Search results for: quantum secure communcation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1256

Search results for: quantum secure communcation

386 Modelling and Optimization Analysis of Silicon/MgZnO-CBTSSe Tandem Solar Cells

Authors: Vallisree Sivathanu, Kumaraswamidhas Lakshmi Annamalai, Trupti Ranjan Lenka

Abstract:

We report a tandem solar cell model with Silicon as the bottom cell absorber material and Cu₂BaSn(S, Se)₄(CBTSSe) as absorber material for the top cell. As a first step, the top and bottom cells were modelled and validated by comparison with the experiment. Once the individual cells are validated, then the tandem structure is modelled with Indium Tin Oxide(ITO) as conducting layer between the top and bottom cells. The tandem structure yielded better open circuit voltage and fill factor; however, the efficiency obtained is 7.01%. The top cell and the bottom cells are investigated with the help of electron-hole current density, photogeneration rate, and external quantum efficiency profiles. In order to minimize the various loss mechanisms in the tandem solar cell, the material parameters are optimized within experimentally achievable limits. Initially, the top cell optimization was carried out; then, the bottom cell is optimized for maximizing the light absorption, and upon minimizing the current and photon losses in the tandem structure, the maximum achievable efficiency is predicted to be 19.52%.

Keywords: CBTSSe, silicon, tandem, solar cell, device modeling, current losses, photon losses

Procedia PDF Downloads 104
385 Triple Intercell Bar for Electrometallurgical Processes: A Design to Increase PV Energy Utilization

Authors: Eduardo P. Wiechmann, Jorge A. Henríquez, Pablo E. Aqueveque, Luis G. Muñoz

Abstract:

PV energy prices are declining rapidly. To take advantage of the benefits of those prices and lower the carbon footprint, operational practices must be modified. Undoubtedly, it challenges the electrowinning practice to operate at constant current throughout the day. This work presents a technology that contributes in providing modulation capacity to the electrode current distribution system. This is to raise the day time dc current and lower it at night. The system is a triple intercell bar that operates in current-source mode. The design is a capping board free dogbone type of bar that ensures an operation free of short circuits, hot swapability repairs and improved current balance. This current-source system eliminates the resetting currents circulating in equipotential bars. Twin auxiliary connectors are added to the main connectors providing secure current paths to bypass faulty or impaired contacts. All system conductive elements are positioned over a baseboard offering a large heat sink area to the ventilation of a facility. The system works with lower temperature than a conventional busbar. Of these attributes, the cathode current balance property stands out and is paramount for day/night modulation and the use of photovoltaic energy. A design based on a 3D finite element method model predicting electric and thermal performance under various industrial scenarios is presented. Preliminary results obtained in an electrowinning facility with industrial prototypes are included.

Keywords: electrowinning, intercell bars, PV energy, current modulation

Procedia PDF Downloads 145
384 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria

Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu

Abstract:

Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.

Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression

Procedia PDF Downloads 161
383 Spectroscopic Investigations of Nd³⁺ Doped Lithium Lead Alumino Borate Glasses for 1.06μM Laser Applications

Authors: Nisha Deopa, A. S. Rao

Abstract:

Neodymium doped lithium lead alumino borate glasses were synthesized with the molar composition 10Li₂O – 10PbO – (10-x) Al₂O₃ – 70B₂O₃ – xNd₂O₃ (where, x = 0.1, 0.5, 1.0, 1.5, 2.0 and 2.5 mol %) via conventional melt quenching technique to understand their lasing potentiality. From the absorption spectra, Judd-Ofelt intensity parameters along with various spectroscopic parameters have been estimated. The emission spectra recorded for the as-prepared glasses under investigation exhibit two emission transitions, ⁴F₃/₂→⁴I₁₁/₂ (1063 nm) and ⁴F₃/₂→⁴I₉/₂ (1350 nm) for which radiative parameters have been evaluated. The emission intensity increases with increase in Nd³⁺ ion concentration up to 1 mol %, and beyond concentration quenching took place. The decay profile shows single exponential nature for lower Nd³⁺ ions concentration and non-exponential for higher concentration. To elucidate the nature of energy transfer process, non-exponential decay curves were well fitted to Inokuti-Hirayama model. The relatively high values of emission cross-section, branching ratio, lifetimes and quantum efficiency suggest that 1.0 mol% of Nd³⁺ in LiPbAlB glasses is aptly suitable to generate lasing action in NIR region at 1063 nm.

