Search results for: edge computing module
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2463

Search results for: edge computing module

1413 Teachers and Innovations in Information and Communication Technology

Authors: Martina Manenova, Lukas Cirus

Abstract:

This article introduces research focused on elementary school teachers’ approach to innovations in ICT. The diffusion of innovations theory, which was written by E. M. Rogers, captures the processes of innovation adoption. The research method derived from this theory and the Rogers’ questionnaire focused on the diffusion of innovations was used as the basic research method. The research sample consisted of elementary school teachers. The comparison of results with the Rogers’ results shows that among the teachers in the research sample the so-called early majority, as well as the overall division of the data, was rather central (early adopter, early majority, and later majority). The teachers very rarely appeared on the edge positions (innovator, laggard). The obtained results can be applied to teaching practice and used especially in the implementation of new technologies and techniques into the educational process.

Keywords: innovation, diffusion of innovation, information and communication technology, teachers

Procedia PDF Downloads 288
1412 Liver Tumor Detection by Classification through FD Enhancement of CT Image

Authors: N. Ghatwary, A. Ahmed, H. Jalab

Abstract:

In this paper, an approach for the liver tumor detection in computed tomography (CT) images is represented. The detection process is based on classifying the features of target liver cell to either tumor or non-tumor. Fractional differential (FD) is applied for enhancement of Liver CT images, with the aim of enhancing texture and edge features. Later on, a fusion method is applied to merge between the various enhanced images and produce a variety of feature improvement, which will increase the accuracy of classification. Each image is divided into NxN non-overlapping blocks, to extract the desired features. Support vector machines (SVM) classifier is trained later on a supplied dataset different from the tested one. Finally, the block cells are identified whether they are classified as tumor or not. Our approach is validated on a group of patients’ CT liver tumor datasets. The experiment results demonstrated the efficiency of detection in the proposed technique.

Keywords: fractional differential (FD), computed tomography (CT), fusion, aplha, texture features.

Procedia PDF Downloads 355
1411 E-Learning in Life-Long Learning: Best Practices from the University of the Aegean

Authors: Chryssi Vitsilaki, Apostolos Kostas, Ilias Efthymiou

Abstract:

This paper presents selected best practices on online learning and teaching derived from a novel and innovating Lifelong Learning program through e-Learning, which has during the last five years been set up at the University of the Aegean in Greece. The university, capitalizing on an award-winning, decade-long experience in e-learning and blended learning in undergraduate and postgraduate studies, recently expanded into continuous education and vocational training programs in various cutting-edge fields. So, in this article we present: (a) the academic structure/infrastructure which has been developed for the administrative, organizational and educational support of the e-Learning process, including training the trainers, (b) the mode of design and implementation based on a sound pedagogical framework of open and distance education, and (c) the key results of the assessment of the e-learning process by the participants, as they are used to feedback on continuous organizational and teaching improvement and quality control.

Keywords: distance education, e-learning, life-long programs, synchronous/asynchronous learning

Procedia PDF Downloads 327
1410 The Energy Efficient Water Reuse by Combination of Nano-Filtration and Capacitive Deionization Processes

Authors: Youngmin Kim, Jae-Hwan Ahn, Seog-Ku Kim, Hye-Cheol Oh, Bokjin Lee, Hee-Jun Kang

Abstract:

The high energy consuming processes such as advanced oxidation and reverse osmosis are used as a reuse process. This study aims at developing an energy efficient reuse process by combination of nanofiltration (NF) and capacitive deionization processes (CDI) processes. Lab scale experiments were conducted by using effluents from a wastewater treatment plant located at Koyang city in Korea. Commercial NF membrane (NE4040-70, Toray Ltd.) and CDI module (E40, Siontech INC.) were tested in series. The pollutant removal efficiencies were evaluated on the basis of Korean water quality criteria for water reuse. In addition, the energy consumptions were also calculated. As a result, the hybrid process showed lower energy consumption than conventional reverse osmosis process even though its effluent did meet the Korean standard. Consequently, this study suggests that the hybrid process is feasible for the energy efficient water reuse.

