Search results for: shape integrity
1871 Anticoccidial Activity of Vitis venifera Extract on Oocysts of Different Eimeria Species of Chicken
Authors: Asghar Abbas, Rao Zahid Abbas, Muhammad Asif Raza, Kashif Hussain
Abstract:
In the current experiment, in vitro anticoccidial potential of Vitis venifera (grape seed) extract was evaluated. For this purpose, an in vitro sporulation inhibition assay was used. Collected oocysts of different Eimeria species of chicken were exposed to six different concentrations (w/v) of Vitis venifera extract (TAE) in 10% dimethylsulphoxide solution (DMSO). Dimethylsulphoxide (DMSO) and potassium dichromate solution (K₂Cr₂O₇) served as control groups. Results of the study revealed that Vitis venifera extract (TAE) showed an inhibitory effect on sporulation (%) and damage (%) of Eimeria oocysts in a dose-dependent manner as compared to both control groups. Vitis venifera extract also damaged the morphology of oocysts in terms of shape, size, and number of sporocysts.Keywords: Vitis venifera, in vitro, Eimeria, oocysts
Procedia PDF Downloads 2101870 Definition of Service Angle of Android’S Robot Hand by Method of Small Movements of Gripper’S Axis Synthesis by Speed Vector
Authors: Valeriy Nebritov
Abstract:
The paper presents a generalized method for determining the service solid angle based on the assigned gripper axis orientation with a stationary grip center. Motion synthesis in this work is carried out in the vector of velocities. As an example, a solid angle of the android robot arm is determined, this angle being formed by the longitudinal axis of a gripper. The nature of the method is based on the study of sets of configuration positions, defining the end point positions of the unit radius sphere sweep, which specifies the service solid angle. From this the spherical curve specifying the shape of the desired solid angle was determined. The results of the research can be used in the development of control systems of autonomous android robots.Keywords: android robot, control systems, motion synthesis, service angle
Procedia PDF Downloads 1961869 The Labor Participation–Fertility Trade-off: The Case of the Philippines
Authors: Daphne Ashley Sze, Kenneth Santos, Ariane Gabrielle Lim
Abstract:
As women are now given more freedom and choice to pursue employment, the world’s over-all fertility has been decreasing mainly due to the shift in time allocation between working and child rearing. As such, we study the case of the Philippines, where there exists a decreasing fertility rate and increasing openness for women labor participation. We focused on the distinction between fertility and fecundity, the former being the manifestation of the latter and aim to trace and compare the effects of both fecundity and fertility to women’s employment status through the estimation of the reproduction function and multinomial logistic function. Findings suggest that the perception of women regarding employment opportunities in the Philippines links the negative relationship observed between fertility, fecundity and women’s employment status. Today, there has been a convergence in the traditional family roles of men and women, as both genders now have identical employment opportunities that continue to shape their preferences.Keywords: multinomial logistic function, tobit, fertility, women employment status, fecundity
Procedia PDF Downloads 6061868 Exploring Weld Rejection Rate Limits and Tracers Effects in Construction Projects
Authors: Abdalaziz M. Alsalhabi, Loai M. Alowa
Abstract:
This paper investigates Weld Rejection Rate (WRR) limits and tracer effects in construction projects, with a specific focus on a Gas Plant Project, a mega-project held by Saudi Aramco (SA) in Saudi Arabia. The study included a comprehensive examination of various factors impacting WRR limits. It commenced by comparing the Company practices with ASME standards, followed by an in-depth analysis of both weekly and cumulative projects' historical WRR data, evaluation of Radiographic Testing (RT) reports for rejected welds, and proposal of mitigation methods to eliminate future rejections. Additionally, the study revealed the causes of fluctuation in WRR data and benchmarked with the industry practices. Furthermore, a case study was conducted to explore the impact of tracers on WRR, providing insights into their influence on the welding process. This paper aims to achieve three primary objectives. Firstly, it seeks to validate the existing practices of WRR limits and advocate for their inclusion within relevant International Industry Standards. Secondly, it aims to validate the effectiveness of the WRR formula that incorporates tracer effects, ensuring its reliability in assessing weld quality. Lastly, this study aims to identify opportunities for process improvement in WRR control, with the ultimate goal of enhancing project processes and ensuring the integrity, safety, and efficiency of constructed assets.Keywords: weld rejection rate, weld repair rate in joint and linear basis, tracers effects, construction projects