Keywords: energy transfer, glasses, J-O parameters, photoluminescence

Procedia PDF Downloads 181
382 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 281
381 Two-Photon-Exchange Effects in the Electromagnetic Production of Pions

Authors: Hui-Yun Cao, Hai-Qing Zhou

Abstract:

The high precision measurements and experiments play more and more important roles in particle physics and atomic physics. To analyse the precise experimental data sets, the corresponding precise and reliable theoretical calculations are necessary. Until now, the form factors of elemental constituents such as pion and proton are still attractive issues in current Quantum Chromodynamics (QCD). In this work, the two-photon-exchange (TPE) effects in ep→enπ⁺ at small -t are discussed within a hadronic model. Under the pion dominance approximation and the limit mₑ→0, the TPE contribution to the amplitude can be described by a scalar function. We calculate TPE contributions to the amplitude, and the unpolarized differential cross section with the only elastic intermediate state is considered. The results show that the TPE corrections to the unpolarized differential cross section are about from -4% to -20% at Q²=1-1.6 GeV². After considering the TPE corrections to the experimental data sets of unpolarized differential cross section, we analyze the TPE corrections to the separated cross sections σ(L,T,LT,TT). We find that the TPE corrections (at Q²=1-1.6 GeV²) to σL are about from -10% to -30%, to σT are about 20%, and to σ(LT,TT) are much larger. By these analyses, we conclude that the TPE contributions in ep→enπ⁺ at small -t are important to extract the separated cross sections σ(L,T,LT,TT) and the electromagnetic form factor of π⁺ in the experimental analysis.

Keywords: differential cross section, form factor, hadronic, two-photon

Procedia PDF Downloads 120
380 Labour Productivity Measurement and Control Standards for Hotels

Authors: Kristine Joy Simpao

Abstract:

Improving labour productivity is one of the most enthralling and challenging aspects of managing hotels and restaurant business. The demand to secure countless productivity became an increasingly pivotal role of managers to survive and sustain the business. Besides making business profitable, they are in the doom to make every resource to become productive and effective towards achieving company goal while maximizing the value of organization. This paper examines what productivity means to the services industry, in particular, to the hotel industry. This is underpinned by an investigation of the extent of practice of respondent hotels to the labour productivity aspect in the areas of materials management, human resource management and leadership management and in a way, computing the labour productivity ratios using the hotel simple ratios of productivity in order to find a suitable measurement and control standards for hotels with SBMA, Olongapo City as the locale of the study. The finding shows that hotels labour productivity ratings are not perfect with some practices that are far below particularly on strategic and operational decisions in improving performance and productivity of its human resources. It further proves of the no significant difference ratings among the respondent’s type in all areas which indicated that they are having similar perception of the weak implementation of some of the indicators in the labour productivity practices. Furthermore, the results in the computation of labour productivity efficiency ratios resulted relationship of employees versus labour productivity practices are inversely proportional. This study provides a potential measurement and control standards for the enhancement of hotels labour productivity. These standards should also contain labour productivity customized for standard hotels in Subic Bay Freeport Zone to assist hotel owners in increasing the labour productivity while meeting company goals and objectives effectively.

Keywords: labour productivity, hotel, measurement and control, standards, efficiency ratios, practices

Procedia PDF Downloads 305
379 Natural Radionuclides and Doses Assessment in Soil Samples from Agbara Industrial Estate, Ogun State, Nigeria

Authors: Ayorinde B. Ogunremi, Kehinde A. Adewoyin, Adebamwo Adebayo

Abstract:

Record of radionuclide concentration in an environment is essential to ensure human safety due to exposure to ionizing radiation. This study aimed at assessing the radionuclide concentration and doses from soil samples in the study area. Twenty soil samples were collected and dried in the oven at 110°C to remove the moisture, pulverized, and sieved. 200 g of each of the samples were sealed in cylindrical sample holders; they were left for four weeks to attain secular equilibrium between ²²⁶Ra and its decay daughters, after which the sample was analyzed using gamma-ray spectrometry. After the well-guided procedure for the calibrations, the analysis of the samples was carried out using a well-calibrated NaI (TI) and well-shielded detector coupled to a computer resident quantum MCA2100 R Multichannel analyzer for 36,000 s. The mean activity concentrations of ⁴⁰K, ²²⁶Ra, and ²³²Th obtained were calculated to be 272.37 ± 33.58, 10.97 ± 3.24, 9.39 ± 2.27 Bqkg-1 respectively. The average absorbed dose obtained was 22.10 nGy/h. The radium equivalent activity (Raeq) was estimated to be 43.27 Bq/kg. The activity concentrations (Bq/kg) were below the recommended values, which are 420, 33, and 45 for ⁴⁰K, ²²⁶Ra, and ²³²Th, respectively. Considering the results, we conclude thus, the radiation level within the estate poses no significant health risk on dwellers and workers.