Keywords: capacitive deionization, energy efficient process, nanofiltration, water reuse

Procedia PDF Downloads 178
1409 Decision-Making Tool for Planning the Construction of Infrastructure Projects

Authors: Rolla Monib, Chris I. Goodier, Alistair Gibbs

Abstract:

The aim of this paper is to investigate the key drivers in planning the construction phase for infrastructure projects to reduce project delays. To achieve this aim, the research conducted three case studies using semi-structured and unstructured interviews (n=36). The results conclude that a lack of modularisation awareness is among the key factors attributed to project delays. The current emotive and ill-informed approach to decision-making, coupled with the lack of knowledge regarding appropriate construction method selection, prevents the potential benefits of modularisation being fully realised. To assist with decision-making for the best construction method, the research presents project management tools to help decision makers to choose the most appropriate construction approach through optimising the use of modularisation in EC. A decision-making checklist and diagram are presented in this paper. These checklist tools and diagrams assist the project team in determining the best construction method, taking into consideration the module type.

Keywords: infrastructure, modularization, decision support, decision-making

Procedia PDF Downloads 56
1408 Pyroelectric Effect on Thermoelectricity of AlInN/GaN Heterostructures

Authors: B. K. Sahoo

Abstract:

Superior thermoelectric (TE) efficiency of AlₓIn₁₋ₓN /GaN heterostructure (HS) requires a minimum value of thermal conductivity (k). A smaller k would lead to even further increase of TE figure of merit (ZT). The built-in polarization (BIP) electric field of AlₓIn₁₋ₓN /GaN HS enhances S, and σ of the HS, however, the effect of BIP field on k of the HS has not been explored. Study of thermal conductivities (k: without BIP and kp: including BIP) vs temperature predicts pyroelectric behavior of HS. Both k and kp show crossover at a temperature Tp. The result shows that below Tp, kp < k due to negative thermal expansion coefficient (TEC). However, above Tp, kp > k. Above Tp, piezoelectric polarization dominates over spontaneous polarization due to positive TEC. This generates more lattice mismatch resulting in the significant contribution of BIP field to thermal conductivity. Thus, Tp can be considered as primary pyroelectric transition temperature of the material as above Tp thermal expansion takes place which is the reason for the secondary pyroelectric effect. It is found that below Tp, kp is decreased; thus enhancing TE efficiency. For x=0.1, 0.2 and 0.3; Tp are close to 200, 210 and 260 K, respectively. Thus, k of the HS can be modified as per requirement by tailoring the Al composition; making it suitable simultaneously for the design of high-temperature pyroelectric sensors and TE module for maximum power production.

Keywords: AlₓIn₁₋ₓN/GaN heterostructure, built in polarization, pyroelectric behavior, thermoelectric efficiency

Procedia PDF Downloads 117
1407 Mixed Mode Fracture Analyses Using Finite Element Method of Edge Cracked Heavy Annulus Pulley

Authors: Bijit Kalita, K. V. N. Surendra

Abstract:

The pulley works under both compressive loading due to contacting belt in tension and central torque due to cause rotation. In a power transmission system, the belt pulley assemblies offer a contact problem in the form of two mating cylindrical parts. In this work, we modeled a pulley as a heavy two-dimensional circular disk. Stress analysis due to contact loading in the pulley mechanism is performed. Finite element analysis (FEA) is conducted for a pulley to investigate the stresses experienced on its inner and outer periphery. In most of the heavy-duty applications, most frequently used mechanisms to transmit power in applications such as automotive engines, industrial machines, etc. is Belt Drive. Usually, very heavy circular disks are used as pulleys. A pulley could be entitled as a drum and may have a groove between two flanges around the circumference. A rope, belt, cable or chain can be the driving element of a pulley system that runs over the pulley inside the groove. A pulley is experienced by normal and shear tractions on its contact region in the process of motion transmission. The region may be belt-pulley contact surface or pulley-shaft contact surface. In 1895, Hertz solved the elastic contact problem for point contact and line contact of an ideal smooth object. Afterward, this hypothesis is generally utilized for computing the actual contact zone. Detailed stress analysis in such contact region of such pulleys is quite necessary to prevent early failure. In this paper, the results of the finite element analyses carried out on the compressed disk of a belt pulley arrangement using fracture mechanics concepts are shown. Based on the literature on contact stress problem induced in the wide field of applications, generated stress distribution on the shaft-pulley and belt-pulley interfaces due to the application of high-tension and torque was evaluated in this study using FEA concepts. Finally, the results obtained from ANSYS (APDL) were compared with the Hertzian contact theory. The study is mainly focused on the fatigue life estimation of a rotating part as a component of an engine assembly using the most famous Paris equation. Digital Image Correlation (DIC) analyses have been performed using the open-source software. From the displacement computed using the images acquired at a minimum and maximum force, displacement field amplitude is computed. From these fields, the crack path is defined and stress intensity factors and crack tip position are extracted. A non-linear least-squares projection is used for the purpose of the estimation of fatigue crack growth. Further study will be extended for the various application of rotating machinery such as rotating flywheel disk, jet engine, compressor disk, roller disk cutter etc., where Stress Intensity Factor (SIF) calculation plays a significant role on the accuracy and reliability of a safe design. Additionally, this study will be progressed to predict crack propagation in the pulley using maximum tangential stress (MTS) criteria for mixed mode fracture.

