modes of learning to explore diverse sources of knowledge and transgress the walls of the university to engage with and learn from local and global partners. The paper concludes with a consideration of the potential influence of such transgressions in teaching for students’ development of critical thinking in their practice of social work in global context.Keywords: active learning, critical pedagogy, social work intervention, transnational learning
Procedia PDF Downloads 1658990 Critical Review Whether Restricting Dietary Saturated Fat Can Reduce the Risk of Cardiovascular Disease
Authors: Obi Olor, Asu-Nnandi Judith, Ishiekwen Bridget
Abstract:
Regardless of the settled perception that the substitution of saturated fats for starches or unsaturated fats builds low-density lipoprotein (LDL) cholesterol in people, in animal models, the relationship of saturated fat intake to the hazard of atherosclerotic cardiovascular ailment in people remains controversial. Clinical trials that supplanted immersed fat with polyunsaturated fat have, for the most part, demonstrated a lessening in CVD occasions, albeit a few reviews demonstrated no impacts. An autonomous relationship of soaked fat admission with CVD chance has not reliably appeared in planned epidemiologic reviews, albeit some have confirmed an expanded hazard in youthful people and in ladies. Substitution of soaked fat by polyunsaturated or monounsaturated fat reduces LDL and HDL cholesterol. Given the differing qualities of these cardio-protective eating methodologies and their healthy parts, one of the needs in research should be to attempt more near trials. These trials decide persistent worthiness, consequences for surrogate markers of hazard, and which at last affects morbidity and mortality.Keywords: cardiovascular disease, dietary saturated fat, saturated fat, unsaturated fat
Procedia PDF Downloads 378989 A Detailed Study of Two Different Airfoils on Flight Performance of MAV of Same Physical Dimension
Authors: Shoeb A. Adeel, Shashant Anand, Vivek Paul, Dinesh, Suraj, Roshan
Abstract:
The paper presents a study of micro air vehicles (MAVs) with wingspans of 20 Cm with two different airfoil configurations. MAVs have vast potential applications in both military and civilian areas. These MAVs are fully autonomous and supply real-time data. The paper focuses on two different designs of the MAVs one being N22 airfoil and the other a flat plate with similar dimension. As designed, the MAV would fly in a low Reynolds-number regime at airspeeds of 15 & 20 m/sec. Propulsion would be provided by an electric motor with an advanced lithium. Because of the close coupling between vehicle elements, system integration would be a significant challenge, requiring tight packaging and multifunction components to meet mass limitations and Centre of Gravity (C.G) balancing. These MAVs are feasible and within a couple of years of technology development in key areas including sensors, propulsion, Aerodynamics, and packaging these would be easily available to the users at affordable prices. The paper finally compares the flight performance of the two configurations.Keywords: airfoil, CFD, MAV, flight performance, endurance, climb, lift, drag
Procedia PDF Downloads 4968988 Dynamic Performance Analysis of Distribution/ Sub-Transmission Networks with High Penetration of PV Generation
Authors: Cristian F.T. Montenegro, Luís F. N. Lourenço, Maurício B. C. Salles, Renato M. Monaro
Abstract:
More PV systems have been connected to the electrical network each year. As the number of PV systems increases, some issues affecting grid operations have been identified. This paper studied the impacts related to changes in solar irradiance on a distribution/sub-transmission network, considering variations due to moving clouds and daily cycles. Using MATLAB/Simulink software, a solar farm of 30 MWp was built and then implemented to a test network. From simulations, it has been determined that irradiance changes can have a significant impact on the grid by causing voltage fluctuations outside the allowable thresholds. This work discussed some local control strategies and grid reinforcements to mitigate the negative effects of the irradiance changes on the grid.Keywords: reactive power control, solar irradiance, utility-scale PV systems, voltage fluctuations
Procedia PDF Downloads 4608987 Methodological Aspect of Emergy Accounting in Co-Production Branching Systems
Authors: Keshab Shrestha, Hung-Suck Park
Abstract:
Emergy accounting of the systems networks is guided by a definite rule called ‘emergy algebra’. The systems networks consist of two types of branching. These are the co-product branching and split branching. The emergy accounting procedure for both the branching types is different. According to the emergy algebra, each branch in the co-product branching has different transformity values whereas the split branching has the same transformity value. After the transformity value of each branch is determined, the emergy is calculated by multiplying this with the energy. The aim of this research is to solve the problems in determining the transformity values in the co-product branching through the introduction of a new methodology, the modified physical quantity method. Initially, the existing methodologies for emergy accounting in the co-product branching is discussed and later, the modified physical quantity method is introduced with a case study of the Eucalyptus pulp production. The existing emergy accounting methodologies in the co-product branching has wrong interpretations with incorrect emergy calculations. The modified physical quantity method solves those problems of emergy accounting in the co-product branching systems. The transformity value calculated for each branch is different and also applicable in the emergy calculations. The methodology also strictly follows the emergy algebra rules. This new modified physical quantity methodology is a valid approach in emergy accounting particularly in the multi-production systems networks.Keywords: co-product branching, emergy accounting, emergy algebra, modified physical quantity method, transformity value