Keywords: absorbed, effective, multichannel, radionuclide

Procedia PDF Downloads 206
378 Associations between Parental Divorce Process Variables and Parent-Child Relationships Quality in Young Adulthood

Authors: Klara Smith-Etxeberria

Abstract:

main goal of this study was to analyze the predictive ability of some variables associated with the parental divorce process alongside attachment history with parents on both, mother-child and father-child relationship quality. Our sample consisted of 173 undergraduate and vocational school students from the Autonomous Community of the Basque Country. All of them belonged to a divorced family. Results showed that adequate maternal strategies during the divorce process (e.g.: stable, continuous and positive role as a mother) was the variable with greater predictive ability on mother-child relationships quality. In addition, secure attachment history with mother also predicted positive mother-child relationships. On the other hand, father-child relationship quality was predicted by adequate paternal strategies during the divorce process, such as his stable, continuous and positive role as a father, along with not badmouthing the mother and promoting good mother-child relationships. Furthermore, paternal negative emotional state due to divorce was positively associated with father-child relationships quality, and both, history of attachment with mother and with father predicted father-child relationships quality. In conclusion, our data indicate that both, paternal and maternal strategies for children´s adequate adjustment during the divorce process influence on mother-child and father-child relationships quality. However, these results suggest that paternal strategies during the divorce process have a greater predictive ability on father-child relationships quality, whereas maternal positive strategies during divorce determine positive mother-child relationships among young adults.

Keywords: father-child relationships quality, mother-child relationships quality, parental divorce process, young adulthood

Procedia PDF Downloads 247
377 Simulation-Based Control Module for Offshore Single Point Mooring System

Authors: Daehyun Baek, Seungmin Lee, Minju Kim Jangik Park, Hyeong-Soon Moon

Abstract:

SPM (Single Point Mooring) is one of the mooring buoy facilities installed on a coast near oil and gas terminal which is not able to berth FPSO or large oil tankers under the condition of high draft due to geometrical limitation. Loading and unloading of crude oil and gas through a subsea pipeline can be carried out between the mooring buoy, ships and onshore facilities. SPM is an offshore-standalone system which has to withstand the harsh marine environment with harsh conditions such as high wind, current and so on. Therefore, SPM is required to have high stability, reliability and durability. Also, SPM is comprised to be integrated systems which consist of power management, high pressure valve control, sophisticated hardware/software and a long distance communication system. In order to secure required functions of SPM system, a simulation model for the integrated system of SPM using MATLAB Simulink and State flow tool has been developed. The developed model consists of configuration of hydraulic system for opening and closing of PLEM (Pipeline End Manifold) valves and control system logic. To verify functions of the model, an integrated simulation model for overall systems of SPM was also developed by considering handshaking variables between individual systems. In addition to the dynamic model, a self-diagnostic function to determine failure of the system was configured, which enables the SPM system itself to alert users about the failure once a failure signal comes to arise. Controlling and monitoring the SPM system is able to be done by a HMI system which is capable of managing the SPM system remotely, which was carried out by building a communication environment between the SPM system and the HMI system.

Keywords: HMI system, mooring buoy, simulink simulation model, single point mooring, stateflow

Procedia PDF Downloads 412
376 First-Principles Study of Inter-Cage Interactions in Inorganic Molecular Crystals

Authors: Abdul Majid, Alia Jabeen, Nimra Zulifqar

Abstract:

The inorganic molecular crystal (IMCs) due to their unusual structure has grabbed a lot of attention due to anisotropy in crystal structure. The IMCs consist of the molecular structures joined together via weak forces. Therefore, a difference between the bonding between the inter-cage and intra-cage interactions exists. To look closely at the bonding and interactions, we investigated interactions between two cages of Sb2O3 structure. The interactions were characterized via Extended Transition State-Natural Orbital for Chemical Valence-method (ETS-NOCV), Natural Bond Orbitals (NBO) and Quantum Theory of Atoms in Molecules (QTAIM). The results revealed strong intra-cage covalent bonding while weak van der Waals (vdWs) interactions along inter-cages exits. This structure cannot be termed as layered material although they have anisotropy in bonding and presence of weak vdWs interactions but its bulk is termed as inorganic layered clusters. This is due to the fact that the free standing sheet/films with these materials are not possible. This type of structures may be the most feasible to be used for the system to deal with high pressures and stress bearing materials.

Keywords: inorganic molecular crystals, density functional theory, cages, interactions

Procedia PDF Downloads 80
375 Flood Devastation Assessment Through Mapping in Nigeria-2022 using Geospatial Techniques

Authors: Hafiz Muhammad Tayyab Bhatti, Munazza Usmani

Abstract:

One of nature's most destructive occurrences, floods do immense damage to communities and economic losses. Nigeria country, specifically southern Nigeria, is known for being prone to flooding. Even though periodic flooding occurs in Nigeria frequently, the floods of 2022 were the worst since those in 2012. Flood vulnerability analysis and mapping are still lacking in this region due to the very limited historical hydrological measurements and surveys on the effects of floods, which makes it difficult to develop and put into practice efficient flood protection measures. Remote sensing and Geographic Information Systems (GIS) are useful approaches to detecting, determining, and estimating the flood extent and its impacts. In this study, NOAA VIIR has been used to extract the flood extent using the flood water fraction data and afterward fused with GIS data for some zonal statistical analysis. The estimated possible flooding areas are validated using satellite imagery from the Moderate Resolution Imaging Spectroradiometer (MODIS). The goal is to map and studied flood extent, flood hazards, and their effects on the population, schools, and health facilities for each state of Nigeria. The resulting flood hazard maps show areas with high-risk levels clearly and serve as an important reference for planning and implementing future flood mitigation and control strategies. Overall, the study demonstrated the viability of using the chosen GIS and remote sensing approaches to detect possible risk regions to secure local populations and enhance disaster response capabilities during natural disasters.

Keywords: flood hazards, remote sensing, damage assessment, GIS, geospatial analysis

Procedia PDF Downloads 117
374 Concerted Strategies for Sustainable Water Resource Management in Semi-Arid Rajasthan State of India

Authors: S. K. Maanju, K. Saha, Sonam Yadav

Abstract:

Rapid urbanization growth and multi-faceted regional level industrialization is posing serious threat to natural groundwater resource in State of Rajasthan which constitute major semi-arid part of India. The groundwater resources of the State are limited and cannot withstand the present rate of exploitation for quite a long time. Recharging of groundwater particularly in the western part, where annual precipitation does not exceed a few centimeters, is extremely slow and cannot replenish the exploited quantum. Hence, groundwater in most of the parts of this region has become an exhausting resource. In major parts water table is lowering down rapidly and continuously. The human beings of this semi-arid region are used to suffering from extreme climatic conditions of arid to semi-arid nature and acute shortage of water. The quality of groundwater too in many areas of this region is not up to the standards prescribed by the health organizations like WHO and BIS. This semi-arid region is one of the highly fluoride contaminated area of India as well as have excess, nitrates, sulphates, chlorides and total dissolved solids at various locations. Therefore, concerted efforts are needed towards sustainable development of groundwater in this State of India.

Keywords: Rajasthan, water, exploitation, sustainable, development and resource

Procedia PDF Downloads 341
373 A Supramolecular Cocrystal of 2-Amino-4-Chloro-6-Methylpyrimidine with 4-Methylbenzoic Acid: Synthesis, Structural Determinations and Quantum Chemical Investigations

Authors: Nuridayanti Che Khalib, Kaliyaperumal Thanigaimani, Suhana Arshad, Ibrahim Abdul Razak

Abstract:

The 1:1 co-crystal of 2-amino-4-chloro-6-methylpyrimidine (2A4C6MP) with 4-methylbenzoic acid (4MBA) (I) has been prepared by slow evaporation method in methanol, which was crystallized in monoclinic C2/c space group, Z = 8, a = 28.431 (2) Å, b = 7.3098 (5) Å, c = 14.2622 (10) Å, and β = 109.618 (3)°. The presence of unionized –COOH functional group in co-crystal I was identified both by spectral methods (1H and 13C NMR, FTIR) and X-ray diffraction structural analysis. The 2A4C6MP molecule interact with the carboxylic group of the respective 4MBA molecule through N—H⋯O and O—H⋯N hydrogen bonds, forming a cyclic hydrogen –bonded motif R22(8). The crystal structure was stabilized by Npyrimidine-H⋯O=C and C=O-H⋯Npyrimidine types hydrogen bonding interactions. Theoretical investigations have been computed by HF and density function (B3LYP) method with 6-311+G(d,p) basis set. The vibrational frequencies together with 1H and 13C NMR chemical shifts have been calculated on the fully optimized geometry of co-crystal I. Theoretical calculations are in good agreement with the experimental results. Solvent-free formation of this co-crystal I is confirmed by powder X-ray diffraction analysis.

Keywords: supramolecular co-crystal, 2-amino-4-chloro-6-methylpyrimidine, Harthree-Fock and DFT studies, spectroscopic analysis

Procedia PDF Downloads 302
372 Through-Bolt Moment Connection in HSS Column

Authors: Bardia Khafaf, Mehrdad Ghaffari, Amir Hussein Samakar

Abstract:

It is currently desirable to use Hollow Square Sections (HSS) in moment resistant structures in construction of building because they offer fewer restrictions for designing and more useful space while adhering to build design codes. This paper present a through bolt connection in HSS column. This connection meets building code standards that require the moment resistant connections to deflect and absorb energy resulting from gravity and seismic loads. Connection through bolts is installed and pretension to provide the connection strength needed to make a beam–column moment rigid zone. A rigid joint is typically used to resist lateral forces by holding columns and beams fixed in relation to one another. With bolted moment frames using HSS columns, a through–bolt connection could be used to secure the beam and end plate to the column. However, when multiple columns and beams are used to span a length of building, the use of through-bolts would necessities aligning multiple beams simultaneously to the columns. In the case of a linear span, the assembly process requires the holes of a first beam end plate to be aligned with through bolt holes in a column and aligning the holes of a second, opposing beam plate with the column through bolt, then inserting the through bolts in each hole for tightening with nuts and washers. In moment resistant building, a problem arises when assembling beams to columns where multiple beams and columns are required. Through bolt, moment connections are among the economical, practical and not difficult rigid steel connection for HSS column building. In this paper, the results of numerous analytical studies performed for moment structures with HSS columns with through bolt based on AISC standard codes are shown.