Keywords: crack-tip deformations, contact stress, stress concentration, stress intensity factor

Procedia PDF Downloads 121
1406 Authentic Leadership, Task Performance, and Organizational Citizenship Behavior

Authors: C. V. Chen, Y. H. Jeng, S. J. Wang

Abstract:

Leadership is essential to enhancing followers’ psychological empowerment and has an effect on their willingness to take on extra-role behavior and aim for greater performance. Authentic leadership is confirmed to promote employees’ positive affect, psychological empowerment, well-being, and performance. Employees’ spontaneous undertaking of organizationally desired behaviors allows organizations’ gaining the edge in the fiercely competitive business environment. Apart from the contextual factor of leadership, individuals’ goal orientation is found to be highly related to his/her performance. To better understand the psychological process and potential moderation of personal goal orientation, this study investigates the effect of authentic leadership on employees’ task performance and organizational citizenship behavior by including psychological empowerment as the mediating factor and goal orientation as the moderating factor.

Keywords: authentic leadership, task performance, organizational citizenship behavior, goal orientation

Procedia PDF Downloads 790
1405 On Adaptive and Auto-Configurable Apps

Authors: Prisa Damrongsiri, Kittinan Pongpianskul, Mario Kubek, Herwig Unger

Abstract:

Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation.

Keywords: apps, context-sensitive, location-sensitive, self-configuration, mobile computing, smart home

Procedia PDF Downloads 393
1404 Geographic Information System Applications in Prioritizing Karlahi Forest Reserve Area for Conservation

Authors: Samuel Hyellamada Jerry

Abstract:

This study focused on assessing conservation priorities within the Karlahi Forest Reserve of Fufore Local Government in Adamawa State. The main objective was to identify specific areas within the forest reserve that require immediate conservation attention. The research employed remote sensing and GIS techniques to achieve this goal. By overlaying the IDRIS Silva module results, a spatial distribution map was generated, highlighting the cumulative priority areas within and outside the forest. Among the total vegetated area of 26.38 km² in the Karlahi Forest Reserve, the analysis revealed that 16.16 km² were classified as high-priority conservation zones. Additionally, 4.59 km² and 5.63 km² were identified as medium and low-priority areas, respectively. In light of these findings, it is recommended that conservation efforts incorporate detailed land cover information and regular assessments of species diversity. Furthermore, strict adherence to national and state policies regarding forest reserves and parks is crucial for effective conservation management.

Keywords: priority, Karlahi, forest, reserve, IDRISI Silva, species diversity

Procedia PDF Downloads 145
1403 The Role of Mass Sport Guidance in the Health Service Industry of China

Authors: Qiu Jian-Rong, Li Qing-Hui, Zhan Dong, Zhang Lei

Abstract:

Facing the problem of the demand of economic restructuring and risk of social economy stagnation due to the ageing of population, the Health Service Industry will play a very important role in the structure of industry in the future. During the process, the orient of Chinese sports medicine as well as the joint with preventive medicine, and the integration with data bank and cloud computing will be involved.

Keywords: China, the health service industry, mass sport, data bank

Procedia PDF Downloads 625
1402 Intelligent Grading System of Apple Using Neural Network Arbitration

Authors: Ebenezer Obaloluwa Olaniyi

Abstract:

In this paper, an intelligent system has been designed to grade apple based on either its defective or healthy for production in food processing. This paper is segmented into two different phase. In the first phase, the image processing techniques were employed to extract the necessary features required in the apple. These techniques include grayscale conversion, segmentation where a threshold value is chosen to separate the foreground of the images from the background. Then edge detection was also employed to bring out the features in the images. These extracted features were then fed into the neural network in the second phase of the paper. The second phase is a classification phase where neural network employed to classify the defective apple from the healthy apple. In this phase, the network was trained with back propagation and tested with feed forward network. The recognition rate obtained from our system shows that our system is more accurate and faster as compared with previous work.

