Search results for: communication with physical layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14017

Search results for: communication with physical layer security

13147 Innate Immune Expression in Heterophils in Response to LPS

Authors: Rohita Gupta, G. S. Brah, R. Verma, C. S. Mukhopadhayay

Abstract:

Although chicken strains show differences in susceptibility to a number of diseases, the underlying immunological basis is yet to be elucidated. In the present study, heterophils were subjected to LPS stimulation and total RNA extraction, further differential gene expression was studied in broiler, layer and indigenous Aseel strain by Real Time RT-PCR at different time periods before and after induction. The expression of the 14 AvBDs and chTLR 1, 2, 3, 4, 5, 7, 15 and 21 was detectable in heterophils. The expression level of most of the AvBDs significantly increased (P<0.05) 3 hours post in vitro lipopolysaccharide challenge. Higher expression level and stronger activation of most AvBDs, NFkB-1 and IRF-3 in heterophils was observed with the stimulation of LPS in layer compared to broiler, and in Aseel compared to both layer and broiler. This investigation will allow more refined interpretation of immuno-genetic basis of the variable disease resistance/susceptibility in divergent stock of chicken including indigenous breed. Moreover, this study will be helpful in formulation of strategy for isolation of antimicrobial peptides from heterophils.

Keywords: differential expression, heterophils, cytokines, defensin, TLR

Procedia PDF Downloads 482
13146 Virtual Reference Service as a Space for Communication and Interaction: Providing Infrastructure for Learning in Times of Crisis at Uppsala University

Authors: Nadja Ylvestedt

Abstract:

Uppsala University Library is a geographically dispersed research library consisting of nine subject libraries located in different campus areas throughout the city of Uppsala. Despite the geographical dispersion, it is the library's ambition to be perceived as a cohesive library with consistently high service and quality. A key factor to being one cohesive library is the library's online services, especially the virtual reference service. E-mail, chat and phone are answered by a team of specially trained staff under the supervision of a team leader. When covid-19 hit, well-established routines and processes to provide an infrastructure for students and researchers at the university changed radically. The strong connection between services provided at the library locations as well as at the VRS has been one of the key components of the library’s success in providing patrons with the help they need. With radically minimized availability at the physical locations, the infrastructure was at risk of collapsing. Objectives:- The objective of this project has been to evaluate the consequences of the sudden change in the organization of the library. The focus of this evaluation is the library’s VRS as an important space for learning, interaction and communication between the library and the community when other traditional spaces were not available. The goal of this evaluation is to capture the lessons learned from providing infrastructure for learning and research in times of crisis both on a practical, user-centered level but also to stress the importance of leadership in ever-changing environments that supports and creates agile, flexible services and teams instead of rigid processes adhering to obsolete goals. Results:- Reduced availability at the physical library locations was one of the strategies to prevent the spread of the covid-19 virus. The library staff was encouraged to work from home, so student workers staffed the library’s physical locations during that time, leaving the VRS to be the only place where patrons could get expert help. The VRS had an increase of 65% of questions asked between spring term 2019 and spring term 2020. The VRS team had to navigate often complicated and fast-changing new routines depending on national guidelines. The VRS team has a strong emphasis on agility in their approach to the challenges and opportunities, with methods to evaluate decisions regularly with user experience in mind. Fast decision-making, collecting feedback, an open-minded approach to reviewing rules and processes with both a short-term and a long-term focus and providing a healthy work environment have been key factors in managing this crisis and learn from it. This was resting on a strong sense of ownership regarding the VRS, well-working communication tools and agile and active communication between team members, as well as between the team and the rest of the organization who served as a second-line support system to aid the VRS team. Moving forward, the VRS has become an important space for communication, interaction and provider of infrastructure, implementing new routines and more extensive availability due to the lessons learned during crisis. The evaluation shows that the virtual environment has become an important addition to the physical spaces, existing in its own right but always in connection with and in relationship with the library structure as a whole. Thereby showing that the basis of human interaction stays the same while its form morphs and adapts to changes, thus leaving the virtual environment as a space of communication and infrastructure with unique opportunities for outreach and the potential to become a staple in patron’s education and learning.