Keywords: through bolt, moment resistant connection, HSS columns section, construction engineering

Procedia PDF Downloads 450
371 Noninvasive Continuous Glucose Monitoring Device Using a Photon-Assisted Tunneling Photodetector Based on a Quantum Metal-Oxide-Semiconductor

Authors: Wannakorn Sangthongngam, Melissa Huerta, Jaewoo Kim, Doyeon Kim

Abstract:

Continuous glucose monitoring systems are essential for diabetics to avoid health complications but come at a costly price, especially when insurance does not fully cover the diabetic testing kits needed. This paper proposes a noninvasive continuous glucose monitoring system to provide an accessible, low-cost, and painless alternative method of accurate glucose measurements to help improve quality of life. Using a light source with a wavelength of 850nm illuminates the fingertip for the photodetector to detect the transmitted light. Utilizing SeeDevice’s photon-assisted tunneling photodetector (PAT-PD)-based QMOS™ sensor, fluctuations of voltage based on photon absorption in blood cells are comparable to traditional glucose measurements. The performance of the proposed method was validated using 4 test participants’ transmitted voltage readings compared with measurements obtained from the Accu-Chek glucometer. The proposed method was able to successfully measure concentrations from linear regression calculations.

Keywords: continuous glucose monitoring, non-invasive continuous glucose monitoring, NIR, photon-assisted tunneling photodetector, QMOS™, wearable device

Procedia PDF Downloads 80
370 Modeling the Elastic Mean Free Path of Electron Collision with Pyrimidine: The Screen Corrected Additivity Rule Method

Authors: Aouina Nabila Yasmina, Chaoui Zine El Abiddine

Abstract:

This study presents a comprehensive investigation into the elastic mean free path (EMFP) of electrons colliding with pyrimidine, a precursor to the pyrimidine bases in DNA, employing the Screen Corrected Additivity Rule (SCAR) method. The SCAR method is introduced as a novel approach that combines classical and quantum mechanical principles to elucidate the interaction of electrons with pyrimidine. One of the most fundamental properties characterizing the propagation of a particle in the nuclear medium is its mean free path. Knowledge of the elastic mean free path is essential to accurately predict the effects of radiation on biological matter, as it contributes to the distances between collisions. Additionally, the mean free path plays a role in the interpretation of almost all experiments in which an excited electron moves through a solid. Pyrimidine, the precursor of the pyrimidine bases of DNA, has interesting physicochemical properties, which make it an interesting molecule to study from a fundamental point of view. These include a relatively large dipole polarizability and dipole moment and an electronic charge cloud with a significant spatial extension, which justifies its choice in this present study.

Keywords: elastic mean free path, elastic collision, pyrimidine, SCAR

Procedia PDF Downloads 58
369 Hybrid Velocity Control Approach for Tethered Aerial Vehicle

Authors: Lovesh Goyal, Pushkar Dave, Prajyot Jadhav, GonnaYaswanth, Sakshi Giri, Sahil Dharme, Rushika Joshi, Rishabh Verma, Shital Chiddarwar

Abstract:

With the rising need for human-robot interaction, researchers have proposed and tested multiple models with varying degrees of success. A few of these models performed on aerial platforms are commonly known as Tethered Aerial Systems. These aerial vehicles may be powered continuously by a tether cable, which addresses the predicament of the short battery life of quadcopters. This system finds applications to minimize humanitarian efforts for industrial, medical, agricultural, and service uses. However, a significant challenge in employing such systems is that it necessities attaining smooth and secure robot-human interaction while ensuring that the forces from the tether remain within the standard comfortable range for the humans. To tackle this problem, a hybrid control method that could switch between two control techniques: constant control input and the steady-state solution, is implemented. The constant control approach is implemented when a person is far from the target location, and error is thought to be eventually constant. The controller switches to the steady-state approach when the person reaches within a specific range of the goal position. Both strategies take into account human velocity feedback. This hybrid technique enhances the outcomes by assisting the person to reach the desired location while decreasing the human's unwanted disturbance throughout the process, thereby keeping the interaction between the robot and the subject smooth.