Keywords: image processing, neural network, apple, intelligent system

Procedia PDF Downloads 395
1401 Gender Norms and Psychological Mechanisms that Make Sexual Assault Possible

Authors: Moor Avigail

Abstract:

This research examines gender norms that underlie the propensity to commit sexual assault and to carry it out. Factors that have been shown to relate to such propensity will be enumerated and tied to their ramifications. These include sexual objectification of women, endorsement of gender-based rape myths blaming the victim, masculine entitlement, low empathy to victims, along with elevated empathy towards rapists. Heavy use of pornography as well as a misconstruing of the meaning of refusal to sex, have also been implicated. Additionally, a cutting-edge investigation, which we have just completed, examined what seems to occur in the perpetrator's mind during the assault. No research to date has ventured to uncover what essentially allows the rape to be carried out in real time, in the sense of what mental mechanisms go into operation in rapists during the assault itself. Our findings demonstrate that dehumanization and rationalization are pivotal. On the one hand, the perpetrator apparently allows himself to disregard the victim's humanity while simultaneously justifying his actions in relation to the victim's behavior.

Keywords: gender norms, gender psychology, sexual assault, gender

Procedia PDF Downloads 68
1400 Proof of Concept Design and Development of a Computer-Aided Medical Evaluation of Symptoms Web App: An Expert System for Medical Diagnosis in General Practice

Authors: Ananda Perera

Abstract:

Computer-Assisted Medical Evaluation of Symptoms (CAMEOS) is a medical expert system designed to help General Practices (GPs) make an accurate diagnosis. CAMEOS comprises a knowledge base, user input, inference engine, reasoning module, and output statement. The knowledge base was developed by the author. User input is an Html file. The physician user collects data in the consultation. Data is sent to the inference engine at servers. CAMEOS uses set theory to simulate diagnostic reasoning. The program output is a list of differential diagnoses, the most probable diagnosis, and the diagnostic reasoning.

Keywords: CDSS, computerized decision support systems, expert systems, general practice, diagnosis, diagnostic systems, primary care diagnostic system, artificial intelligence in medicine

Procedia PDF Downloads 151
1399 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 381
1398 The Role of Entrepreneurship Education in Enhancing Self-Employment: Students' Perspective

Authors: Stanley Fore, Gaetan Ngabonziza

Abstract:

In spite of the need for skilled labour in South Africa, tertiary education graduates are increasingly faced with unemployment, which poses a serious obstacle to the economic growth of the country. This paper is an outcome of the study that investigated students’ perceptions on the role of entrepreneurship education in enhancing graduates’ self-employment. The study was descriptive in nature and used a survey questionnaire to answer questions pertaining to the extent to which entrepreneurship education is important in enhancing self-employment endeavours. Collected data were analysed using of the statistical software for social science (SPSS) for descriptive statistics in the form of tables and charts. The study found that entrepreneurship education is critical in providing knowledge and skills that are required to succeed in self-employment. As one module of entrepreneurship does not ensure self-employment orientation or more positive expectations about entrepreneurial abilities and careers, this study suggests that students, irrespective of their field of study, should be given entrepreneurship modules in every academic year. This will help in reminding them that their success does not solely rely on their ability to find a better-paying employment but also on their ability to employ themselves.

Keywords: entrepreneurship, education, self-employment, students

Procedia PDF Downloads 248
1397 Torsional Design Method of Asymmetric and Irregular Building under Horizontal Earthquake Action

Authors: Radhwane Boudjelthia

Abstract:

Based upon elaborate analysis on torsional design methods of asymmetric and irregular structure under horizontal earthquake action, it points out that the main design principles of an asymmetric building subjected to horizontal earthquake are: the torsion of vertical members induced by the torsion angle of the floor (rigid diaphragm) cannot exceed the allowable value, the inter-story displacement at outermost frame or shear wall should be less than that required by design code, stresses in plane of the slab should be controlled within acceptable extent under different intensity earthquakes. That current seismic design code only utilizes the torsion displacement ratio to control the floor torsion, which seems not reasonable enough since its connotation is the multiple of the floor torsion angle and the distance of floor mass center to the edge frame or shear wall.

