Search results for: open system architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 20855

Search results for: open system architecture

19925 A System Functions Set-Up through Near Field Communication of a Smartphone

Authors: Jaemyoung Lee

Abstract:

We present a method to set up system functions through a near filed communication (NFC) of a smartphone. The short communication distance of the NFC which is usually less than 4 cm could prevent any interferences from other devices and establish a secure communication channel between a system and the smartphone. The proposed set-up method for system function values is demonstrated for a blacbox system in a car. In demonstration, system functions of a blackbox which is manipulated through NFC of a smartphone are controls of image quality, sound level, shock sensing level to store images, etc. The proposed set-up method for system function values can be used for any devices with NFC.

Keywords: system set-up, near field communication, smartphone, android

Procedia PDF Downloads 334
19924 Autonomous Position Control of an Unmanned Aerial Vehicle Based on Accelerometer Response for Indoor Navigation Using Kalman Filtering

Authors: Syed Misbahuddin, Sagufta Kapadia

Abstract:

Autonomous indoor drone navigation has been posed with various challenges, including the inability to use a Global Positioning System (GPS). As of now, Unmanned Aerial Vehicles (UAVs) either rely on 3D mapping systems or utilize external camera arrays to track the UAV in an enclosed environment. The objective of this paper is to develop an algorithm that utilizes Kalman Filtering to reduce noise, allowing the UAV to be navigated indoors using only the flight controller and an onboard companion computer. In this paper, open-source libraries are used to control the UAV, which will only use the onboard accelerometer on the flight controller to estimate the position through double integration. One of the advantages of such a system is that it allows for low-cost and lightweight UAVs to autonomously navigate indoors without advanced mapping of the environment or the use of expensive high-precision-localization sensors.

Keywords: accelerometer, indoor-navigation, Kalman-filtering, position-control

Procedia PDF Downloads 348
19923 A Post-Occupancy Evaluation of Urban Landscape Greenway– A Case Study of the Taiyuan Greenway in Taichung City

Authors: A. Yu-Chen Chien, B. Ying-Ju Su

Abstract:

Greenway is a type of linear park which links the planar parklands and connects the open spaces. In the urban environment, except for providing open spaces with recreational function as well as effectively improve the appearance of the surrounding environment, greenway and parkland also creates benefits to the social and psychological aspects of human. In 2014, the statistics of The Ministry of Home Affairs show that citizens in Taichung enjoy the green area at an average of 4.27 square kilometers per person. How to use the existing green space system effectively and enhance the quality of leisure life thus become the major issues today. The study here points out that greenway and parkland and other open spaces are closely related to the daily life of urban residents. Whether the operation could be executed in accordance with the design is our major concern. To explore the issue, we implemented the Post-Occupancy Evaluation of Taiyuan Greenway in Taichung City. In 1956, Taichung city carried out the urban plan according to Howard’s concept about “Garden City” and built the Taiyuan greenway to restrain the urban expansion. 50-year past, due to the population growth and new demands, the government started to reconstruct the program. It is a three stage modification project of “The Townspace Renaissance project in Taiwan” since 2009, of which the greenway construction is the main point. In this research, we mainly focus on the third stage of this program to investigate the user’s preference and degree of satisfaction based on the Post-Occupancy Evaluation about the finished, unfinished, and undergoing construction sectors as well as facilities. We collected and analyzed the data based on the questionnaires and explored the possible facts that might have affected the degree of satisfaction about the greenway modification project based on the chi-square test. We hope to inspect the purpose of the demonstration projects and provide reference to the Taichung government for the modification planning and the greenway design in the future.

Keywords: greenway, landscape greenway, post-occupancy evaluation, Taichung city

Procedia PDF Downloads 325
19922 The Developments Trend of Islamic Inscriptions in the Building Portals of Dezfoul City

Authors: Mahnoush Mahmoudi, Ali Chaeedeh

Abstract:

In the architecture of Iranian traditional houses, the ornamentations available in the inscriptions of houses entrance portal express the identity of architects and personality of houses owners and are rooted in their religious and national beliefs and faiths. The main hypothesis of this research is changing the physique and application of religious contents in compliance with the thoughts and beliefs of people in Dezfoul historical city in the epigraphs of houses entrance portals. The objective of this study is reviewing the development trend of texts, concepts and physique of inscriptions as well as analyzing the factors effective on the quality and diversity of application of inscriptions. The present research is an applied study and descriptive-analytical method has been applied, and the data was collected by library and survey studies. The population of this research includes historical houses, houses damaged in war (Iran & Iraq) and renovated and new tissue and new-built houses of Dezfoul, from Qajar era so far. Random sampling method has been applied in this study and dispersal area includes the city. Data analysis method in this study is qualitative and quantitative. The results of this study indicate that today the inscriptions available in the entrance portal of houses in Dezfoul comparing to inscriptions in Qajar1 and Pahlavi2 era is very simple and has lower aesthetic value. One of the causes for such superficial and contextual gap between inscriptions seems to be the war and renovations during and after destruction.