Keywords: unmanned aerial vehicle, tethered system, physical human-robot interaction, hybrid control

Procedia PDF Downloads 89
368 Quantifying the UK’s Future Thermal Electricity Generation Water Use: Regional Analysis

Authors: Daniel Murrant, Andrew Quinn, Lee Chapman

Abstract:

A growing population has led to increasing global water and energy demand. This demand, combined with the effects of climate change and an increasing need to maintain and protect the natural environment, represents a potentially severe threat to many national infrastructure systems. This has resulted in a considerable quantity of published material on the interdependencies that exist between the supply of water and the thermal generation of electricity, often known as the water-energy nexus. Focusing specifically on the UK, there is a growing concern that the future availability of water may at times constrain thermal electricity generation, and therefore hinder the UK in meeting its increasing demand for a secure, and affordable supply of low carbon electricity. To provide further information on the threat the water-energy nexus may pose to the UK’s energy system, this paper models the regional water demand of UK thermal electricity generation in 2030 and 2050. It uses the strategically important Energy Systems Modelling Environment model developed by the Energy Technologies Institute. Unlike previous research, this paper was able to use abstraction and consumption factors specific to UK power stations. It finds that by 2050 the South East, Yorkshire and Humber, the West Midlands and North West regions are those with the greatest freshwater demand and therefore most likely to suffer from a lack of resource. However, it finds that by 2050 it is the East, South West and East Midlands regions with the greatest total water (fresh, estuarine and seawater) demand and the most likely to be constrained by environmental standards.

Keywords: climate change, power station cooling, UK water-energy nexus, water abstraction, water resources

Procedia PDF Downloads 285
367 Smoking, Bullying, and Being Bullied among Secondary School Students: Their Associations with Attachment Styles

Authors: Ruziana Masiran, Hamidin Awang, Cheah Y. T. Jun, Nor Fauziah Hashim, Archana Premkumar, Mohd. Feizel Aisiddiq, Mohd. Fakharuddin

Abstract:

Risk behaviours among secondary school students are common and show an increasing trend over the years. Existing attachment styles between the students and their parents influence the psychosocial development of this group of population hence contributing to the adoption of risk behaviours. The aim of this study was to determine the associations between three risk behaviours; smoking, bullying and being bullied among secondary school students and their styles of attachment to parents in a district in Malaysia. Using multistage simple random sampling, a cross-sectional study was designed with the level of significance, α set at 0.05. The validated self-administered Inventory of Parent and Peer Attachment (IPPA) and Youth Risk Behaviours Surveillance Questionnaire focusing on smoking and bullying were utilized. Secondary school students aged 13 to 17 years old from ten schools in the district of Hulu Langat, Malaysia were sampled. Prevalence of smoking was 15.8%, bullying 8.5% and being bully victims 19.0%. It was found that male gender was a significant risk factor for smoking (p < 0.001), while being Chinese (OR=0.156, 95%CI=0.029-0.837, p=0.030) and having married parents (OR=0.490, 95%CI=0.302-0.796, p=0.490) are protective against smoking. Students with insecure attachment to mothers (OR=1.650, 95%CI=1.018-2.675, p=0.042) and fathers (OR=2.039, 95%CI=1.285-3.234, p=0.002) are at 1.6 and 2 times risk respectively to smoke compared to those with secure attachment. The odds of male students bullying is almost twice than that for female students (OR=2.017, 95%CI=1.416-2.873, p < 0.001), and the odds of being bullied is 1.5 times higher for male students (OR=1.519, 95%CI=1.183-1.950, p=0.001). Those who are insecurely attached to fathers are at 1.8 times higher risk to be bullies (OR=1.867, 95%CI=1.272-2.740, p < 0.001) and 1.5 times higher risk to be bullied (OR=1.546, 95%CI=1.026-2.329, p=0.037). In conclusion, insecure attachment shows a strong association with smoking, bullying and being bullied among secondary school students in Malaysia.

Keywords: attachment styles, bullied, bullying, insecure attachment, risk behaviours, smoking and attachment

Procedia PDF Downloads 324
366 Nonlinear Estimation Model for Rail Track Deterioration

Authors: M. Karimpour, L. Hitihamillage, N. Elkhoury, S. Moridpour, R. Hesami

Abstract:

Rail transport authorities around the world have been facing a significant challenge when predicting rail infrastructure maintenance work for a long period of time. Generally, maintenance monitoring and prediction is conducted manually. With the restrictions in economy, the rail transport authorities are in pursuit of improved modern methods, which can provide precise prediction of rail maintenance time and location. The expectation from such a method is to develop models to minimize the human error that is strongly related to manual prediction. Such models will help them in understanding how the track degradation occurs overtime under the change in different conditions (e.g. rail load, rail type, rail profile). They need a well-structured technique to identify the precise time that rail tracks fail in order to minimize the maintenance cost/time and secure the vehicles. The rail track characteristics that have been collected over the years will be used in developing rail track degradation prediction models. Since these data have been collected in large volumes and the data collection is done both electronically and manually, it is possible to have some errors. Sometimes these errors make it impossible to use them in prediction model development. This is one of the major drawbacks in rail track degradation prediction. An accurate model can play a key role in the estimation of the long-term behavior of rail tracks. Accurate models increase the track safety and decrease the cost of maintenance in long term. In this research, a short review of rail track degradation prediction models has been discussed before estimating rail track degradation for the curve sections of Melbourne tram track system using Adaptive Network-based Fuzzy Inference System (ANFIS) model.