Procedia PDF Downloads 411867 Comparative Fragility Analysis of Shallow Tunnels Subjected to Seismic and Blast Loads
Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed
Abstract:
Underground structures are crucial components which required detailed analysis and design. Tunnels, for instance, are massively constructed as transportation infrastructures and utilities network especially in urban environments. Considering their prime importance to the economy and public safety that cannot be compromised, thus any instability to these tunnels will be highly detrimental to their performance. Recent experience suggests that tunnels become vulnerable during earthquakes and blast scenarios. However, a very limited amount of studies has been carried out to study and understanding the dynamic response and performance of underground tunnels under those unpredictable extreme hazards. In view of the importance of enhancing the resilience of these structures, the overall aims of the study are to evaluate probabilistic future performance of shallow tunnels subjected to seismic and blast loads by developing detailed fragility analysis. Critical non-linear time history numerical analyses using sophisticated finite element software Midas GTS NX have been presented about the current methods of analysis, taking into consideration of structural typology, ground motion and explosive characteristics, effect of soil conditions and other associated uncertainties on the tunnel integrity which may ultimately lead to the catastrophic failure of the structures. The proposed fragility curves for both extreme loadings are discussed and compared which provide significant information the performance of the tunnel under extreme hazards which may beneficial for future risk assessment and loss estimation.Keywords: fragility analysis, seismic loads, shallow tunnels, blast loads
Procedia PDF Downloads 3431866 Causality Channels between Corruption and Democracy: A Threshold Non-Linear Analysis
Authors: Khalid Sekkat, Fredj Fhima, Ridha Nouira
Abstract:
This paper focuses on three main limitations of the literature regarding the impact of corruption on democracy. These limitations relate to the distinction between causality and correlation, the components of democracy underlying the impact and the shape of the relationship between corruption and democracy. The study uses recent developments in panel data causality econometrics, breaks democracy down into different components, and examines the types of the relationship. The results show that Control of Corruption leads to a higher quality of democracy. Regarding the estimated coefficients of the components of democracy, they are significant at the 1% level, and their signs and levels are in accordance with expectations except in a few cases. Overall, the results add to the literature in three respects: i). corruption has a causal effect on democracy and, hence, single equation estimation may pose a problem, ii) the assumption of the linearity of the relationships between control of corruption and democracy is also possibly problematic, and iii) the channels of transmission of the effects of corruption on democracy can be diverse. Disentangling them is useful from a policy perspective.Keywords: corruption, governance, causality, threshold models
Procedia PDF Downloads 461865 Complex Shaped Prepreg Part Drapability Using Vacuum Bagging
Authors: Saran Toure
Abstract:
Complex shaped parts manufactured using out of autoclave prepreg vacuum bagging has a high quality finish. This is not only due to in the control of resin to fibre ratio in prepregs, but also to a reduction in fibre misalignment, slippage and stresses occurring within plies during compaction. In a bid to further reduce deformation modes and control failure modes, we carried experiments where, we introduced wetted fabrics within a prepreg plybook during compaction. Here are presented the results obtained from the vacuum bagging of a complex shaped part. The shape is that of a turbine fan blade with smooth curves all throughout ending with sharp edged angles. The quality of the final part made from this blade is compared to that of the same blade made from standard vacuum bagging process of prepregs, without introducing wetted fabrics.Keywords: complex shaped part, prepregs, drapability, vacuum bagging
Procedia PDF Downloads 3661864 SPBAC: A Semantic Policy-Based Access Control for Database Query
Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage
Abstract:
Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML
Procedia PDF Downloads 921863 Globalization and English Literature: Explaining How Globalization Has Affected the Themes and Style of Modern English Literature
Authors: Irfan Mehmood, Tahir Mehmood
Abstract:
This article considers the far-reaching influence of globalization on the themes, styles, and influences that shape modern English literature. With globalization, the world is getting smaller and smaller through interdependent connections and cross-cultural sharing. In today's world, taking a walk and exploring nature is important. This paper reveals how globalization affected the narratives of English literature, where authors are allowed to write about universal topics while still honoring diversity and multiculturalism. English literature has a rich history, transcends borders, and encompasses various traditions. This research examines the history surrounding the various literary styles and how modern writers adapt and innovate in a fast-moving society. This study also examines how literature reflects on the interdependent world and becomes a testimony that English literature is flexible.Keywords: globalization, contemporary literature, multiculturalism, narrative evolution, interconnectedness
Procedia PDF Downloads 761862 Security Design of Root of Trust Based on RISC-V
Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li
Abstract:
Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.Keywords: root of trust, secure boot, memory protection, hardware security
Procedia PDF Downloads 2161861 The Labor Participation-Fertility Trade-Off: Exploring Fecundity and Its Consequences to Women's Employment in the Philippines
Authors: Ariane C. Lim, Daphne Ashley L. Sze, Kenneth S. Santos
Abstract:
As women are now given more freedom and choice to pursue employment, the world’s over-all fertility has been decreasing mainly due to the shift in time allocation between working and child-rearing. As such, we study the case of the Philippines, where there exists a decreasing fertility rate and increasing openness for women labor participation. We focused on the distinction between fertility and fecundity, the former being the manifestation of the latter and aim to trace and compare the effects of both fecundity and fertility to women’s employment status through the estimation of the reproduction function and multinomial logistic function. Findings suggest that the perception of women regarding employment opportunities in the Philippines links the negative relationship observed between fertility, fecundity and women’s employment status. Today, there has been a convergence in the traditional family roles of men and women, as both genders now have identical employment opportunities that continue to shape their preferences.Keywords: multinomial logistic function, tobit, fertility, women employment status, fecundity
Procedia PDF Downloads 6291860 Multivariate Simulations of the Process of Forming the Automotive Connector Forging from ZK60 Alloy
Authors: Anna Dziubinska
Abstract:
The article presents the results of numerical simulations of the new forging process of the automotive connector forging from cast preform. The high-strength ZK60 alloy (belonging to the Mg-Zn-Zr group of Mg alloys) was selected for numerical tests. Currently, this part of the industry is produced by multi-stage forging consisting of operations: bending, preforming, and finishing. The use of the cast preform would enable forging this component in one operation. However, obtaining specific mechanical properties requires inducing a certain level of strain within the forged part. Therefore, the design of the preform, its shape, and volume are of paramount importance. In work presented in this article, preforms of different shapes were designed and assessed using Finite Element (FE) analysis. The research was funded by the Polish National Agency for Academic Exchange within the framework of the Bekker programme.Keywords: automotive connector, forging, magnesium alloy, numerical simulation, preform, ZK60
Procedia PDF Downloads 1311859 Numerical Modal Analysis of a Multi-Material 3D-Printed Composite Bushing and Its Application
Authors: Paweł Żur, Alicja Żur, Andrzej Baier
Abstract:
Modal analysis is a crucial tool in the field of engineering for understanding the dynamic behavior of structures. In this study, numerical modal analysis was conducted on a multi-material 3D-printed composite bushing, which comprised a polylactic acid (PLA) outer shell and a thermoplastic polyurethane (TPU) flexible filling. The objective was to investigate the modal characteristics of the bushing and assess its potential for practical applications. The analysis involved the development of a finite element model of the bushing, which was subsequently subjected to modal analysis techniques. Natural frequencies, mode shapes, and damping ratios were determined to identify the dominant vibration modes and their corresponding responses. The numerical modal analysis provided valuable insights into the dynamic behavior of the bushing, enabling a comprehensive understanding of its structural integrity and performance. Furthermore, the study expanded its scope by investigating the entire shaft mounting of a small electric car, incorporating the 3D-printed composite bushing. The shaft mounting system was subjected to numerical modal analysis to evaluate its dynamic characteristics and potential vibrational issues. The results of the modal analysis highlighted the effectiveness of the 3D-printed composite bushing in minimizing vibrations and optimizing the performance of the shaft mounting system. The findings contribute to the broader field of composite material applications in automotive engineering and provide valuable insights for the design and optimization of similar components.Keywords: 3D printing, composite bushing, modal analysis, multi-material
Procedia PDF Downloads 1091858 Rapid Green Synthesis and Characterization of Silver Nanoparticles Using Eclipta prostrata Leaf Extract
Authors: Siva Prasad Peddi
Abstract:
Silver nanoparticles were successfully synthesized from silver nitrate through a rapid green synthesis method using Eclipta prostrata leaf extract as a reducing cum stabilizing agent. The experimental procedure was readily conducted at room temperature and pressure, and could be easily scaled up. The silver nanoparticles thus obtained were characterized using UV-Visible Spectroscopy (UV-VIS) which yielded an absorption peak at 416 nm. The biomolecules responsible for capping of the bio-reduced silver nanoparticles synthesized using plant extract were successfully identified through FTIR analysis. It was evinced through Scanning Electron Microscope (SEM), and X-ray diffraction (XRD) analysis that the silver nanoparticles were crystalline in nature and spherical in shape. The average size of the particles obtained using Scherrer’s formula was 27.4 nm. The adopted technique for silver nanoparticle synthesis is suitable for large-scale production.Keywords: silver nanoparticles, green synthesis, characterization, Eclipta prostrata
Procedia PDF Downloads 4691857 Influence of Orientation in Complex Building Architecture in Various Climatic Regions in Winter
Authors: M. Alwetaishi, Giulia Sonetti
Abstract:
It is architecturally accepted that building form and design is considered as one of the most important aspects in affecting indoor temperature. The total area of building plan might be identical, but the design will have a major influence on the total area of external walls. This will have a clear impact on the amount of heat exchange with outdoor. Moreover, it will affect the position and area of glazing system. This has not received enough consideration in research by the specialists, since most of the publications are highlighting the impact of building envelope in terms of physical heat transfer in buildings. This research will investigate the impact of orientation of various building forms in various climatic regions. It will be concluded that orientation and glazing to wall ratio were recognized to be the most effective variables despite the shape of the building. However, linear ad radial forms were found more appropriate shapes almost across the continent.Keywords: architectural building design, building form, building design in different climate, indoor air temperature
Procedia PDF Downloads 4051856 Foreign Policy and National Security Dilemma: Examining Nigerian Experience
Authors: Shuaibu Umar Abdul
Abstract:
The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.Keywords: foreign policy, nation, national security, Nigeria, security
Procedia PDF Downloads 5141855 Comparative International Law and Feminist Legal Studies, Uniting to Make a Difference in Addressing the Disempowerment of Women
Authors: Isaac Kfir
Abstract:
In thinking about the role of the law and its impact on socially constructed norms and identities, scholars have come to explore a multitude of issues to do with equality, empowerment, and views. The aim of this contribution is threefold. Firstly, offer a descriptive framework of feminist legal studies (FLS) through a review of the evolution of the field in the context of equality, rights, and justice. Secondly, encourage those working on equality, rights, and justice in respect to ‘women’s issues’ to engage in international comparative legal studies. Third, to highlight that those seeking solutions to disempowerment and discrimination must recognize that they need to contend with claims that one is seeking to undermine cultural norms. Therefore, one effective way for feminists to address this situation is by relying more on the international legal mechanism, which reflects basic legal tenets as to the universality of equality, rights, and justice, that can then help shape the domestic setting.Keywords: international comparative law, feminist legal studies, equality, rights, justice