Keywords: architecture, islamic architecture, reconstruction, epigraph, inscription, entrance portal, Dezfoul

Procedia PDF Downloads 244
19921 Applied Methods for Lightweighting Structural Systems

Authors: Alireza Taghdiri, Sara Ghanbarzade Ghomi

Abstract:

With gravity load reduction in the structural and non-structural components, the lightweight construction will be achieved as well as the improvement of efficiency and functional specifications. The advantages of lightweight construction can be examined in two levels. The first is the mass reduction of load bearing structure which results in increasing internal useful space and the other one is the mass reduction of building which decreases the effects of seismic load as a result. In order to achieve this goal, the essential building materials specifications and also optimum load bearing geometry of structural systems and elements have to be considered, so lightweight materials selection particularly with lightweight aggregate for building components will be the first step of lightweight construction. In the next step, in addition to selecting the prominent samples of Iran's traditional architecture, the process of these works improvement is analyzed through the viewpoints of structural efficiency and lightweighting and also the practical methods of lightweight construction have been extracted. The optimum design of load bearing geometry of structural system has to be considered not only in the structural system elements, but also in their composition and the selection of dimensions, proportions, forms and optimum orientations, can lead to get a maximum materials efficiency for loads and stresses bearing.

Keywords: gravity load, lightweighting structural system, load bearing geometry, seismic behavior

Procedia PDF Downloads 518
19920 Structural Invertibility and Optimal Sensor Node Placement for Error and Input Reconstruction in Dynamic Systems

Authors: Maik Kschischo, Dominik Kahl, Philipp Wendland, Andreas Weber

Abstract:

Understanding and modelling of real-world complex dynamic systems in biology, engineering and other fields is often made difficult by incomplete knowledge about the interactions between systems states and by unknown disturbances to the system. In fact, most real-world dynamic networks are open systems receiving unknown inputs from their environment. To understand a system and to estimate the state dynamics, these inputs need to be reconstructed from output measurements. Reconstructing the input of a dynamic system from its measured outputs is an ill-posed problem if only a limited number of states is directly measurable. A first requirement for solving this problem is the invertibility of the input-output map. In our work, we exploit the fact that invertibility of a dynamic system is a structural property, which depends only on the network topology. Therefore, it is possible to check for invertibility using a structural invertibility algorithm which counts the number of node disjoint paths linking inputs and outputs. The algorithm is efficient enough, even for large networks up to a million nodes. To understand structural features influencing the invertibility of a complex dynamic network, we analyze synthetic and real networks using the structural invertibility algorithm. We find that invertibility largely depends on the degree distribution and that dense random networks are easier to invert than sparse inhomogeneous networks. We show that real networks are often very difficult to invert unless the sensor nodes are carefully chosen. To overcome this problem, we present a sensor node placement algorithm to achieve invertibility with a minimum set of measured states. This greedy algorithm is very fast and also guaranteed to find an optimal sensor node-set if it exists. Our results provide a practical approach to experimental design for open, dynamic systems. Since invertibility is a necessary condition for unknown input observers and data assimilation filters to work, it can be used as a preprocessing step to check, whether these input reconstruction algorithms can be successful. If not, we can suggest additional measurements providing sufficient information for input reconstruction. Invertibility is also important for systems design and model building. Dynamic models are always incomplete, and synthetic systems act in an environment, where they receive inputs or even attack signals from their exterior. Being able to monitor these inputs is an important design requirement, which can be achieved by our algorithms for invertibility analysis and sensor node placement.

Keywords: data-driven dynamic systems, inversion of dynamic systems, observability, experimental design, sensor node placement

Procedia PDF Downloads 147
19919 Motivation, Legal Knowledge and Preference Investigation of Hungarian Law Students

Authors: Zsofia Patyi

Abstract:

While empirical studies under socialism in Hungary focused on the lawyer society as a whole, current research deals with law students in specific. The change of regime and the mutation of legal education have influenced the motivation, efficiency, social background and self-concept of law students. This shift needs to be acknowledged, and the education system improved for students and together with students. A new law student society requires a different legal education system, different legal studies, or, at the minimum, a different approach to teaching law. This is to ensure that competitive lawyers be trained who understand the constantly changing nature of the law and, as a result, can potentially transform or create legislation themselves. A number of developments can affect law students’ awareness of legal relations in a democratic state. In today’s Hungary, these decisive factors are primarily the new regulation of the financing of law students, and secondly, the new Hungarian constitution (henceforth: Alaptörvény), which has modified the base of the Hungarian legal system. These circumstances necessitate a new, comprehensive, and empirical, investigation of law students. To this end, our research team (comprising a professor, a Ph.D. student, and two law students), is conducting a new type of study in February 2017. The first stage of the research project uses the desktop method to open up the research antecedents. Afterward, a structured questionnaire draft will be designed and sent to the Head of Department of Sociology and the Associate Professor of the Department of Constitutional Law at the University of Szeged to have the draft checked and amended. Next, an open workshop for students and teachers will be organized with the aim to discuss the draft and create the final questionnaire. The research team will then contact each Hungarian university with a Faculty of Law to reach all 1st- and 4th-year law students. 1st-year students have not yet studied the Alaptörvény, while 4th-year students have. All students will be asked to fill in the questionnaire (in February). Results are expected to be in at the end of February. In March, the research team will report the results and present the conclusions. In addition, the results will be compared to previous researches. The outcome will help us answer the following research question: How should legal studies and legal education in Hungary be reformed in accordance with law students and the future lawyer society? The aim of the research is to (1) help create a new student- and career-centered teaching method of legal studies, (2) offer a new perspective on legal education, and (3) create a helpful and useful de lege ferenda proposal for the attorney general as regards legal education as part of higher education.

Keywords: change, constitution, investigation, law students, lawyer society, legal education, legal studies, motivation, reform

Procedia PDF Downloads 263
19918 Motivating the Independent Learner at the Arab Open University, Kuwait Branch

Authors: Hassan Sharafuddin, Chekra Allani

Abstract:

Academicians at the Arab Open University have always voiced their concern about the efficacy of the blended learning process. Based on 75% independent study and 25% face-to-face tutorial, it poses the challenge of the predisposition to adjustment. Being used to the psychology of traditional educational systems, AOU students cannot be easily weaned from being spoon-fed. Hence they lack the motivation to plunge into self-study. For better involvement of AOU students into the learning practices, it is imperative to diagnose the factors that impede or increase their motivation. This is conducted through an empirical study grounded upon observations and tested hypothesis and aimed at monitoring and optimizing the students’ learning outcome. Recommendations of the research will follow the findings.

Keywords: academic performance, blended learning, educational psychology, independent study, pedagogy

Procedia PDF Downloads 431
19917 Impacts of Applying Automated Vehicle Location Systems to Public Bus Transport Management

Authors: Vani Chintapally

Abstract:

The expansion of modest and minimized Global Positioning System (GPS) beneficiaries has prompted most Automatic Vehicle Location (AVL) frameworks today depending solely on satellite-based finding frameworks, as GPS is the most stable usage of these. This paper shows the attributes of a proposed framework for following and dissecting open transport in a run of the mill medium-sized city and complexities the qualities of such a framework to those of broadly useful AVL frameworks. Particular properties of the courses broke down by the AVL framework utilized for the examination of open transport in our study incorporate cyclic vehicle courses, the requirement for particular execution reports, and so forth. This paper particularly manages vehicle movement forecasts and the estimation of station landing time, combined with consequently produced reports on timetable conformance and other execution measures. Another side of the watched issue is proficient exchange of information from the vehicles to the control focus. The pervasiveness of GSM bundle information exchange advancements combined with decreased information exchange expenses have brought on today's AVL frameworks to depend predominantly on parcel information exchange administrations from portable administrators as the correspondences channel in the middle of vehicles and the control focus. This methodology brings numerous security issues up in this conceivably touchy application field.

Keywords: automatic vehicle location (AVL), expectation of landing times, AVL security, data administrations, wise transport frameworks (ITS), guide coordinating

Procedia PDF Downloads 379
19916 Feature Based Unsupervised Intrusion Detection

Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein

Abstract:

The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.

Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka

Procedia PDF Downloads 292
19915 The Involvement of Visual and Verbal Representations Within a Quantitative and Qualitative Visual Change Detection Paradigm

Authors: Laura Jenkins, Tim Eschle, Joanne Ciafone, Colin Hamilton

Abstract:

An original working memory model suggested the separation of visual and verbal systems in working memory architecture, in which only visual working memory components were used during visual working memory tasks. It was later suggested that the visuo spatial sketch pad was the only memory component at use during visual working memory tasks, and components such as the phonological loop were not considered. In more recent years, a contrasting approach has been developed with the use of an executive resource to incorporate both visual and verbal representations in visual working memory paradigms. This was supported using research demonstrating the use of verbal representations and an executive resource in a visual matrix patterns task. The aim of the current research is to investigate the working memory architecture during both a quantitative and a qualitative visual working memory task. A dual task method will be used. Three secondary tasks will be used which are designed to hit specific components within the working memory architecture – Dynamic Visual Noise (visual components), Visual Attention (spatial components) and Verbal Attention (verbal components). A comparison of the visual working memory tasks will be made to discover if verbal representations are at use, as the previous literature suggested. This direct comparison has not been made so far in the literature. Considerations will be made as to whether a domain specific approach should be employed when discussing visual working memory tasks, or whether a more domain general approach could be used instead.