Keywords: ANFIS, MGT, prediction modeling, rail track degradation

Procedia PDF Downloads 321
365 Standardization of Propagation Techniques in Selected Native Plants of Kuwait

Authors: Laila Almulla, Narayana Bhat, Majda Suleiman, Sheena Jacob

Abstract:

Biodiversity conservation has become one of the challenging priorities to combat species extinction for many countries, including the state of Kuwait. Since native plants are better adapted to the local environment, can endure long spells of drought, withstand high soil salinity levels and provide a more natural effect to landscape projects, their use will both conserve natural resources and produce sustainable greenery. When native plants are properly blended with naturalized exotic ornamental plants in a landscape, they can improve social and cultural benefits. Screening of exotic and native plants in Kuwait during the past two decades has led to the selection of some very promising plants. Continuation of evaluation of additional native and exotic plants is essential to increase diversity of plant resources for greenery projects. Therefore, an effort was made to evaluate further native plants for their suitability for greenery applications. In the present study, various treatments were used to mass multiply selected plants using seeds to secure maximum germination. Seeds were subjected to nine treatments, and each treatment was replicated five times with ten seeds per treatment unit. After the treatment, the seeds of Zygophyllum qatarense were incubated at 30 °C, three lights for 12 h, at 40% humidity; where as the seeds of Haloxylon salicornicum were incubated at 22 °C with continuous light, at 40% humidity. Soaking in 250-ppm GA3 resulted in highest germination percentage of 20% in Zygophyllum qatarense and, Soaking in 500-ppm GA3 resulted in 6% germination in Haloxylon salicornicum. Germination of the viable seeds is influenced by various external and internal factors, seed must not be in a state of dormancy and the environmental requirements for germination of that seed must be met, before germination can occur.

Keywords: landscape, native plants, revegetation, seed germination

Procedia PDF Downloads 518
364 Hawking Radiation of Grumiller Black

Authors: Sherwan Kher Alden Yakub Alsofy

Abstract:

In this paper, we consider the relativistic Hamilton-Jacobi (HJ) equation and study the Hawking radiation (HR) of scalar particles from uncharged Grumiller black hole (GBH) which is affordable for testing in astrophysics. GBH is also known as Rindler modified Schwarzschild BH. Our aim is not only to investigate the effect of the Rindler parameter A on the Hawking temperature (TH ), but to examine whether there is any discrepancy between the computed horizon temperature and the standard TH as well. For this purpose, in addition to its naive coordinate system, we study on the three regular coordinate systems which are Painlev´-Gullstrand (PG), ingoing Eddington- Finkelstein (IEF) and Kruskal-Szekeres (KS) coordinates. In all coordinate systems, we calculate the tunneling probabilities of incoming and outgoing scalar particles from the event horizon by using the HJ equation. It has been shown in detail that the considered HJ method is concluded with the conventional TH in all these coordinate systems without giving rise to the famous factor- 2 problem. Furthermore, in the PG coordinates Parikh-Wilczek’s tunneling (PWT) method is employed in order to show how one can integrate the quantum gravity (QG) corrections to the semiclassical tunneling rate by including the effects of self-gravitation and back reaction. We then show how these corrections yield a modification in the TH.

Keywords: ingoing Eddington, Finkelstein, coordinates Parikh-Wilczek’s, Hamilton-Jacobi equation

Procedia PDF Downloads 607
363 On Unification of the Electromagnetic, Strong and Weak Interactions

Authors: Hassan Youssef Mohamed

Abstract:

In this paper, we show new wave equations, and by using the equations, we concluded that the strong force and the weak force are not fundamental, but they are quantum effects for electromagnetism. This result is different from the current scientific understanding about strong and weak interactions at all. So, we introduce three evidences for our theory. First, we prove the asymptotic freedom phenomenon in the strong force by using our model. Second, we derive the nuclear shell model as an approximation of our model. Third, we prove that the leptons do not participate in the strong interactions, and we prove the short ranges of weak and strong interactions. So, our model is consistent with the current understanding of physics. Finally, we introduce the electron-positron model as the basic ingredients for protons, neutrons, and all matters, so we can study all particles interactions and nuclear interaction as many-body problems of electrons and positrons. Also, we prove the violation of parity conservation in weak interaction as evidence of our theory in the weak interaction. Also, we calculate the average of the binding energy per nucleon.

