Search results for: ancient architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2209

Search results for: ancient architecture

1069 Path Planning for Collision Detection between two Polyhedra

Authors: M. Khouil, N. Saber, M. Mestari

Abstract:

This study aimed to propose, a different architecture of a Path Planning using the NECMOP. where several nonlinear objective functions must be optimized in a conflicting situation. The ability to detect and avoid collision is very important for mobile intelligent machines. However, many artificial vision systems are not yet able to quickly and cheaply extract the wealth information. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons linear and threshold logic, which simplified the actual implementation of all the networks proposed. This article represents a comprehensive algorithm that determine through the AMAXNET network a measure (a mini-maximum point) in a fixed time, which allows us to detect the presence of a potential collision.

Keywords: path planning, collision detection, convex polyhedron, neural network

Procedia PDF Downloads 434
1068 Technical and Legal Definitions in Cyber Terrorism

Authors: Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hamed Ladoni Damghani, Rohimi Bin Shapiee

Abstract:

In recent years the speed of new technology has brought forth so many new issues. Cyberspace is among the new technologies that need novel ways to address the various issues that have arisen. While cyberspace is a technical notion that defies a single definition, this new technology requires the adoption and application of new laws. In order to manage issues arising from the existence of cyberspace, proper policies and definitions must be formulated which satisfy both technical and legal aspects. One difficulty in this regard is due to the unique features of cyberspace architecture. This article proposes to define cyberspace and cyber terrorism. This will allow for a more effective and comprehensive addressing of legal issues as they can then be handled better by introducing a new factor to the otherwise ordinary analysis in whichever field is implicated such as the nature and place of use.

Keywords: cyberspace, cyber terrorism, technical definition, legal definition

Procedia PDF Downloads 581
1067 The Divine Elephant: Asian Elephants in Religions and Religious Practices

Authors: Ashna Sinha, Surendra Varma

Abstract:

The Asian elephant is predominantly found in South Asian and Southeast Asian countries. They are intrinsically associated with the religions, religious and cultural practices and festivals of these regions. Amazingly, these magnificent animals are also mentioned in the texts and are found sculpted on the walls of places of religious significance even in the Middle Eastern countries, and evidently, they have been mentioned in all the major religions. The elephants are intrigued and associated with the cultural and religious practices of Asians for thousands of years. While some of the practices and festivals in certain geographical regions are going on for years; some regions and religions have gone through a cultural shift and cultural adaptation, and have incorporated the participation of these divine beings. The symbolism of elephants is used for preaching and giving philosophical lessons through stories and painted art, across different religions through varying literary and visual artworks. The animals carved on the ancient and present day temples can easily be found in South and South East Asian countries, signifying the importance of the animal in a given religion which the temples are associated with. Though not sculpted but captive elephants are easily found on the premises of the places of worship to give a blessing to the people or to give a tour to show their own connotation with the religion. They are also used for carrying out processions in varying religious and cultural activities, and are considered to be of immense value as they add an extra glamour and publicize the wealth and weightiness of that distinct religion or culture. Our critical review of elephant’s association with religions and their practices show, although they give a higher degree of value and respects to this animal, the practices do not match with their biological design, but profoundly compromise their welfare and conservation. It is time to follow the values the animal enjoy and use the same for their conservation and welfare.

Keywords: conservation, elephant, religion, welfare

Procedia PDF Downloads 286
1066 The Effect of Window Position and Ceiling Height on Cooling Load in Architectural Studio

Authors: Seyedehzahra Mirrahimi

Abstract:

This paper investigates the effect of variations in window and ceiling heights on cooling inside an architectural training studio with a full-width window. For architectural training, students use the studio more often than they use ordinary classrooms. Therefore, studio dimensions and size, and the window position, directly influence the cooling load. Energy for cooling is one of the most expensive costs in the studio because of the high activity levels of students during the warm season. The methodology of analysis involves measuring energy changes in the Energy Plus software in Kish Island. It was proved that the cooling energy in an architecture studio can be increased by changing window levels and ceiling heights to add a range of cooling energy.

Keywords: cooling energy, Energy Plus, studio classroom, window position

Procedia PDF Downloads 284
1065 Blockchain Platform Configuration for MyData Operator in Digital and Connected Health

Authors: Minna Pikkarainen, Yueqiang Xu

Abstract:

The integration of digital technology with existing healthcare processes has been painfully slow, a huge gap exists between the fields of strictly regulated official medical care and the quickly moving field of health and wellness technology. We claim that the promises of preventive healthcare can only be fulfilled when this gap is closed – health care and self-care becomes seamless continuum “correct information, in the correct hands, at the correct time allowing individuals and professionals to make better decisions” what we call connected health approach. Currently, the issues related to security, privacy, consumer consent and data sharing are hindering the implementation of this new paradigm of healthcare. This could be solved by following MyData principles stating that: Individuals should have the right and practical means to manage their data and privacy. MyData infrastructure enables decentralized management of personal data, improves interoperability, makes it easier for companies to comply with tightening data protection regulations, and allows individuals to change service providers without proprietary data lock-ins. This paper tackles today’s unprecedented challenges of enabling and stimulating multiple healthcare data providers and stakeholders to have more active participation in the digital health ecosystem. First, the paper systematically proposes the MyData approach for healthcare and preventive health data ecosystem. In this research, the work is targeted for health and wellness ecosystems. Each ecosystem consists of key actors, such as 1) individual (citizen or professional controlling/using the services) i.e. data subject, 2) services providing personal data (e.g. startups providing data collection apps or data collection devices), 3) health and wellness services utilizing aforementioned data and 4) services authorizing the access to this data under individual’s provided explicit consent. Second, the research extends the existing four archetypes of orchestrator-driven healthcare data business models for the healthcare industry and proposes the fifth type of healthcare data model, the MyData Blockchain Platform. This new architecture is developed by the Action Design Research approach, which is a prominent research methodology in the information system domain. The key novelty of the paper is to expand the health data value chain architecture and design from centralization and pseudo-decentralization to full decentralization, enabled by blockchain, thus the MyData blockchain platform. The study not only broadens the healthcare informatics literature but also contributes to the theoretical development of digital healthcare and blockchain research domains with a systemic approach.