Procedia PDF Downloads 2761854 Down-Regulated Gene Expression of GKN1 and GKN2 as Diagnostic Markers for Gastric Cancer
Authors: Amer A. Hasan, Mehri Igci, Ersin Borazan, Rozhgar A. Khailany, Emine Bayraktar, Ahmet Arslan
Abstract:
Gastric cancer (GC) has high morbidity and fatality rate in various countries and is still one of the most frequent and deadly diseases. Novel mitogenic and motogenic Gastrokine1 (GKN1) and Gastrokine 2 (GKN2) genes that are highly expressed in the normal stomach epithelium and plays an important role in maintaining the integrity and homeostasis of stomach mucosal epithelial cells. Significant loss of copy number and mRNA transcript of GKN1 and GKN2 gene expression were frequently observed in all types of gastric cancer. In this study, 47 paired samples that were grouped according to the types of gastric cancer and the clinical characteristics of the patients, including gender and average of age were investigated with gene expression analysis and mutation screening by monetering RT-PCR, SSCP and nucleotide sequencing techniques. Both GKN1 and GKN2 genes were observed significantly reduced found by (Wilcoxon signed rank test; p<0.05). As a result of gene screening, no mutation (no different genotype) was detected. It is considered that gene mutations are not the cause of inactivation of gastrokines. In conclusion, the mRNA expression level of GKN1 and GKN2 genes statistically was decreased regardless the gender, age or cancer type of patients. Reduced of gastrokine genes seems to occur at the initial steps of cancer development. In order to understand the investigation between gastric cancer and diagnostic biomarker; further analysis is necessary.Keywords: gastric cancer, diagnostic biomarker, nucleotide sequencing, semi-quantitative RT-PCR
Procedia PDF Downloads 4721853 Numerical and Experimental Analysis of Stiffened Aluminum Panels under Compression
Authors: Ismail Cengiz, Faruk Elaldi
Abstract:
Within the scope of the study presented in this paper, load carrying capacity and buckling behavior of a stiffened aluminum panel designed by adopting current ‘buckle-resistant’ design application and ‘Post –Buckling’ design approach were investigated experimentally and numerically. The test specimen that is stabilized by Z-type stiffeners and manufactured from aluminum 2024 T3 Clad material was test under compression load. Buckling behavior was observed by means of 3 – dimensional digital image correlation (DIC) and strain gauge pairs. The experimental study was followed by developing an efficient and reliable finite element model whose ability to predict behavior of the stiffened panel used for compression test is verified by compering experimental and numerical results in terms of load – shortening curve, strain-load curves and buckling mode shapes. While finite element model was being constructed, non-linear behaviors associated with material and geometry was considered. Finally, applicability of aluminum stiffened panel in airframe design against to composite structures was evaluated thorough the concept of ‘Structural Efficiency’. This study reveals that considerable amount of weight saving could be gained if the concept of ‘post-buckling design’ is preferred to the already conventionally used ‘buckle resistant design’ concept in aircraft industry without scarifying any of structural integrity under load spectrum.Keywords: post-buckling, stiffened panel, non-linear finite element method, aluminum, structural efficiency
Procedia PDF Downloads 1481852 Selective Oxidation of 6Mn-2Si Advanced High Strength Steels during Intercritical Annealing Treatment
Authors: Maedeh Pourmajidian, Joseph R. McDermid
Abstract:
Advanced High Strength Steels are revolutionizing both the steel and automotive industries due to their high specific strength and ability to absorb energy during crash events. This allows manufacturers to design vehicles with significantly increased fuel efficiency without compromising passenger safety. To maintain the structural integrity of the fabricated parts, they must be protected from corrosion damage through continuous hot-dip galvanizing process, which is challenging due to selective oxidation of Mn and Si on the surface of this AHSSs. The effects of process atmosphere oxygen partial pressure and small additions of Sn on the selective oxidation of a medium-Mn C-6Mn-2Si advanced high strength steel was investigated. Intercritical annealing heat treatments were carried out at 690˚C in an N2-5%H2 process atmosphere under dew points ranging from –50˚C to +5˚C. Surface oxide chemistries, morphologies, and thicknesses were determined at a variety of length scales by several techniques, including SEM, TEM+EELS, and XPS. TEM observations of the sample cross-sections revealed the transition to internal oxidation at the +5˚C dew point. EELS results suggested that the internal oxides network was composed of a multi-layer oxide structure with varying chemistry from oxide core towards the outer part. The combined effect of employing a known surface active element as a function of process atmosphere on the surface structure development and the possible impact on reactive wetting of the steel substrates by the continuous galvanizing zinc bath will be discussed.Keywords: 3G AHSS, hot-dip galvanizing, oxygen partial pressure, selective oxidation
Procedia PDF Downloads 3981851 Knowledge Management in a Combined/Joint Environment
Authors: Cory Cannon
Abstract:
In the current era of shrinking budgets, increasing amounts of worldwide natural disasters, state and non-state initiated conflicts within the world. The response has involved multinational coalitions to conduct effective military operations. The need for a Knowledge Management strategy when developing these coalitions have been overlooked in the past and the need for developing these accords early on will save time and help shape the way information and knowledge are transferred from the staff and action officers of the coalition to the decision-makers in order to make timely decisions within an ever changing environment. The aim of this paper is to show how Knowledge Management has developed within the United States military and how the transformation of working within a Combined/ Joint environment in both the Middle East and the Far East has improved relations between members of the coalitions as well as being more effective as a military force. These same principles could be applied to multinational corporations when dealing with cultures and decision-making processes.Keywords: civil-military, culture, joint environment, knowledge management
Procedia PDF Downloads 3641850 Professional Learning, Professional Development and Academic Identity of Sessional Teachers: Underpinning Theoretical Frameworks
Authors: Aparna Datey
Abstract:
This paper explores the theoretical frameworks underpinning professional learning, professional development, and academic identity. The focus is on sessional teachers (also called tutors or adjuncts) in architectural design studios, who may be practitioners, masters or doctoral students and academics hired ‘as needed’. Drawing from Schön’s work on reflective practice, learning and developmental theories of Vygotsky (social constructionism and zones of proximal development), informal and workplace learning, this research proposes that sessional teachers not only develop their teaching skills but also shape their identities through their 'everyday' work. Continuing academic staff develop their teaching through a combination of active teaching, self-reflection on teaching, as well as learning to teach from others via formalised programs and informally in the workplace. They are provided professional development and recognised for their teaching efforts through promotion, student citations, and awards for teaching excellence. The teaching experiences of sessional staff, by comparison, may be discontinuous and they generally have fewer opportunities and incentives for teaching development. In the absence of access to formalised programs, sessional teachers develop their teaching informally in workplace settings that may be supportive or unhelpful. Their learning as teachers is embedded in everyday practice applying problem-solving skills in ambiguous and uncertain settings. Depending on their level of expertise, they understand how to teach a subject such that students are stimulated to learn. Adult learning theories posit that adults have different motivations for learning and fall into a matrix of readiness, that an adult’s ability to make sense of their learning is shaped by their values, expectations, beliefs, feelings, attitudes, and judgements, and they are self-directed. The level of expertise of sessional teachers depends on their individual attributes and motivations, as well as on their work environment, the good practices they acquire and enhance through their practice, career training and development, the clarity of their role in the delivery of