Keywords: new wave equations, the strong force, the grand unification theory, hydrogen atom, weak force, the nuclear shell model, the asymptotic freedom, electron-positron model, the violation of parity conservation, the binding energy

Procedia PDF Downloads 168
362 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 44
361 Examining the Notion of Duality: The Interaction between Neo-Academicism and University Teachers' Agency within the Performativity Context Defined by Public Managerialism

Authors: Tien Hui Chiang

Abstract:

Along with the predominant influence of neo-liberalism, public managerialism is viewed as a panacea for curing the institutionalized weakness caused by the monopoly of the public sector. In the name of efficiency, its outcome-led approach acquires a legitimate status and, in turn, it transforms into the discourse of performativity, reformulating the souls of individual members into the form of docile bodies who are willing to demonstrate their own ability in organizational contributions. The evaluation system and the organizational reconstruction are viewed as the crucial means for achieving this mission. Inevitably, university teachers are confined within a rigid and bureaucratic setting, in which they do not have too much latitude but are subject to the commands of senior administrators. However, the notion of duality highlights the interaction between structural constraints and agency. If the actor discovers the rules or properties of social structure, he/she is able to transform structural constraints into resources for developing creative actions, conceptualized as an agency. This study was designed for examining how duality operates within this hierarchical arrangement formed by public managerialism. Fourteen informants were interviewed from February to August 2014. The findings show that the evaluation system created the culture of neo-academicalism, addressing excellence in research and, in turn, motivating academic-oriented teachers. This correspondence provided a gateway for them to win honor, dignity, and prestige in groups. However, unlike the concept of duality, this agency was operating within the institutionalized context, regulated by structural constraint. Furthermore, complying with the rule/property of social structure was able to secure their advantages.

Keywords: public managerialism, social discourse, neo-academicalism, duality, structural constraint, agency

Procedia PDF Downloads 232
360 Evaluation of Biogas Potential from Livestock in Malawi

Authors: Regina Kulugomba, Richard Blanchard, Harold Mapoma, Gregory Gamula, Stanley Mlatho

Abstract:

Malawi is a country with low energy access with only 10% of people having access to electricity and 97% of people relying on charcoal and fuel wood. The over dependence on the traditional biomass has brought in a number of negative consequences on people’s health and the environment. To curb the situation, the Government of Malawi (GoM), through its national policy of 2018 and charcoal strategies of 2007, identified biogas as a suitable alternative energy source for cooking. The GoM intends to construct tubular digesters across the country and one of the most crucial factors is the availability of livestock manure. The study was conducted to assess biogas potential from livestock manure by using Quantum Geographic information system (QGIS) software. Potential methane was calculated based on the population of livestock, amount of manure produced per capita and year, total solids, biogas yield and availability coefficient. The results of the study estimated biogas potential at 687 million m3 /year. Districts identified with highest biogas potential were Lilongwe, Ntcheu, Mangochi, Neno, Mwanza, Blantyre, Chiradzulu and Mulanje. The information will help investors and the Government of Malawi to locate potential sites for biogas plants installation.

Keywords: biogas, energy, feedstock, livestock

Procedia PDF Downloads 151
359 Photocatalytic Hydrogen Production, Effect of Metal Particle Size and Their Electronic/Optical Properties on the Reaction

Authors: Hicham Idriss

Abstract:

Hydrogen production from water is one of the most promising methods to secure renewable sources or vectors of energy for societies in general and for chemical industries in particular. At present over 90% of the total amount of hydrogen produced in the world is made from non-renewable fossil fuels (via methane reforming). There are many methods for producing hydrogen from water and these include reducible oxide materials (solar thermal production), combined PV/electrolysis, artificial photosynthesis and photocatalysis. The most promising of these processes is the one relying on photocatalysis; yet serious challenges are hindering its success so far. In order to make this process viable considerable improvement of the photon conversion is needed. Among the key studies that our group has been conducting in the last few years are those focusing on synergism between the semiconductor phases, photonic band gap materials, pn junctions, plasmonic resonance responses, charge transfer to metal cations, in addition to metal dispersion and band gap engineering. In this work results related to phase transformation of the anatase to rutile in the case of TiO2 (synergism), of Au and Ag dispersion (electron trapping and hydrogen-hydrogen recombination centers) as well as their plasmon resonance response (visible light conversion) are presented and discussed. It is found for example that synergism between the two common phases of TiO2 (anatase and rutile) is sensitive to the initial particle size. It is also found, in agreement with previous results, that the rate is very sensitive to the amount of metals (with similar particle size) on the surface unlike the case of thermal heterogeneous catalysis.

Keywords: photo-catalysis, hydrogen production, water splitting, plasmonic

Procedia PDF Downloads 246
358 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 109
357 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 157