Keywords: virtual reference service, leadership, digital infrastructure, research library

Procedia PDF Downloads 153
13145 Elements of Sector Benchmarking in Physical Education Curriculum: An Indian Perspective

Authors: Kalpana Sharma, Jyoti Mann

Abstract:

The study was designed towards institutional analysis for a clear understanding of the process involved in functioning and layout of determinants influencing physical education teacher’s education program in India. This further can be recommended for selection of parameters for creating sector benchmarking for physical education teachers training institutions across India. 165 stakeholders involving students, teachers, parents, administrators were surveyed from the identified seven institutions and universities from different states of India. They were surveyed on the basis of seven broad parameters which were associated with the post graduate physical education program in India. A physical education program assessment tool of 52 items was designed to administer it among the stakeholders selected for the survey. An item analysis of the contents was concluded through the review process from selected experts working in higher education with experience in teacher training program in physical education. The data was collected from the stakeholders of the selected institutions through Physical Education Program Assessment Tool (PEPAT). The hypothesis that PE teacher education program is independent of physical education institutions was significant. The study directed a need towards robust admission process emphasizing on identification, selection of potential candidates and quality control of intake with the scientific process developed according to the Indian education policies and academic structure. The results revealed that the universities do not have similar functional and delivery process related to the physical education teacher training program. The study reflects towards the need for physical education universities and institutions to identify the best practices to be followed regarding the functioning of delivery of physical education programs at various institutions through strategic management studies on the identified parameters before establishing strict standards and norms for achieving excellence in physical education in India.

Keywords: assessment, benchmarking, curriculum, physical education, teacher education

Procedia PDF Downloads 538
13144 Social Media Creating Communication Gap among Individuals

Authors: Muneeza Anwar, Muniba Raza, Zunahs Khalid

Abstract:

The study discusses the communication gap that has been created due to excessive use of social networking websites such as Facebook, WhatsApp, Viber etc. In this growing world of technology and awareness among people about social media it has also increased its usage. The objective of this study is to measure the ways the internet is affecting the communications among individuals through social media and to check whether this is affecting the society in a positive manner. The study signifies the theoretical and practical aspects of communication gaps among the individuals through social media. The study is conducted to check whether social networking websites are the main causes of creating communication gap among individuals. In this world of fast growing technology every day, there is a new invention, affecting the lives of people both directly and indirectly. Moreover with the usage of technology people keep updating about themselves, about different events happening around their surrounding by creating events, uploading pictures, checking in different place, and creating awareness among people who are not aware of people about what is happening. From the study, we deduced how social media is affecting individual’s life. The findings suggest that social media is although creating communication gaps among people but is also bridging them. Showing that social media is one of the causes that is creating communication gap among the individuals. Communication gap has although increased on a daily basis but on average it has remained the same as they are communicating on social networking websites but eventually decreasing the communication on personal grounds.

Keywords: communication gaps, usage of social networking websites, interaction with friends and family, social media

Procedia PDF Downloads 468
13143 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 499
13142 Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis

Authors: Yunos Zahri, Ariffin Aswami

Abstract:

Cyber terrorism represents the convergence of two worlds: virtual and physical. The virtual world is a place in which computer programs function and data move, whereas the physical world is where people live and function. The merging of these two domains is the interface being targeted in the incidence of cyber terrorism. To better understand why cyber terrorism acts are committed, this study presents the context of cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological and economic. In this research, data are analyzed using a qualitative method. A semi-structured interview with purposive sampling was used for data collection. With the growing interconnectedness between critical infrastructures and Information & Communication Technology (ICT), selecting targets that facilitate maximum disruption can significantly influence terrorists. This work provides a baseline for defining the concept of cyber terrorism from motivational perspectives.

Keywords: cyber terrorism, terrorism, motivation, qualitative analysis

Procedia PDF Downloads 405
13141 Enhancing the Efficiency of Organic Solar Cells Using Metallic Nanoparticles

Authors: Sankara Rao Gollu, Ramakant Sharma, G. Srinivas, Souvik Kundu, Dipti Gupta

Abstract:

In recent years, bulk heterojunction organic solar cells (BHJ OSCs) based on polymer–fullerene attracted a large research attention due to their numerous advantages such as light weight, easy processability, eco-friendly, low-cost, and capability for large area roll-to-roll manufacturing. BHJ OSCs usually suffer from insufficient light absorption due to restriction on keeping thin ( < 150 nm) photoactive layer because of small exciton diffusion length ( ~ 10 nm) and low charge carrier mobilities. It is thus highly desirable that light absorption as well as charge transport properties are enhanced by alternative methods so as to improve the device efficiency. In this work, therefore, we have focused on the strategy of incorporating metallic nanostructures in the active layer or charge transport layer to enhance the absorption and improve the charge transport.