teaching, and other factors. The architectural design studio is ideal for study due to the historical persistence of the vocational learning or apprenticeship model (learning under the guidance of experts) and a pedagogical format using two key approaches: project-based problem solving and collaborative learning. Hence, investigating the theoretical frameworks underlying academic roles and informal professional learning in the workplace would deepen understanding of their professional development and how they shape their academic identities. This qualitative research is ongoing at a major university in Australia, but the growing trend towards hiring sessional staff to teach core courses in many disciplines is a global one. This research will contribute to including transient sessional teachers in the discourse on institutional quality, effectiveness, and student learning.Keywords: academic identity, architectural design learning, pedagogy, teaching and learning, sessional teachers
Procedia PDF Downloads 1241849 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 2091848 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks
Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode
Abstract:
The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control
Procedia PDF Downloads 841847 Light-Scattering Characteristics of Ordered Arrays Nobel Metal Nanoparticles
Authors: Yassine Ait-El-Aoud, Michael Okomoto, Andrew M. Luce, Alkim Akyurtlu, Richard M. Osgood III
Abstract:
Light scattering of metal nanoparticles (NPs) has a unique, and technologically important effect on enhancing light absorption in substrates because most of the light scatters into the substrate near the localized plasmon resonance of the NPs. The optical response, such as the resonant frequency and forward- and backward-scattering, can be tuned to trap light over a certain spectral region by adjusting the nanoparticle material size, shape, aggregation state, Metallic vs. insulating state, as well as local environmental conditions. In this work, we examined the light scattering characteristics of ordered arrays of metal nanoparticles and the light trapping, in order to enhance absorption, by measuring the forward- and backward-scattering using a UV/VIS/NIR spectrophotometer. Samples were fabricated using the popular self-assembly process method: dip coating, combined with nanosphere lithography.Keywords: dip coating, light-scattering, metal nanoparticles, nanosphere lithography
Procedia PDF Downloads 3281846 Numerical Simulation of Erosion Control in Slurry Pump Casing by Geometrical Flow Pattern Modification Analysis
Authors: A. R. Momeninezhad
Abstract:
Erosion of Slurry Pumps in Related Industries, is one of the major costs in their production process. Many factories in extractive industries try to find ways to diminish this cost. In this paper, we consider the flow pattern modifications by geometric variations made of numerical simulation of flow inside pump casing, which is one of the most important parts analyzed for erosion. The mentioned pump is a cyclone centrifugal slurry pump, which is operating in Sarcheshmeh Copper Industries in Kerman-Iran, named and tagged as HM600 cyclone pump. Simulation shows many improvements in local wear information and situations for better and more qualified design of casing shape and impeller position, before and after geometric corrections. By theory of liquid-solid two-phase flow, the local wear defeats are analyzed and omitted.Keywords: flow pattern, slurry pump, simulation, wear
Procedia PDF Downloads 4571845 Production of Nanocomposite Electrical Contact Materials Ag-SnO2, W-Cu and Cu-C in Thermal Plasma
Authors: A. V. Samokhin, A. A. Fadeev, M. A. Sinaiskii, N. V. Alekseev, A. V. Kolesnikov
Abstract:
Composite materials where metal matrix is reinforced by ceramic or metal particles are of great interest for use in the manufacturing of electrical contacts. Significant improvement of the composite physical and mechanical properties as well as increase of the performance parameters of composite-based products can be achieved if the nanoscale structure in the composite materials is obtained by using nanosized powders as starting components. The results of nanosized composite powders synthesis (Ag-SnO2, W-Cu and Cu-C) in the DC thermal plasma flows are presented in this paper. The investigations included the following processes: - Recondensation of micron powder mixture Ag + SnO2 in a nitrogen plasma; - The reduction of the oxide powders mixture (WO3 + CuO) in a hydrogen-nitrogen plasma; - Decomposition of the copper formate and copper acetate powders in nitrogen plasma. The calculations of equilibrium compositions of multicomponent systems Ag-Sn-O-N, W-Cu-O-H-N and Cu-O-C-H-N in the