Keywords: semantic organisation, visual memory, change detection

Procedia PDF Downloads 590
19914 Definition of a Computing Independent Model and Rules for Transformation Focused on the Model-View-Controller Architecture

Authors: Vanessa Matias Leite, Jandira Guenka Palma, Flávio Henrique de Oliveira

Abstract:

This paper presents a model-oriented development approach to software development in the Model-View-Controller (MVC) architectural standard. This approach aims to expose a process of extractions of information from the models, in which through rules and syntax defined in this work, assists in the design of the initial model and its future conversions. The proposed paper presents a syntax based on the natural language, according to the rules agreed in the classic grammar of the Portuguese language, added to the rules of conversions generating models that follow the norms of the Object Management Group (OMG) and the Meta-Object Facility MOF.

Keywords: BNF Syntax, model driven architecture, model-view-controller, transformation, UML

Procedia PDF Downloads 392
19913 An Agent-Service Oriented Framework for Online Contracts in Virtual Organizations

Authors: Zahra Raeisi, Reza Akbari

Abstract:

Contracting is known as one of the important tasks in virtual organization creation. Contracting is a costly process in terms of time and effort. One way to cut the time and effort is conducting contract electronically. The online contracting enable us to form virtual organization (VO) dynamically. This work presents an agent-service oriented framework for online contracting in virtual organizations. The proposed framework considers the main aspects and steps of traditional contracting process and uses the efficiency of service and agent based methodologies in order to provide a flexible and efficient way to establish contracts electronically in a VO.

Keywords: service oriented architecture, online contracts, agent-oriented architecture, virtual organization

Procedia PDF Downloads 498
19912 Mini-Open Repair Using Ring Forceps Show Similar Results to Repair Using Achillon Device in Acute Achilles Tendon Rupture

Authors: Chul Hyun Park

Abstract:

Background:Repair using the Achillon deviceis a representative mini-open repair technique;however, the limitations of this technique includethe need for special instruments and decreasedrepair strength.A modifiedmini-open repair using ring forcepsmight overcome these limitations. Purpose:This study was performed to compare the Achillon device with ring forceps in mini-open repairsof acute Achilles tendon rupture. Study Design:This was a retrospective cohort study, and the level of evidence was3. Methods:Fifty patients (41 men and 9 women), withacute Achilles tendon rupture on one foot, were consecutively treated using mini-open repair techniques. The first 20 patients were treated using the Achillon device (Achillon group) and the subsequent 30 patients were treated using a ring forceps (Forcep group). Clinical, functional, and isokinetic results,and postoperative complications were compared between the two groups at the last follow-up. Clinical evaluations wereperformed using the American Orthopedic Foot and Ankle Society (AOFAS) score, Achilles tendon Total Rupture Score (ATRS), length of incision, and operation time. Functional evaluationsincludedactive range of motion (ROM) of the ankle joint, maximum calf circumference (MCC), hopping test, and single limb heel-rise (SLHR) test. Isokinetic evaluations were performed using the isokinetic test for ankle plantar flexion. Results:The AOFAS score (p=0.669), ATRS (p=0.753), and length of incision (p=0.305) were not significantly different between the groups. Operative times in the Achillon group were significantly shorter than that in the Forcep group (p<0.001).The maximum height of SLHR (p=0.023) and number of SLHRs (p=0.045) in the Forcep group were significantly greater than that in the Achillon group. No significant differences in the mean peak torques for plantar flexion at angular speeds of 30°/s (p=0.219) and 120°/s (p=0.656) were detected between the groups. There was no significant difference in the occurrence of postoperative complications between the groups (p=0.093). Conclusion:The ring forceps technique is comparable with the Achillon technique with respect to clinical, functional, and isokinetic results and the postoperative complications. Given that no special instrument is required, the ring forceps technique could be a better option for acute Achilles tendon rupture repair.

Keywords: achilles tendon, acute rupture, repair, mini-open

Procedia PDF Downloads 80
19911 Fuzzy Control of Thermally Isolated Greenhouse Building by Utilizing Underground Heat Exchanger and Outside Weather Conditions

Authors: Raghad Alhusari, Farag Omar, Moustafa Fadel

Abstract:

A traditional greenhouse is a metal frame agricultural building used for cultivation plants in a controlled environment isolated from external climatic changes. Using greenhouses in agriculture is an efficient way to reduce the water consumption, where agriculture field is considered the biggest water consumer world widely. Controlling greenhouse environment yields better productivity of plants but demands an increase of electric power. Although various control approaches have been used towards greenhouse automation, most of them are applied to traditional greenhouses with ventilation fans and/or evaporation cooling system. Such approaches are still demanding high energy and water consumption. The aim of this research is to develop a fuzzy control system that minimizes water and energy consumption by utilizing outside weather conditions and underground heat exchanger to maintain the optimum climate of the greenhouse. The proposed control system is implemented on an experimental model of thermally isolated greenhouse structure with dimensions of 6x5x2.8 meters. It uses fans for extracting heat from the ground heat exchanger system, motors for automatic open/close of the greenhouse windows and LED as lighting system. The controller is integrated also with environmental condition sensors. It was found that using the air-to-air horizontal ground heat exchanger with 90 mm diameter and 2 mm thickness placed 2.5 m below the ground surface results in decreasing the greenhouse temperature of 3.28 ˚C which saves around 3 kW of consumed energy. It also eliminated the water consumption needed in evaporation cooling systems which are traditionally used for cooling the greenhouse environment.

Keywords: automation, earth-to-air heat exchangers, fuzzy control, greenhouse, sustainable buildings

Procedia PDF Downloads 125
19910 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis

Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti

Abstract:

Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.

Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis

Procedia PDF Downloads 151
19909 Sequence Component-Based Adaptive Protection for Microgrids Connected Power Systems

Authors: Isabelle Snyder

Abstract:

Microgrid protection presents challenges to conventional protection techniques due to the low induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected mode. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid connected or microgrid connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are the following: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR). The first two methods focus on identifying the islanded mode without communication by monitoring the current sequence component generated by the system (ACPS) or induced with inverter control during islanded mode (IUCPC) to identify the islanding condition without communication at the relay to adjust the settings. These two methods are used as a backup to the APSCC, which relies on a communication network to communicate the islanded configuration to the system components. The fourth method relies on a short circuit model inside the relay that is used in conjunction with communication to adjust the system configuration and computes the fault current and adjusts the settings accordingly.

Keywords: adaptive relaying, microgrid protection, sequence components, islanding detection, communication controlled protection, integrated short circuit model

Procedia PDF Downloads 91
19908 Simultaneous Optimization of Design and Maintenance through a Hybrid Process Using Genetic Algorithms

Authors: O. Adjoul, A. Feugier, K. Benfriha, A. Aoussat

Abstract:

In general, issues related to design and maintenance are considered in an independent manner. However, the decisions made in these two sets influence each other. The design for maintenance is considered an opportunity to optimize the life cycle cost of a product, particularly in the nuclear or aeronautical field, where maintenance expenses represent more than 60% of life cycle costs. The design of large-scale systems starts with product architecture, a choice of components in terms of cost, reliability, weight and other attributes, corresponding to the specifications. On the other hand, the design must take into account maintenance by improving, in particular, real-time monitoring of equipment through the integration of new technologies such as connected sensors and intelligent actuators. We noticed that different approaches used in the Design For Maintenance (DFM) methods are limited to the simultaneous characterization of the reliability and maintainability of a multi-component system. This article proposes a method of DFM that assists designers to propose dynamic maintenance for multi-component industrial systems. The term "dynamic" refers to the ability to integrate available monitoring data to adapt the maintenance decision in real time. The goal is to maximize the availability of the system at a given life cycle cost. This paper presents an approach for simultaneous optimization of the design and maintenance of multi-component systems. Here the design is characterized by four decision variables for each component (reliability level, maintainability level, redundancy level, and level of monitoring data). The maintenance is characterized by two decision variables (the dates of the maintenance stops and the maintenance operations to be performed on the system during these stops). The DFM model helps the designers choose technical solutions for the large-scale industrial products. Large-scale refers to the complex multi-component industrial systems and long life-cycle, such as trains, aircraft, etc. The method is based on a two-level hybrid algorithm for simultaneous optimization of design and maintenance, using genetic algorithms. The first level is to select a design solution for a given system that considers the life cycle cost and the reliability. The second level consists of determining a dynamic and optimal maintenance plan to be deployed for a design solution. This level is based on the Maintenance Free Operating Period (MFOP) concept, which takes into account the decision criteria such as, total reliability, maintenance cost and maintenance time. Depending on the life cycle duration, the desired availability, and the desired business model (sales or rental), this tool provides visibility of overall costs and optimal product architecture.

Keywords: availability, design for maintenance (DFM), dynamic maintenance, life cycle cost (LCC), maintenance free operating period (MFOP), simultaneous optimization

Procedia PDF Downloads 111
19907 Influence of Emotional Intelligence on Educational Supervision and Leadership Style in Saudi Arabia

Authors: Jawaher Bakheet Almudarra

Abstract:

An Educational Supervisor assists teachers to develop their competence and skills in teaching, solving educational problems, and to improve the teaching methods to suit the educational process. They evaluate their teachers and write reports based on their assessments. In 1957, the Saudi Ministry of Education instituted Educational Supervision to facilitate effective management of schools, however, there have been concerns that the Educational Supervision has not been effective in executing its mandate. Studies depicted that Educational supervision has not been effective because it has been marred by poor and autocratic leadership practices such as stringent inspection, commanding and judging. Therefore, there is need to consider some of the ways in which school outcomes can be enhanced through the improvement of Educational supervision practices. Emotional intelligence is a relatively new concept that can be integrated into the Saudi education system that is yet to be examined in-depth and embraced particularly in the realm of educational leadership. Its recognition and adoption may improve leadership practices among Educational supervisors. This study employed a qualitative interpretive approach that will focus on decoding, describing and interpreting the connection between emotional intelligence and leadership. The study also took into account the social constructions that include consciousness, language and shared meanings. The data collection took place in the Office of Educational Supervisors in Riyadh and involved 4 Educational supervisors and 20 teachers from both genders- male and female. The data collection process encompasses three methods namely; qualitative emotional intelligence self-assessment questionnaires, reflective semi-structured interviews, and open workshops. The questionnaires would explore whether the Educational supervisors understand the meaning of emotional intelligence and its significance in enhancing the quality of education system in Saudi Arabia. Subsequently, reflective semi-structured interviews were carried out with the Educational supervisors to explore the connection between their leadership styles and the way they conceptualise their emotionality. The open workshops will include discussions on emotional aspects of Educational supervisors’ practices and how Educational supervisors make use of the emotional intelligence discourse in their leadership and supervisory relationships.

Keywords: directors of educational supervision, emotional intelligence, educational leadership, education management

Procedia PDF Downloads 424
19906 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 381
19905 Enhanced Efficiency of Thermoelectric Generator by Optimizing Mechanical and Electrical Structures

Authors: Kewen Li

Abstract:

Much attention has been paid to the application of low temperature thermal resources, especially for power generation in recent years. Most of the current commercialized thermal, including geothermal, power-generation technologies convert thermal energy to electric energy indirectly, that is, making mechanical work before producing electricity. Technology using thermoelectric generator (TEG), however, can directly transform thermal energy into electricity by using Seebeck effect. TEG technology has many advantages such as compactness, quietness, and reliability because there are no moving parts. One of the big disadvantages of TEGs is the low efficiency from thermal to electric energy. For this reason, we redesigned and modified our previous 1 KW (at a temperature difference of around 120 °C) TEG system. The efficiency of the system was improved significantly, about 20% greater. Laboratory experiments have been conducted to measure the output power, including both open and net power, at different conditions: different modes of connections between TEG modules, different mechanical structures, different temperature differences between hot and cold sides. The cost of the TEG power generator has been reduced further because of the increased efficiency and is lower than that of photovoltaics (PV) in terms of equivalent energy generated. The TEG apparatus has been pilot tested and the data will be presented. This kind of TEG power system can be applied in many thermal and geothermal sites with low temperature resources, including oil fields where fossil and geothermal energies are co-produced.

Keywords: TEG, direct power generation, efficiency, thermoelectric effect

Procedia PDF Downloads 236
19904 Steady State Analysis of Distribution System with Wind Generation Uncertainity

Authors: Zakir Husain, Neem Sagar, Neeraj Gupta

Abstract:

Due to the increased penetration of renewable energy resources in the distribution system, the system is no longer passive in nature. In this paper, a steady state analysis of the distribution system has been done with the inclusion of wind generation. The modeling of wind turbine generator system and wind generator has been made to obtain the average active and the reactive power injection into the system. The study has been conducted on a IEEE-33 bus system with two wind generators. The present research work is useful not only to utilities but also to customers.

Keywords: distributed generation, distribution network, radial network, wind turbine generating system

Procedia PDF Downloads 401
19903 Text Emotion Recognition by Multi-Head Attention based Bidirectional LSTM Utilizing Multi-Level Classification

Authors: Vishwanath Pethri Kamath, Jayantha Gowda Sarapanahalli, Vishal Mishra, Siddhesh Balwant Bandgar

Abstract:

Recognition of emotional information is essential in any form of communication. Growing HCI (Human-Computer Interaction) in recent times indicates the importance of understanding of emotions expressed and becomes crucial for improving the system or the interaction itself. In this research work, textual data for emotion recognition is used. The text being the least expressive amongst the multimodal resources poses various challenges such as contextual information and also sequential nature of the language construction. In this research work, the proposal is made for a neural architecture to resolve not less than 8 emotions from textual data sources derived from multiple datasets using google pre-trained word2vec word embeddings and a Multi-head attention-based bidirectional LSTM model with a one-vs-all Multi-Level Classification. The emotions targeted in this research are Anger, Disgust, Fear, Guilt, Joy, Sadness, Shame, and Surprise. Textual data from multiple datasets were used for this research work such as ISEAR, Go Emotions, Affect datasets for creating the emotions’ dataset. Data samples overlap or conflicts were considered with careful preprocessing. Our results show a significant improvement with the modeling architecture and as good as 10 points improvement in recognizing some emotions.