Keywords: organic solar cell, efficiency, bulk heterojunction, polymer-fullerene

Procedia PDF Downloads 383
13140 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 281
13139 Mathematical Modelling of Biogas Dehumidification by Using of Counterflow Heat Exchanger

Authors: Staņislavs Gendelis, Andris Jakovičs, Jānis Ratnieks, Aigars Laizāns, Dāvids Vardanjans

Abstract:

Dehumidification of biogas at the biomass plants is very important to provide the energy efficient burning of biomethane at the outlet. A few methods are widely used to reduce the water content in biogas, e.g. chiller/heat exchanger based cooling, usage of different adsorbents like PSA, or the combination of such approaches. A quite different method of biogas dehumidification is offered and analyzed in this paper. The main idea is to direct the flow of biogas from the plant around it downwards; thus, creating additional insulation layer. As the temperature in gas shell layer around the plant will decrease from ~ 38°C to 20°C in the summer or even to 0°C in the winter, condensation of water vapor occurs. The water from the bottom of the gas shell can be collected and drain away. In addition, another upward shell layer is created after the condensate drainage place on the outer side to further reducing heat losses. Thus, counterflow biogas heat exchanger is created around the biogas plant. This research work deals with the numerical modelling of biogas flow, taking into account heat exchange and condensation on cold surfaces. Different kinds of boundary conditions (air and ground temperatures in summer/winter) and various physical properties of constructions (insulation between layers, wall thickness) are included in the model to make it more general and useful for different biogas flow conditions. The complexity of this problem is fact, that the temperatures in both channels are conjugated in case of low thermal resistance between layers. MATLAB programming language is used for multiphysical model development, numerical calculations and result visualization. Experimental installation of a biogas plant’s vertical wall with an additional 2 layers of polycarbonate sheets with the controlled gas flow was set up to verify the modelling results. Gas flow at inlet/outlet, temperatures between the layers and humidity were controlled and measured during a number of experiments. Good correlation with modelling results for vertical wall section allows using of developed numerical model for an estimation of parameters for the whole biogas dehumidification system. Numerical modelling of biogas counterflow heat exchanger system placed on the plant’s wall for various cases allows optimizing of thickness for gas layers and insulation layer to ensure necessary dehumidification of the gas under different climatic conditions. Modelling of system’s defined configuration with known conditions helps to predict the temperature and humidity content of the biogas at the outlet.

Keywords: biogas dehumidification, numerical modelling, condensation, biogas plant experimental model

Procedia PDF Downloads 537
13138 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 321
13137 The Role and Position of Chinese Modern Martial Art in the School Physical Education (1912-1945)

Authors: Hsien-Wei Kuo

Abstract:

The thoughts of the military citizens, pragmatism, naturalism and nationalism related to physical education were developed during the warring period of the Republic of China. Moreover, the development of martial art formed by nationalism and political party was to utilize to save the nation, the people and the world. The martial art was also promoted in the system of school physical education gradually at the same time. The aim of this study is to explore the role, duty and position of the martial art education with the political color and advocacy in the system of school physical education. This study focuses on the practice, course hours, selective materials and competitive rules of physical education in the school system in modern China. Therefore, the methods of the historical research and content analysis were used to collect the historical materials and documents for going into them. The results will give a detailed account of the developed model of institutionalization, unification and regularization of martial art, and its growing, golden and stagnant periods in the school physical education system under the impact of western sport and physical education. It may sum up the meaning relationships among the politics, education practice and sport for all.

Keywords: martial art education, national martial arts institution, sick man of East Asia, the may 4th movement

Procedia PDF Downloads 363
13136 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 401
13135 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 373
13134 Experimental Investigation of Boundary Layer Instability and Transition on a Rotating Parabola in Axial Flow

Authors: Ali Kargar, Kamyar Mansour

Abstract:

In this paper the boundary layer instability and transition on a rotating parabola which is sheathed shape on a rotating 30 degrees total apex angle cone have been study by smoke visualization. The rotating cone especially 30 degrees total apex angle is a well-established subject in some previous novel works and also in our previous works. But in this paper a stabilizing effect is detected by the bluntness of nose and also surface curvature. A parabola model which is satisfying those conditions (sheathed parabola of the 30 degrees cone) has been built and studied in the wind tunnel. The results are shown that the boundary layer transition occurs at higher rotational Reynolds number in comparison by the cone. The results are shown in the visualization pictures and also are compared graphically.