Keywords: earthquake, building, seismic forces, displacement, resonance, response

Procedia PDF Downloads 344
1396 Vascular Targeted Photodynamic Therapy Monitored by Real-Time Laser Speckle Imaging

Authors: Ruth Goldschmidt, Vyacheslav Kalchenko, Lilah Agemy, Rachel Elmoalem, Avigdor Scherz

Abstract:

Vascular Targeted Photodynamic therapy (VTP) is a new modality for selective cancer treatment that leads to the complete tumor ablation. A photosensitizer, a bacteriochlorophyll derivative in our case, is first administered to the patient and followed by the illumination of the tumor area, by a near-IR laser for its photoactivation. The photoactivated drug releases reactive oxygen species (ROS) in the circulation, which reacts with blood cells and the endothelium leading to the occlusion of the blood vasculature. If the blood vessels are only partially closed, the tumor may recover, and cancer cells could survive. On the other hand, excessive treatment may lead to toxicity of healthy tissues nearby. Simultaneous VTP monitoring and image processing independent of the photoexcitation laser has not yet been reported, to our knowledge. Here we present a method for blood flow monitoring, using a real-time laser speckle imaging (RTLSI) in the tumor during VTP. We have synthesized over the years a library of bacteriochlorophyll derivatives, among them WST11 and STL-6014. Both are water soluble derivatives that are retained in the blood vasculature through their partial binding to HSA. WST11 has been approved in Mexico for VTP treatment of prostate cancer at a certain drug dose, and time/intensity of illumination. Application to other bacteriochlorophyll derivatives or other cancers may require different treatment parameters (such as light/drug administration). VTP parameters for STL-6014 are still under study. This new derivative mainly differs from WST11 by its lack of the central Palladium, and its conjugation to an Arg-Gly-Asp (RGD) sequence. RGD is a tumor-specific ligand that is used for targeting the necrotic tumor domains through its affinity to αVβ3 integrin receptors. This enables the study of cell-targeted VTP. We developed a special RTLSI module, based on Labview software environment for data processing. The new module enables to acquire raw laser speckle images and calculate the values of the laser temporal statistics of time-integrated speckles in real time, without additional off-line processing. Using RTLSI, we could monitor the tumor’s blood flow following VTP in a CT26 colon carcinoma ear model. VTP with WST11 induced an immediate slow down of the blood flow within the tumor and a complete final flow arrest, after some sporadic reperfusions. If the irradiation continued further, the blood flow stopped also in the blood vessels of the surrounding healthy tissue. This emphasizes the significance of light dose control. Using our RTLSI system, we could prevent any additional healthy tissue damage by controlling the illumination time and restrict blood flow arrest within the tumor only. In addition, we found that VTP with STL-6014 was the most effective when the photoactivation was conducted 4h post-injection, in terms of tumor ablation success in-vivo and blood vessel flow arrest. In conclusion, RTSLI application should allow to optimize VTP efficacy vs. toxicity in both the preclinical and clinical arenas.

Keywords: blood vessel occlusion, cancer treatment, photodynamic therapy, real time imaging

Procedia PDF Downloads 220
1395 An Industrial Wastewater Management Using Cloud Based IoT System

Authors: Kaarthik K., Harshini S., Karthika M., Kripanandhini T.

Abstract:

Water is an essential part of living organisms. Major water pollution is caused due to contamination of industrial wastewater in the river. The most important step in bringing wastewater contaminants down to levels that are safe for nature is wastewater treatment. The contamination of river water harms both humans who consume it and the aquatic life that lives there. We introduce a new cloud-based industrial IoT paradigm in this work for real-time control and monitoring of wastewater. The proposed system prevents prohibited entry of industrial wastewater into the plant by monitoring temperature, hydrogen power (pH), CO₂ and turbidity factors from the wastewater input that the wastewater treatment facility will process. Real-time sensor values are collected and uploaded to the cloud by the system using an IoT Wi-Fi Module. By doing so, we can prevent the contamination of industrial wastewater entering the river earlier, and the necessary actions will be taken by the users. The proposed system's results are 90% efficient, preventing water pollution due to industry and protecting human lives.