temperature range of 400-5000 K were carried to estimate basic process characteristics. Experimental studies of the processes were performed using a plasma reactor with a confined jet flow. The plasma jet net power was in the range of 2 - 13 kW, and the feedstock flow rate was up to 0.35 kg/h. The obtained powders were characterized by TEM, HR-TEM, SEM, EDS, ED-XRF, XRD, BET and QEA methods. Nanocomposite Ag-SnO2 (12 wt. %). Processing of the initial powder mixture (Ag-SnO2) in nitrogen thermal plasma stream allowed to produce nanopowders with a specific surface area up to 24 m2/g, consisting predominantly of particles with size less than 100 nm. According to XRD results, tin was present in the obtained products as SnO2 phase, and also as intermetallic phases AgxSn. Nanocomposite W-Cu (20 wt .%). Reduction of (WO3+CuO) mixture in the hydrogen-nitrogen plasma provides W-Cu nanopowder with particle sizes in the range of 10-150 nm. The particles have mainly spherical shape and structure tungsten core - copper shell. The thickness of the shell is about several nanometers, the shell is composed of copper and its oxides (Cu2O, CuO). The nanopowders had 1.5 wt. % oxygen impurity. Heat treatment in a hydrogen atmosphere allows to reduce the oxygen content to less than 0.1 wt. %. Nanocomposite Cu-C. Copper nanopowders were found as products of the starting copper compounds decomposition. The nanopowders primarily had a spherical shape with a particle size of less than 100 nm. The main phase was copper, with small amount of Cu2O and CuO oxides. Copper formate decomposition products had a specific surface area 2.5-7 m2/g and contained 0.15 - 4 wt. % carbon; and copper acetate decomposition products had the specific surface area 5-35 m2/g, and carbon content of 0.3 - 5 wt. %. Compacting of nanocomposites (sintering in hydrogen for Ag-SnO2 and electric spark sintering (SPS) for W-Cu) showed that the samples having a relative density of 97-98 % can be obtained with a submicron structure. The studies indicate the possibility of using high-intensity plasma processes to create new technologies to produce nanocomposite materials for electric contacts.Keywords: electrical contact, material, nanocomposite, plasma, synthesis
Procedia PDF Downloads 2351844 Some Investigations of Primary Slurry Used for Production of Ceramic Shells
Authors: Balwinder Singh
Abstract:
In the current competitive environment, casting industry has several challenges such as production of intricate castings, near net shape castings, decrease lead-time from product design to production, improved casting quality and to control costs. The raw materials used to make ceramic shell play an important role in determining the overall final ceramic shell characteristics. In this work, primary slurries were formulated using various combinations of zircon flour, fused silica and aluminosilicate powders as filler, colloidal silica as binder along with wetting and antifoaming agents (Catalyst). Taguchi’s parameter design strategy has been applied to investigate the effect of primary slurry parameters on the viscosity of the slurry and primary coating of shell. The result reveals that primary coating with low viscosity slurry has produced a rough surface of the shell due to stucco penetration.Keywords: ceramic shell, primary slurry, filler, slurry viscosity, surface roughness
Procedia PDF Downloads 4751843 Representation of Traditional Ornament in Modern Architecture Yogyakarta
Authors: Eni Puji Astuti
Abstract:
Yogyakarta has a rich and various form of traditional ornament which can be found on many media. Traditional Ornament has a classical form and being a local identity that can be easily recognized. The retention of traditional ornament can be done in many ways, one of them is aplicating tradisional ornament on modern architecture. This paper is aimed at identifiying the representation of traditional ornament on modern architecture in Yogyakarta. Kawung, parang, tumpal are some of Javaness motifs which often implemented on modern architecture because of their simple and welknown form. The motifs that actually aplicate on textiles ornament, recently often applied on modern architecture as aesthetical element on the facade, interior walls and furniture. The application of traditional ornaments as aesthetic architectural elements provide a strong local identity of Yogyakarta. Traditional ornaments that are applied, no longer refers to the origin local values, norms, and traditions. The form previously be simplified and adapted to the shape of minimalist style of modern architecture.Keywords: traditional ornament, representation, Yogyakarta, modern architecture
Procedia PDF Downloads 3571842 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 59