Procedia PDF Downloads 2928986 DNA Multiplier: A Design Architecture of a Multiplier Circuit Using DNA Molecules
Authors: Hafiz Md. Hasan Babu, Khandaker Mohammad Mohi Uddin, Nitish Biswas, Sarreha Tasmin Rikta, Nuzmul Hossain Nahid
Abstract:
Nanomedicine and bioengineering use biological systems that can perform computing operations. In a biocomputational circuit, different types of biomolecules and DNA (Deoxyribose Nucleic Acid) are used as active components. DNA computing has the capability of performing parallel processing and a large storage capacity that makes it diverse from other computing systems. In most processors, the multiplier is treated as a core hardware block, and multiplication is one of the time-consuming and lengthy tasks. In this paper, cost-effective DNA multipliers are designed using algorithms of molecular DNA operations with respect to conventional ones. The speed and storage capacity of a DNA multiplier are also much higher than a traditional silicon-based multiplier.Keywords: biological systems, DNA multiplier, large storage, parallel processing
Procedia PDF Downloads 2148985 Cultivating Social-Ecological Resilience, Harvesting Biocultural Resistance in Southern Andes
Authors: Constanza Monterrubio-Solis, Jose Tomas Ibarra
Abstract:
The fertile interdependence of social-ecological systems reveals itself in the interactions between native forests and seeds, home gardens, kitchens, foraging activities, local knowledge, and food practices, creating particular flavors and food meanings as part of cultural identities within territories. Resilience in local-food systems, from a relational perspective, can be understood as the balance between persistence and adaptability to change. Food growing, preparation, and consumption are constantly changing and adapting as expressions of agency of female and male indigenous peoples and peasants. This paper explores local food systems’ expressions of resilience in the la Araucanía region of Chile, namely: diversity, redundancy, buffer capacity, modularity, self-organization, governance, learning, equity, and decision-making. Applying ethnographic research methods (participant observation, focus groups, and semi-structured interviews), this work reflects on the experience developed through work with Mapuche women cultivating home gardens in the region since 2012; it looks to material and symbolic elements of resilience in the local indigenous food systems. Local food systems show indeed indicators of social-ecological resilience. The biocultural memory is expressed in affection to particular flavors and recipes, the cultural importance of seeds and reciprocity networks, as well as an accurate knowledge about the indicators of the seasons and weather, which have allowed local food systems to thrive with a strong cultural foundation. Furthermore, these elements turn into biocultural resistance in the face of the current institutional pressures for rural specialization, processes of cultural assimilation such as agroecosystems and diet homogenization, as well as structural threats towards the diversity and freedom of native seeds. Thus, the resilience-resistance dynamic shown by the social-ecological systems of the southern Andes is daily expressed in the local food systems and flavors and is key for diverse and culturally sound social-ecological health.Keywords: biocultural heritage, indigenous food systems, social-ecological resilience, southern Andes
Procedia PDF Downloads 1368984 Characterization of Solar Panel Efficiency Using Sun Tracking Device and Cooling System
Authors: J. B. G. Ibarra, J. M. A. Gagui, E. J. T. Jonson, J. A. V. Lim
Abstract:
This paper focused on studying the performance of the solar panels that were equipped with water-spray cooling system, solar tracking system, and combination of both systems. The efficiencies were compared with the solar panels without any efficiency improvement technique. The efficiency of each setup was computed on an hourly basis every day for a month. The study compared the efficiencies and combined systems that significantly improved at a specific time of the day. The data showed that the solar tracking system had the highest efficiency during 6:00 AM to 7:45 AM. Then after 7:45 AM, the combination of both solar tracking and water-spray cooling system was the most efficient to use up to 12:00 NN. Meanwhile, from 12:00 NN to 12:45 PM, the water-spray cooling system had the significant contribution on efficiency. From 12:45 PM up to 4:30 PM, the combination of both systems was the most efficient, and lastly, from 4:30 PM to 6:00 PM, the solar tracking system was the best to use. The study intended to use solar tracking or water-spray cooling system or combined systems alternately to improve the solar panel efficiency on a specific time of the day.Keywords: solar panel efficiency, solar panel efficiency technique, solar tracking system, water-spray cooling system
Procedia PDF Downloads 1628983 Application of Supervised Deep Learning-based Machine Learning to Manage Smart Homes
Authors: Ahmed Al-Adaileh
Abstract:
Renewable energy sources, domestic storage systems, controllable loads and machine learning technologies will be key components of future smart homes management systems. An energy management scheme that uses a Deep Learning (DL) approach to support the smart home management systems, which consist of a standalone photovoltaic system, storage unit, heating ventilation air-conditioning system and a set of conventional and smart appliances, is presented. The objective of the proposed scheme is to apply DL-based machine learning to predict various running parameters within a smart home's environment to achieve maximum comfort levels for occupants, reduced electricity bills, and less dependency on the public grid. The problem is using Reinforcement learning, where decisions are taken based on applying the Continuous-time Markov Decision Process. The main contribution of this research is the proposed framework that applies DL to enhance the system's supervised dataset to offer unlimited chances to effectively support smart home systems. A case study involving a set of conventional and smart appliances with dedicated processing units in an inhabited building can demonstrate the validity of the proposed framework. A visualization graph can show "before" and "after" results.Keywords: smart homes systems, machine learning, deep learning, Markov Decision Process