Keywords: transitional Reynolds number, wind tunnel, smoke visualization, rotating parabola

Procedia PDF Downloads 404
13133 A Qualitative Study on Exploring How the Home Environment Influences Eating and Physical Activity Habits of Low-Income Latino Children of Predominantly Immigrant Families

Authors: Ana Cristina Lindsay, Sherrie Wallington, Faith Lees, Mary Greaney

Abstract:

Purpose: Latino children in low-income families are at elevated risk of becoming overweight or obese. The purpose of this study was to examine low-income Latino parents’ beliefs, parenting styles and practices related to their children’s eating and physical activity behaviors while at home. Design and Methods: Qualitative study using focus group discussions with 33 low-income Latino parents of preschool children 2 to 5 years of age. Transcripts were analyzed using thematic analysis. Results: Data analyses revealed that most parents recognize the importance of healthy eating and physical activity for their children and themselves. However, daily life demands including conflicting schedules, long working hours, financial constraints, and neighborhood safety concerns, etc., impact parents’ ability to create a home environment supportive of these behaviors. Conclusions: This study provides information about how the home environment influences low-income Latino preschool children’s eating and physical activity habits. This information is useful for pediatric nurses in their health promotion and disease prevention efforts with low-income Latino families with young children, and for the development of home-based and parenting interventions to prevent and control childhood obesity among this population group. Practice Implications: Pediatric nurses can facilitate communication, provide education, and offer guidance to low-income Latino parents that support their children’s development of early healthy eating and physical activity habits, while taking into account daily life barriers faced by families. Moreover, nurses can play an important role in the integration and coordination of home-visitation to complement office-based visits and provide a continuum of care to low-income Latino families.

Keywords: home environment, Latino, obesity, parents, healthy eating, physical activity

Procedia PDF Downloads 275
13132 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 334
13131 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 116
13130 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 673
13129 SPPO-Based Cation Exchange Membranes with a Positively Charged Layer for Cation Fractionation

Authors: Noor Ul Afsar, Wengen Ji, Bin Wu, Muhammad A. Shehzad, Liang Ge, Tongwen Xu

Abstract:

The synthesis of monovalent cation perm-selective membranes (MCPMs) to efficiently discriminate amongst cations from seawater is of great importance for several industrial applications. However, a technical approach is highly desired to construct MCPMs to obtain a high ionic flux and sustain perm-selectivity simultaneously. In the present work, the thickness of the quaternized poly (2, 6-dimethyl-1, 4-phenylene oxide) (QPPO) layer on the surface of the SPPO-PVA (SPVA) composite membrane was adjusted using a facile procedure to achieve high permselectivity without scarifying the ionic flux. The thickness of the selective layer was precisely controlled using various concentrations of the QPPO solution. By the introduction of the cationic layer on the SPVA membrane, the monovalent cation can be separated from the divalent cation by their difference in charge density. The influence of the selective barrier (thickness) endows MCPMs with high perm-selectivity up to 12.7 for 0.1 mol L⁻¹ Li⁺/Mg²⁺ system, which is very satisfactory for polymeric membranes. The fabricated membranes have low electrical resistance and high limiting current density (iₗᵢₘ). Keeping in view the ED results, the prepared membranes with selective surface layers could be a viable candidate for Li⁺ selective separation from divalent cation Mg²⁺.