Keywords: sensors, pH, CO₂, temperature, turbidity

Procedia PDF Downloads 106
1394 Developing a Framework for Open Source Software Adoption in a Higher Education Institution in Uganda. A case of Kyambogo University

Authors: Kafeero Frank

Abstract:

This study aimed at developing a frame work for open source software adoption in an institution of higher learning in Uganda, with the case of KIU as a study area. There were mainly four research questions based on; individual staff interaction with open source software forum, perceived FOSS characteristics, organizational characteristics and external characteristics as factors that affect open source software adoption. The researcher used causal-correlation research design to study effects of these variables on open source software adoption. A quantitative approach was used in this study with self-administered questionnaire on a purposively and randomly sampled sample of university ICT staff. Resultant data was analyzed using means, correlation coefficients and multivariate multiple regression analysis as statistical tools. The study reveals that individual staff interaction with open source software forum and perceived FOSS characteristics were the primary factors that significantly affect FOSS adoption while organizational and external factors were secondary with no significant effect but significant correlation to open source software adoption. It was concluded that for effective open source software adoption to occur there must be more effort on primary factors with subsequent reinforcement of secondary factors to fulfill the primary factors and adoption of open source software. Lastly recommendations were made in line with conclusions for coming up with Kyambogo University frame work for open source software adoption in institutions of higher learning. Areas of further research recommended include; Stakeholders’ analysis of open source software adoption in Uganda; Challenges and way forward. Evaluation of Kyambogo University frame work for open source software adoption in institutions of higher learning. Framework development for cloud computing adoption in Ugandan universities. Framework for FOSS development in Uganda IT industry

Keywords: open source software., organisational characteristics, external characteristics, cloud computing adoption

Procedia PDF Downloads 68
1393 A Design of Beam-Steerable Antenna Array for Use in Future Mobile Handsets

Authors: Naser Ojaroudi Parchin, Atta Ullah, Haleh Jahanbakhsh Basherlou, Raed A. Abd-Alhameed, Peter S. Excell

Abstract:

A design of beam-steerable antenna array for the future cellular communication (5G) is presented. The proposed design contains eight elements of compact end-fire antennas arranged on the top edge of smartphone printed circuit board (PCB). Configuration of the antenna element consists of the conductive patterns on the top and bottom copper foil layers and a substrate layer with a via-hole. The simulated results including input-impedance and also fundamental radiation properties have been presented and discussed. The impedance bandwidth (S11 ≤ -10 dB) of the antenna spans from 17.5 to 21 GHz (more than 3 GHz bandwidth) with a resonance at 19 GHz. The antenna exhibits end-fire (directional) radiation beams with wide-angle scanning property and could be used for the future 5G beam-forming. Furthermore, the characteristics of the array design in the vicinity of user-hand are studied.

Keywords: beam-steering, end-fire radiation mode, mobile-phone antenna, phased array

Procedia PDF Downloads 151
1392 A Virtual Reality Cybersecurity Training Knowledge-Based Ontology

Authors: Shaila Rana, Wasim Alhamdani

Abstract:

Effective cybersecurity learning relies on an engaging, interactive, and entertaining activity that fosters positive learning outcomes. VR cybersecurity training may promote these aforementioned variables. However, a methodological approach and framework have not yet been created to allow trainers and educators to employ VR cybersecurity training methods to promote positive learning outcomes to the author’s best knowledge. Thus, this paper aims to create an approach that cybersecurity trainers can follow to create a VR cybersecurity training module. This methodology utilizes concepts from other cybersecurity training frameworks, such as NICE and CyTrONE. Other cybersecurity training frameworks do not incorporate the use of VR. VR training proposes unique challenges that cannot be addressed in current cybersecurity training frameworks. Subsequently, this ontology utilizes concepts unique to developing VR training to create a relevant methodology for creating VR cybersecurity training modules. The outcome of this research is to create a methodology that is relevant and useful for designing VR cybersecurity training modules.

Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training, ontology

Procedia PDF Downloads 281
1391 Advancements in Truss Design for High-Performance Facades and Roof System: A Structural Analysis

Authors: Milind Anurag

Abstract:

This study investigates cutting-edge truss design improvements, which are specifically adapted to satisfy the structural demands and difficulties associated with high-performance facades and roofs in modern architectural environments. With a growing emphasis on sustainability, energy efficiency, and eye-catching architectural aesthetics, the structural components that support these characteristics play an important part in attaining the right balance of form and function. The paper seeks to contribute to the evolution of truss design methods by combining data from these investigations, giving significant insights for architects, engineers, and researchers interested in the creation of high-performance building envelopes. The findings of this study are meant to inform future design standards and practices, promoting the development of structures that seamlessly integrate architectural innovation with structural robustness and environmental responsibility.

Keywords: truss design, high-performance, facades, finite element analysis, structural efficiency

Procedia PDF Downloads 51
1390 Analysis of Three-Dimensional Cracks in an Isotropic Medium by the Semi-Analytical Method

Authors: Abdoulnabi Tavangari, Nasim Salehzadeh

Abstract:

We presume a cylindrical medium that is under a uniform loading and there is a penny shaped crack located in the center of cylinder. In the crack growth analysis, the Stress Intensity Factor (SIF) is a fundamental prerequisite. In the present study, according to the RITZ method and by considering a cylindrical coordinate system as the main coordinate and a local polar coordinate, the mode-I SIF of threedimensional penny-shaped crack is obtained. In this method the unknown coefficients will be obtained with minimizing the potential energy that is including the strain energy and the external force work. By using the hook's law, stress fields will be obtained and then by using the Irvine equations, the amount of SIF will be obtained near the edge of the crack. This question has been solved for extreme medium in the Tada handbook and the result of the present research has been compared with that.

Keywords: three-dimensional cracks, penny-shaped crack, stress intensity factor, fracture mechanics, Ritz method

Procedia PDF Downloads 393
1389 Design of a Telemetry, Tracking, and Command Radio-Frequency Receiver for Small Satellites Based on Commercial Off-The-Shelf Components

Authors: A. Lovascio, A. D’Orazio, V. Centonze

Abstract:

From several years till now the aerospace industry is developing more and more small satellites for Low-Earth Orbit (LEO) missions. Such satellites have a low cost of making and launching since they have a size and weight smaller than other types of satellites. However, because of size limitations, small satellites need integrated electronic equipment based on digital logic. Moreover, the LEOs require telecommunication modules with high throughput to transmit to earth a big amount of data in a short time. In order to meet such requirements, in this paper we propose a Telemetry, Tracking & Command module optimized through the use of the Commercial Off-The-Shelf components. The proposed approach exploits the major flexibility offered by these components in reducing costs and optimizing the performance. The method has been applied in detail for the design of the front-end receiver, which has a low noise figure (1.5 dB) and DC power consumption (smaller than 2 W). Such a performance is particularly attractive since it allows fulfilling the energy budget stringent constraints that are typical for LEO small platforms.

Keywords: COTS, LEO, small-satellite, TT&C

Procedia PDF Downloads 128
1388 Kinematic of Thrusts and Tectonic Vergence in the Paleogene Orogen of Eastern Iran, Sechangi Area

Authors: Shahriyar Keshtgar, Mahmoud Reza Heyhat, Sasan Bagheri, Ebrahim Gholami, Seyed Naser Raiisosadat

Abstract:

The eastern Iranian range is a Z-shaped sigmoidal outcrop appearing with a NS-trending general strike on the satellite images, has already been known as the Sistan suture zone, recently identified as the product of an orogenic event introduced either by the Paleogene or Sistan orogen names. The flysch sedimentary basin of eastern Iran was filled by a huge volume of fine-grained Eocene turbiditic sediments, smaller amounts of pelagic deposits and Cretaceous ophiolitic slices, which are entirely remnants of older accretionary prisms appeared in a fold-thrust belt developed onto a subduction zone under the Lut/Afghan block, portions of the Cimmerian superterrane. In these ranges, there are Triassic sedimentary and carbonate sequences (equivalent to Nayband and Shotori Formations) along with scattered outcrops of Permian limestones (equivalent to Jamal limestone) and greenschist-facies metamorphic rocks, probably belonging to the basement of the Lut block, which have tectonic contacts with younger rocks. Moreover, the younger Eocene detrital-volcanic rocks were also thrusted onto the Cretaceous or younger turbiditic deposits. The first generation folds (parallel folds) and thrusts with slaty cleavage appeared parallel to the NE edge of the Lut block. Structural analysis shows that the most vergence of thrusts is toward the southeast so that the Permo-Triassic units in Lut have been thrusted on the younger rocks, including older (probably Jurassic) granites. Additional structural studies show that the regional transport direction in this deformation event is from northwest to the southeast where, from the outside to the inside of the orogen in the Sechengi area. Younger thrusts of the second deformation event were either directly formed as a result of the second deformation event, or they were older thrusts that reactivated and folded so that often, two sets or more slickenlines can be recognized on the thrust planes. The recent thrusts have been redistributed in directions nearly perpendicular to the edge of the Lut block and parallel to the axial surfaces of the northwest second generation large-scale folds (radial folds). Some of these younger thrusts follow the out-of-the-syncline thrust system. The both axial planes of these folds and associated penetrative shear cleavage extended towards northwest appeared with both northeast and southwest dips parallel to the younger thrusts. The large-scale buckling with the layer-parallel stress field has created this deformation event. Such consecutive deformation events perpendicular to each other cannot be basically explained by the simple linear orogen models presented for eastern Iran so far and are more consistent with the oroclinal buckling model.