Keywords: text emotion recognition, bidirectional LSTM, multi-head attention, multi-level classification, google word2vec word embeddings

Procedia PDF Downloads 172
19902 Quantitative Detection of the Conformational Transitions between Open and Closed Forms of Cytochrome P450 Oxidoreductase (CYPOR) at the Membrane Surface in Different Functional States

Authors: Sara Arafeh, Kovriguine Evguine

Abstract:

Cytochromes P450 are enzymes that require a supply of electrons to catalyze the synthesis of steroid hormones, fatty acids, and prostaglandin hormone. Cytochrome P450 Oxidoreductase (CYPOR), a membrane bound enzyme, provides these electrons in its open conformation. CYPOR has two cytosolic domains (FAD domain and FMN domain) and an N-terminal in the membrane. In its open conformation, electrons flow from NADPH, FAD, and finally to FMN where cytochrome P450 picks up these electrons. In the closed conformation, cytochrome P450 does not bind to the FMN domain to take the electrons. It was found that when the cytosolic domains are isolated, CYPOR could not bind to cytochrome P450. This suggested that the membrane environment is important for CYPOR function. This project takes the initiative to better understand the dynamics of CYPOR in its full length. Here, we determine the distance between specific sites in the FAD and FMN binding domains in CYPOR by Forster Resonance Energy Transfer (FRET) and Ultrafast TA spectroscopy with and without NADPH. The approach to determine these distances will rely on labeling these sites with red and infrared fluorophores. Mimic membrane attachment is done by inserting CYPOR in lipid nanodiscs. By determining the distances between the donor-acceptor sites in these domains, we can observe the open/closed conformations upon reducing CYPOR in the presence and absence of cytochrome P450. Such study is important to better understand CYPOR mechanism of action in various endosomal membranes including hepatic CYPOR which is vital in plasma cholesterol homeostasis. By investigating the conformational cycles of CYPOR, we can synthesize drugs that would be more efficient in affecting the steroid hormonal levels and metabolism of toxins catalyzed by Cytochrome P450.

Keywords: conformational cycle of CYPOR, cytochrome P450, cytochrome P450 oxidoreductase, FAD domain, FMN domain, FRET, Ultrafast TA Spectroscopy

Procedia PDF Downloads 275
19901 A Study on Green Building Certification Systems within the Context of Anticipatory Systems

Authors: Taner Izzet Acarer, Ece Ceylan Baba

Abstract:

This paper examines green building certification systems and their current processes in comparison with anticipatory systems. Rapid growth of human population and depletion of natural resources are causing irreparable damage to urban and natural environment. In this context, the concept of ‘sustainable architecture’ has emerged in the 20th century so as to establish and maintain standards for livable urban spaces, to improve quality of urban life, and to preserve natural resources for future generations. The construction industry is responsible for a large part of the resource consumption and it is believed that the ‘green building’ designs that emerge in construction industry can reduce environmental problems and contribute to sustainable development around the world. A building must meet a specific set of criteria, set forth through various certification systems, in order to be eligible for designation as a green building. It is disputable whether methods used by green building certification systems today truly serve the purposes of creating a sustainable world. Accordingly, this study will investigate the sets of rating systems used by the most popular green building certification programs, including LEED (Leadership in Energy and Environmental Design), BREEAM (Building Research Establishment's Environmental Assessment Methods), DGNB (Deutsche Gesellschaft für Nachhaltiges Bauen System), in terms of ‘Anticipatory Systems’ in accordance with the certification processes and their goals, while discussing their contribution to architecture. The basic methodology of the study is as follows. Firstly analyzes of brief historical and literature review of green buildings and certificate systems will be stated. Secondly, processes of green building certificate systems will be disputed by the help of anticipatory systems. Anticipatory Systems is a set of systems designed to generate action-oriented projections and to forecast potential side effects using the most current data. Anticipatory Systems pull the future into the present and take action based on future predictions. Although they do not have a claim to see into the future, they can provide foresight data. When shaping the foresight data, Anticipatory Systems use feedforward instead of feedback, enabling them to forecast the system’s behavior and potential side effects by establishing a correlation between the system’s present/past behavior and projected results. This study indicates the goals and current status of LEED, BREEAM and DGNB rating systems that created by using the feedback technique will be examined and presented in a chart. In addition, by examining these rating systems with the anticipatory system that using the feedforward method, the negative influences of the potential side effects on the purpose and current status of the rating systems will be shown in another chart. By comparing the two obtained data, the findings will be shown that rating systems are used for different goals than the purposes they are aiming for. In conclusion, the side effects of green building certification systems will be stated by using anticipatory system models.