Keywords: monovalent cation perm-selective membranes, cation fractionation, perm-selectivity, ionic flux, electrodialysis

Procedia PDF Downloads 60
13128 Improved Performance of AlGaN/GaN HEMTs Using N₂/NH₃ Pretreatment before Passivation

Authors: Yifan Gao

Abstract:

Owing to the high breakdown field, high saturation drift velocity, 2DEG with high density and mobility and so on, AlGaN/GaN HEMTs have been widely used in high-frequency and high-power applications. To acquire a higher power often means higher breakdown voltage and higher drain current. Surface leakage current is usually the key issue affecting the breakdown voltage and power performance. In this work, we have performed in-situ N₂/NH₃ pretreatment before the passivation to suppress the surface leakage and achieve device performance enhancement. The AlGaN/GaN HEMT used in this work was grown on a 3-in. SiC substrate, whose epitaxial structure consists of a 3.5-nm GaN cap layer, a 25-nm Al₀.₂₅GaN barrier layer, a 1-nm AlN layer, a 400-nm i-GaN layer and a buffer layer. In order to analyze the mechanism for the N-based pretreatment, the details are measured by XPS analysis. It is found that the intensity of Ga-O bonds is decreasing and the intensity of Ga-N bonds is increasing, which means with the supplement of N, the dangling bonds on the surface are indeed reduced with the forming of Ga-N bonds, reducing the surface states. The surface states have a great influence on the leakage current, and improved surface states represent a better off-state of the device. After the N-based pretreatment, the breakdown voltage of the device with Lₛ𝒹=6 μm increased from 93V to 170V, which increased by 82.8%. Moreover, for HEMTs with Lₛ𝒹 of 6-μm, we can obtain a peak output power (Pout) of 12.79W/mm, power added efficiency (PAE) of 49.84% and a linear gain of 20.2 dB at 60V under 3.6GHz. Comparing the result with the reference 6-μm device, Pout is increased by 16.5%. Meanwhile, PAE and the linear gain also have a slight increase. The experimental results indicate that using N₂/NH₃ pretreatment before passivation is an attractive approach to achieving power performance enhancement.

Keywords: AlGaN/GaN HEMT, N-based pretreatment, output power, passivation

Procedia PDF Downloads 307
13127 Creative Peace Diplomacy Model by the Perspective of Dialogue Management for International Relations

Authors: Bilgehan Gültekin, Tuba Gültekin

Abstract:

Peace diplomacy is the most important international tool to keep peace all over the world. The study titled “peace diplomacy for international relations” is consist of three part. In the first part, peace diplomacy is going to be introduced as a tool of peace communication and peace management. And, in this part, peace communication will be explained by international communication perspective. In the second part of the study,public relations events and communication campaigns will be developed originally for peace diplomacy. In this part, it is aimed original public communication dialogue management tools for peace diplomacy. the aim of the final part of the study, is to produce original public communication model for international relations. The model includes peace modules, peace management projects, original dialogue procedures and protocols, dialogue education, dialogue management strategies, peace actors, communication models, peace team management and public diplomacy steps. The creative part of the study aims to develop a model used for international relations for all countries. Creative Peace Diplomacy Model will be developed in the case of Turkey-Turkey-France and Turkey-Greece relations. So, communication and public relations events and campaigns are going to be developed as original for only this study.

Keywords: peace diplomacy, public communication model, dialogue management, international relations

Procedia PDF Downloads 523
13126 Crossing Borders: In Research and Business Communication

Authors: Edith Podhovnik

Abstract:

Cultures play a role in business communication and in research. At the example of language in international business, this paper addresses the issue of how the research cultures of management research and linguistics as well as cultures as such can be linked. After looking at existing research on language in international business, this paper approaches communication in international business from a linguistic angle and attempts to explain communication issues in businesses based on linguistic research. Thus, the paper makes a step into cross-disciplinary research combining management research with linguistics.

Keywords: language in international business, sociolinguistics, ethnopragmatics, cultural scripts

Procedia PDF Downloads 623
13125 Optical Breather in Phosphorene Monolayer

Authors: Guram Adamashvili

Abstract:

Surface plasmon polariton is a surface optical wave which undergoes a strong enhancement and spatial confinement of its wave amplitude near an interface of two-dimensional layered structures. Phosphorene (single-layer black phosphorus) and other two-dimensional anisotropic phosphorene-like materials are recognized as promising materials for potential future applications of surface plasmon polariton. A theory of an optical breather of self-induced transparency for surface plasmon polariton propagating in monolayer or few-layer phosphorene is developed. A theory of an optical soliton of self-induced transparency for surface plasmon polariton propagating in monolayer or few-layer phosphorene have been investigated earlier Starting from the optical nonlinear wave equation for surface TM-modes interacting with a two-dimensional layer of atomic systems or semiconductor quantum dots and a phosphorene monolayer (or other two-dimensional anisotropic material), we have obtained the evolution equations for the electric field of the breather. In this case, one finds that the evolution of these pulses become described by the damped Bloch-Maxwell equations. For surface plasmon polariton fields, breathers are found to occur. Explicit relations of the dependence of breathers on the local media, phosphorene anisotropic conductivity, transition layer properties and transverse structures of the SPP, are obtained and will be given. It is shown that the phosphorene conductivity reduces exponentially the amplitude of the surface breather of SIT in the process of propagation. The direction of propagation corresponding to the maximum and minimum damping of the amplitude are assigned along the armchair and zigzag directions of black phosphorus nano-film, respectively. The most rapid damping of the intensity occurs when the polarization of breather is along the armchair direction.

Keywords: breathers, nonlinear waves, solitons, surface plasmon polaritons

Procedia PDF Downloads 137
13124 Effect of Concrete Strength on the Bond Between Carbon Fiber Reinforced Polymer and Concrete in Hot Weather

Authors: Usama Mohamed Ahamed

Abstract:

This research deals with the bond behavior of carbon FRP composite wraps adhered/bonded to the surface of the concrete. Four concrete mixes were designed to achieve a concrete compressive strength of 18, 22.5,25 and 30 MP after 28 days of curing. The focus of the study is on bond degradation when the hybrid structure is exposed to hot weather conditions. Specimens were exposed to 50 0C temperature duration 6 months and other specimens were sustained in laboratory temperature ( 20-24) 0C. Upon removing the specimens from their conditioning environment, tension tests were performed in the machine using a specially manufactured concrete cube holder. A lightweight mortar layer is used to protect the bonded carbon FRP layer on the concrete surface. The results show that the higher the concrete's compressive, the higher the bond strength. The high temperature decreases the bond strength between concrete and carbon fiber-reinforced polymer. The use of a protection layer is essential for concrete exposed to hot weather.

Keywords: concrete, bond, hot weather and carbon fiber, carbon fiber reinforced polymers

Procedia PDF Downloads 88
13123 The Role and Effects of Communication on Occupational Safety: A Review

Authors: Pieter A. Cornelissen, Joris J. Van Hoof

Abstract:

The interest in improving occupational safety started almost simultaneously with the beginning of the Industrial Revolution. Yet, it was not until the late 1970’s before the role of communication was considered in scientific research regarding occupational safety. In recent years the importance of communication as a means to improve occupational safety has increased. Not only as communication might have a direct effect on safety performance and safety outcomes, but also as it can be viewed as a major component of other important safety-related elements (e.g., training, safety meetings, leadership). And while safety communication is an increasingly important topic in research, its operationalization is often vague and differs among studies. This is not only problematic when comparing results, but also in applying these results to practice and the work floor. By means of an in-depth analysis—building on an existing dataset—this review aims to overcome these problems. The initial database search yielded 25.527 articles, which was reduced to a research corpus of 176 articles. Focusing on the 37 articles of this corpus that addressed communication (related to safety outcomes and safety performance), the current study will provide a comprehensive overview of the role and effects of safety communication and outlines the conditions under which communication contributes to a safer work environment. The study shows that in literature a distinction is commonly made between safety communication (i.e., the exchange or dissemination of safety-related information) and feedback (i.e. a reactive form of communication). And although there is a consensus among researchers that both communication and feedback positively affect safety performance, there is a debate about the directness of this relationship. Whereas some researchers assume a direct relationship between safety communication and safety performance, others state that this relationship is mediated by safety climate. One of the key findings is that despite the strongly present view that safety communication is a formal and top-down safety management tool, researchers stress the importance of open communication that encourages and allows employees to express their worries, experiences, views, and share information. This raises questions with regard to other directions (e.g., bottom-up, horizontal) and forms of communication (e.g., informal). The current review proposes a framework to overcome the often vague and different operationalizations of safety communication. The proposed framework can be used to characterize safety communication in terms of stakeholders, direction, and characteristics of communication (e.g., medium usage).