Procedia PDF Downloads 2028982 An Intelligent Thermal-Aware Task Scheduler in Multiprocessor System on a Chip
Authors: Sina Saadati
Abstract:
Multiprocessors Systems-On-Chips (MPSOCs) are used widely on modern computers to execute sophisticated software and applications. These systems include different processors for distinct aims. Most of the proposed task schedulers attempt to improve energy consumption. In some schedulers, the processor's temperature is considered to increase the system's reliability and performance. In this research, we have proposed a new method for thermal-aware task scheduling which is based on an artificial neural network (ANN). This method enables us to consider a variety of factors in the scheduling process. Some factors like ambient temperature, season (which is important for some embedded systems), speed of the processor, computing type of tasks and have a complex relationship with the final temperature of the system. This Issue can be solved using a machine learning algorithm. Another point is that our solution makes the system intelligent So that It can be adaptive. We have also shown that the computational complexity of the proposed method is cheap. As a consequence, It is also suitable for battery-powered systems.Keywords: task scheduling, MOSOC, artificial neural network, machine learning, architecture of computers, artificial intelligence
Procedia PDF Downloads 1038981 Formulation and Evaluation of TDDS for Sustained Release Ondansetron HCL Patches
Authors: Baljinder Singh, Navneet Sharma
Abstract:
The skin can be used as the site for drug administration for continuous transdermal drug infusion into the systemic circulation. For the continuous diffusion/penetration of the drugs through the intact skin surface membrane-moderated systems, matrix dispersion type systems, adhesive diffusion controlled systems and micro reservoir systems have been developed. Various penetration enhancers are used for the drug diffusion through skin. In matrix dispersion type systems, the drug is dispersed in the solvent along with the polymers and solvent allowed to evaporate forming a homogeneous drug-polymer matrix. Matrix type systems were developed in the present study. In the present work, an attempt has been made to develop a matrix-type transdermal therapeutic system comprising of ondansetron-HCl with different ratios of hydrophilic and hydrophobic polymeric combinations using solvent evaporation technique. The physicochemical compatibility of the drug and the polymers was studied by infrared spectroscopy. The results obtained showed no physical-chemical incompatibility between the drug and the polymers. The patches were further subjected to various physical evaluations along with the in-vitro permeation studies using rat skin. On the basis of results obtained form the in vitro study and physical evaluation, the patches containing hydrophilic polymers i.e. polyvinyl alcohol and poly vinyl pyrrolidone with oleic acid as the penetration enhancer(5%) were considered as suitable for large scale manufacturing with a backing layer and a suitable adhesive membrane.Keywords: transdermal drug delivery, penetration enhancers, hydrophilic and hydrophobic polymers, ondansetron HCl
Procedia PDF Downloads 3228980 3-D Visualization and Optimization for SISO Linear Systems Using Parametrization of Two-Stage Compensator Design
Authors: Kazuyoshi Mori, Keisuke Hashimoto
Abstract:
In this paper, we consider the two-stage compensator designs of SISO plants. As an investigation of the characteristics of the two-stage compensator designs, which is not well investigated yet, of SISO plants, we implement three dimensional visualization systems of output signals and optimization system for SISO plants by the parametrization of stabilizing controllers based on the two-stage compensator design. The system runs on Mathematica by using “Three Dimensional Surface Plots,” so that the visualization can be interactively manipulated by users. In this paper, we use the discrete-time LTI system model. Even so, our approach is the factorization approach, so that the result can be applied to many linear models.Keywords: linear systems, visualization, optimization, Mathematica
Procedia PDF Downloads 2988979 Learning to Learn: A Course on Language Learning Strategies
Authors: Hélène Knoerr
Abstract:
In an increasingly global world, more and more international students attend academic courses and programs in a second or foreign language, and local students register in language learning classes in order to improve their employability. These students need to quickly become proficient in the new language. How can we, as administrators, curriculum developers and teachers, make sure that they have the tools they need in order to develop their language skills in an academic context? This paper will describe the development and implementation of a new course, Learning to learn, as part of the Major in French/English as a Second Language at the University of Ottawa. This academic program was recently completely overhauled in order to reflect the current approaches in language learning (more specifically, the action-oriented approach as embodied in the Common European Framework of Reference for Languages, and the concept of life-long autonomous learning). The course itself is based on research on language learning strategies, with a particular focus on the characteristics of the “good language learner”. We will present the methodological and pedagogical foundations, describe the course objectives and learning outcomes, the language learning strategies, and the classroom activities. The paper will conclude with students’ feedback and suggest avenues for further exploration.Keywords: curriculum development, language learning, learning strategies, second language
Procedia PDF Downloads 411