Keywords: anticipatory systems, BREEAM, certificate systems, DGNB, green buildings, LEED

Procedia PDF Downloads 217
19900 Computational Thinking Based Coding Environment for Coding and Free Semester Mathematics Education in Korea

Authors: Han Hyuk Cho, Hanik Jo

Abstract:

In recent years, coding education has been globally emphasized, and the Free Semester System and coding education were introduced to the public schools from the beginning of 2016 and 2018 respectively in Korea. With the introduction of the Free Semester System and the rising demand of Computational Thinking (CT) capacity, this paper aims to design ‘Coding Environment’ and Minecraft-like Turtlecraft in which learners can design and construct mathematical objects through mathematical symbolic expressions. Students can transfer the constructed mathematical objects to the Turtlecraft environment (open-source codingmath website), and also can print them out through 3D printers. Furthermore, we design learnable mathematics and coding curriculum by representing the figurate numbers and patterns in terms of executable expression in the coding context and connecting them to algebraic symbols, which will allow students to experience mathematical patterns and symbolic coding expressions.

Keywords: coding education, computational thinking, mathematics education, TurtleMAL and Turtlecraft

Procedia PDF Downloads 203
19899 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management

Authors: Ali El Ksimi

Abstract:

In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.

Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy

Procedia PDF Downloads 16
19898 Modelling High Strain Rate Tear Open Behavior of a Bilaminate Consisting of Foam and Plastic Skin Considering Tensile Failure and Compression

Authors: Laura Pytel, Georg Baumann, Gregor Gstrein, Corina Klug

Abstract:

Premium cars often coat the instrument panels with a bilaminate consisting of a soft foam and a plastic skin. The coating is torn open during the passenger airbag deployment under high strain rates. Characterizing and simulating the top coat layer is crucial for predicting the attenuation that delays the airbag deployment, effecting the design of the restrain system and to reduce the demand of simulation adjustments through expensive physical component testing.Up to now, bilaminates used within cars either have been modelled by using a two-dimensional shell formulation for the whole coating system as one which misses out the interaction of the two layers or by combining a three-dimensional formulation foam layer with a two-dimensional skin layer but omitting the foam in the significant parts like the expected tear line area and the hinge where high compression is expected. In both cases, the properties of the coating causing the attenuation are not considered. Further, at present, the availability of material information, as there are failure dependencies of the two layers, as well as the strain rate of up to 200 1/s, are insufficient. The velocity of the passenger airbag flap during an airbag shot has been measured with about 11.5 m/s during first ripping; the digital image correlation evaluation showed resulting strain rates of above 1500 1/s. This paper provides a high strain rate material characterization of a bilaminate consisting of a thin polypropylene foam and a thermoplasctic olefins (TPO) skin and the creation of validated material models. With the help of a Split Hopkinson tension bar, strain rates of 1500 1/s were within reach. The experimental data was used to calibrate and validate a more physical modelling approach of the forced ripping of the bilaminate. In the presented model, the three-dimensional foam layer is continuously tied to the two-dimensional skin layer, allowing failure in both layers at any possible position. The simulation results show a higher agreement in terms of the trajectory of the flaps and its velocity during ripping. The resulting attenuation of the airbag deployment measured by the contact force between airbag and flaps increases and serves usable data for dimensioning modules of an airbag system.

Keywords: bilaminate ripping behavior, High strain rate material characterization and modelling, induced material failure, TPO and foam

Procedia PDF Downloads 66
19897 International Law and Domestic Legal Systems: Incorporation, Transformation, and Persuasion

Authors: Hamid Vahidkia

Abstract:

This article explores advancements in global law and how they interact with domestic legal systems. The article's introduction highlights that nations that gained independence from authoritarian governments tend to be more open to international law. A nation can choose to follow either a monist strategy regarding international law, viewing it as an integral part of its own legal system, or opt for a dualist approach, where it keeps its domestic law distinct from international law. The beginning goes on to recognize the origins of international law, such as treaties and countries' ways of following them, customary international law, and declarations. The introduction ends by acknowledging the growing significance and development of international law.

Keywords: international law, customary law, treaties, human right

Procedia PDF Downloads 12
19896 Evaluation and Selection of Construction Contractors by Polish Public Clients

Authors: Kozik Renata, Leśniak Agnieszka, Plebankiewicz Edyta

Abstract:

Contracting authorities in the public sector are obligated to apply the principles provided for in the Polish law for the evaluation and selection of contractors. To analyze the methods of contractors, applied in practice by public clients, the notices of contract award results for construction works were analyzed. The analysis shows that the procedure selected more and more often is open to competitive bidding, where the assessment of the competence of contractors is not very precise, as well as non-competitive bidding, i.e. single source procurement. The share of procurement procedures, where the only criterion is price, is increasing. The solution to the problems existing here might be the introduction of one of the forms of pre-selection of contractors. The article also briefly discusses verification systems for companies applying for public contracts used in EU countries.

Keywords: certification, contractors selection, open tendering, public investors

Procedia PDF Downloads 282