Keywords: communication, feedback, occupational safety, review

Procedia PDF Downloads 291
13122 Perceived Effect of Physical Exercise on Healthy Well-Being of Pregnant Women in Imo State

Authors: Roseline Chizoba Onuoha, Rose Ngozi Uzoka

Abstract:

This study aimed at investigating perceived effect of physical exercise on healthy well-being of pregnant mothers in Imo state. The study was guided by three research questions and three null hypotheses tested at 0.05 level of significance. The study was a quasi-experimental non-equivalent control group design involving pre and post tests. A sample of 92 pregnant women drawn from a total population of 922 registered pregnant women in ten randomly selected health centers in Imo State through multistage sampling technique was used. A 41 item structured instrument titled Physical Exercise Pregnancy Test (PEPT) was used for the study. The PEPT was validated by three experts from measurement and evaluation, educational psychology and health education. Crombach Alpha method was used to determine the reliability of Physical Exercise Pregnancy Test (PEPT) and reliability index of 0.82 was obtained. Mean and standard deviation were used to answer the research questions; while Analysis of Covariance (ANCOVA) was used in analyzing the hypotheses. Findings of the study revealed that physical exercise affects physical, social and emotional wellbeing scores of pregnant women. The study also indicated that intervention using physical exercise significantly enhanced healthy well-being scores of pregnant mothers who were exposed to physical exercise than those who received conventional health talks; Location has no significant interaction effect on the mean well-being scores of pregnant women via PEPT. Among recommendations made were that pregnant women should participate in physical exercise.

Keywords: educational psychology, Imo state, Physical exercise, pregnant women

Procedia PDF Downloads 125
13121 A Discussion on Electrically Small Antenna Property

Authors: Riki H. Patel, Arpan Desia, Trushit Upadhayay

Abstract:

The demand of compact antenna is ever increasing since the inception of wireless communication devices. In the age of wireless communication, requirement of miniaturized antennas is quite high. It is quite often that antenna dimensions are decided based on application based requirement compared to practical antenna constraints. The tradeoff in efficiency and other antenna parameters against to antenna size is always a debatable issue. The article presents detailed review of fundamentals of electrically small antennas and its potential applications. In addition, constraints and challenges of electrically small antennas are also presented in the article.

Keywords: bandwidth, communication, electrically small antenna, communication engineering

Procedia PDF Downloads 518
13120 Interpolation Issue in PVNPG-14M Application for Technical Control of Artillery Fire

Authors: Martin Blaha, Ladislav Potužák, Daniel Holesz

Abstract:

This paper focused on application support for technical control of artillery units – PVNPG-14M, especially on interpolation issue. Artillery units of the Army of the Czech Republic, reflecting the current global security neighborhood, can be used outside the Czech Republic. The paper presents principles, evolution and calculation in the process of complete preparation. The paper presents expertise using of application of current artillery communication and information system and suggests the perspective future system. The paper also presents problems in process of complete preparing of fire especially problems in permanently information (firing table) and calculated values. The paper presents problems of current artillery communication and information system and suggests requirements of the future system.

Keywords: Fire for Effect, Application, Fire Control, Interpolation method, Software development.

Procedia PDF Downloads 306
13119 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 80
13118 Factors Affecting the Mental and Physical Health of Nurses during the Outbreak of COVID-19: A Case Study of a Hospital in Mashhad

Authors: Ghorbanali Mohammadi

Abstract:

Background: Due to the widespread outbreak of the COVID-19 virus, a large number of people become infected with the disease every day and go to hospitals. The acute condition of this disease has caused the death of many people. Since all the stages of treatment for these people happen in the hospitals, nurses are at the forefront of the fight against this virus. This causes nurses to suffer from physical and mental health problems. Methods: Physical and mental problems in nurses were assessed using the Depression, Anxiety and Stress Scale (DASS-42) of Lovibond (1995) and the Nordic Questionnaire. Results: 90 nurses from emergency, intensive care, and coronary care units were examined, and a total of 180 questionnaires were collected and evaluated. It was found that 37.78%, 47.78%, and 21.11% of nurses have symptoms of depression, anxiety, and stress, respectively. 40% of the nurses had physical problems. In total, 65.17% of them were involved in one or more mental or physical illnesses. Conclusions: Of the three units surveyed, the nurses in intensive care, emergency room, and coronary care units worked more than ten hours a day. Examining the interaction of physical and mental health problems indicated that physical problems can aggravate mental problems.

Keywords: depression anxiety and stress scale of Lovibond, nordic questionnaire, mental health of nurses, physical health problems in nurses

Procedia PDF Downloads 108