Keywords: thrust, tectonic vergence, orocline buckling, sechangi, eastern iranian ranges

Procedia PDF Downloads 74
1387 A Survey on Constraint Solving Approaches Using Parallel Architectures

Authors: Nebras Gharbi, Itebeddine Ghorbel

Abstract:

In the latest years and with the advancements of the multicore computing world, the constraint programming community tried to benefit from the capacity of new machines and make the best use of them through several parallel schemes for constraint solving. In this paper, we propose a survey of the different proposed approaches to solve Constraint Satisfaction Problems using parallel architectures. These approaches use in a different way a parallel architecture: the problem itself could be solved differently by several solvers or could be split over solvers.

Keywords: constraint programming, parallel programming, constraint satisfaction problem, speed-up

Procedia PDF Downloads 316
1386 Fine Grained Action Recognition of Skateboarding Tricks

Authors: Frederik Calsius, Mirela Popa, Alexia Briassouli

Abstract:

In the field of machine learning, it is common practice to use benchmark datasets to prove the working of a method. The domain of action recognition in videos often uses datasets like Kinet-ics, Something-Something, UCF-101 and HMDB-51 to report results. Considering the properties of the datasets, there are no datasets that focus solely on very short clips (2 to 3 seconds), and on highly-similar fine-grained actions within one specific domain. This paper researches how current state-of-the-art action recognition methods perform on a dataset that consists of highly similar, fine-grained actions. To do so, a dataset of skateboarding tricks was created. The performed analysis highlights both benefits and limitations of state-of-the-art methods, while proposing future research directions in the activity recognition domain. The conducted research shows that the best results are obtained by fusing RGB data with OpenPose data for the Temporal Shift Module.

Keywords: activity recognition, fused deep representations, fine-grained dataset, temporal modeling

Procedia PDF Downloads 227
1385 Analysis of Lightweight Register Hardware Threat

Authors: Yang Luo, Beibei Wang

Abstract:

In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.

Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power

Procedia PDF Downloads 276
1384 Determination of Thermal Properties of Crosslinked EVA in Outdoor Exposure by DSC, TSC and DMTA Methods

Authors: Kamel Agroui, George Collins, Rydha Yaiche

Abstract:

The objective of this study is to better understand the thermal characteristics and molecular behaviour of cured EVA before and after outdoor exposure. Thermal analysis methods as DSC, TSC and DMTA studies were conducted on EVA material. DSC experiments on EVA show a glass transition at about -33.1° C which is characteristic of crystalline phase and an endothermic peak at temperature of 55 °C characteristic of amorphous phase. The magnitude of the integrated temperature DSC peak for EVA is 14.4 J/g. The basic results by TSC technique is that there are two relaxations that are reproducibly observed in cured EVA encapsulant material. At temperature polarization 85°C, a low temperature relaxation occurs at –24.4°C and a high temperature relaxation occurs at +30.4ºC. DMTA results exhibit two tan peaks located at -14.9°C and +66.6°C. After outdoor exposure cured EVA by DSC analysis revealed two endothermic peaks due to post crystallization phenomenon and TSC suggests that prolonged exposure selectively effects the poly(vinyl acetate)-rich phase, with much less impact on the polyethylene-rich phase.

Keywords: EVA, encapsulation process, PV module, thermal analysis, quality control

Procedia PDF Downloads 52