Keywords: blockchain, health data, platform, action design

Procedia PDF Downloads 96
1064 Architectural Thinking in a Time of Climate Emergency

Authors: Manoj Parmar

Abstract:

The article uses reflexivity as a research method to investigate and propose an architectural theory plan for climate change. It hypothecates that to discuss or formulate discourse on "Architectural Thinking in a Time of Climate Emergency," firstly, we need to understand the modes of integration that enable architectural thinking with climate change. The study intends to study the various integration modes that have evolved historically and situate them in time. Subsequently, it analyses the integration pattern, challenges the existing model, and finds a way towards climate change as central to architectural thinking. The study is fundamental on-premises that ecology and climate change scholarship has consistently out lashed the asymmetrical and nonlinear knowledge and needs approaches for architecture that are less burden to climate change to people and minimize its impact on ecology.

Keywords: climate change, architectural theory, reflexivity, modernity

Procedia PDF Downloads 275
1063 Treatment and Conservation of an Antique Stone Stela by Nano Calcium Hydroxide with Nano Silica in Egyptian Museum of Cairo

Authors: Elhussein Ahmed Elsayed

Abstract:

An ancient limestone stela dating back to the epoch of the middle kingdom and displayed in the exhibition hall of the middle kingdom, it was discovered in Lisht in Giza, registered with No. 3045 and as a result of its display in an inappropriate display as a result of the use of natural lighting in the display, Represented in sunlight through windows opened day and night. The alternation of these daily changes between the temperature degrees of night and day, both daily and seasonally, causes the expansion and contraction of the rocks and then weakens their cohesion, causing fragmentation. This is indeed the current situation of this stela displayed in the hall, in addition to the damage and fading of colors, as well as the use of a high-viscosity restoration material in the consolidation that led to the attraction of dust and dirt and its adhesion to the surface. The color faded as a result of the lack of lighting control inside the exhibition hall, the remnants of the existing colors were blurred as a result of applying a consolidation material with a high viscosity, which led to the attraction of dust and dirt, and then blurring the colors on the inscription. Examinations and analyzes were carried out on the block, and the results of the examination with a polarized microscope showed that it is of primitive limestone, which contains fossils and microorganisms, which helps to damage. The analysis using the Raman device also showed that the high-viscosity material used in restoration in the past is Paralloid B72. The stone stela was consolidated by using two materials; Nano calcium hydroxide with Nano silica in the form of (Core-shell) at a concentration of 10% and it was applied using the brush.

Keywords: Egyptian museum, stone stela, treatment, nano materials, nano silica

Procedia PDF Downloads 71
1062 An Investigation on Opportunities and Obstacles on Implementation of Building Information Modelling for Pre-fabrication in Small and Medium Sized Construction Companies in Germany: A Practical Approach

Authors: Nijanthan Mohan, Rolf Gross, Fabian Theis

Abstract:

The conventional method used in the construction industries often resulted in significant rework since most of the decisions were taken onsite under the pressure of project deadlines and also due to the improper information flow, which results in ineffective coordination. However, today’s architecture, engineering, and construction (AEC) stakeholders demand faster and accurate deliverables, efficient buildings, and smart processes, which turns out to be a tall order. Hence, the building information modelling (BIM) concept was developed as a solution to fulfill the above-mentioned necessities. Even though BIM is successfully implemented in most of the world, it is still in the early stages in Germany, since the stakeholders are sceptical of its reliability and efficiency. Due to the huge capital requirement, the small and medium-sized construction companies are still reluctant to implement BIM workflow in their projects. The purpose of this paper is to analyse the opportunities and obstacles to implementing BIM for prefabrication. Among all other advantages of BIM, pre-fabrication is chosen for this paper because it plays a vital role in creating an impact on time as well as cost factors of a construction project. The positive impact of prefabrication can be explicitly observed by the project stakeholders and participants, which enables the breakthrough of the skepticism factor among the small scale construction companies. The analysis consists of the development of a process workflow for implementing prefabrication in building construction, followed by a practical approach, which was executed with two case studies. The first case study represents on-site prefabrication, and the second was done for off-site prefabrication. It was planned in such a way that the first case study gives a first-hand experience for the workers at the site on the BIM model so that they can make much use of the created BIM model, which is a better representation compared to the traditional 2D plan. The main aim of the first case study is to create a belief in the implementation of BIM models, which was succeeded by the execution of offshore prefabrication in the second case study. Based on the case studies, the cost and time analysis was made, and it is inferred that the implementation of BIM for prefabrication can reduce construction time, ensures minimal or no wastes, better accuracy, less problem-solving at the construction site. It is also observed that this process requires more planning time, better communication, and coordination between different disciplines such as mechanical, electrical, plumbing, architecture, etc., which was the major obstacle for successful implementation. This paper was carried out in the perspective of small and medium-sized mechanical contracting companies for the private building sector in Germany.

Keywords: building information modelling, construction wastes, pre-fabrication, small and medium sized company

Procedia PDF Downloads 105
1061 The Role of Semi Open Spaces on Exploitation of Wind-Driven Ventilation

Authors: Paria Saadatjoo

Abstract:

Given that HVAC systems are the main sources of carbon dioxide producers, developing ways to reduce dependence on these systems and making use of natural resources is too important to achieve environmentally friendly buildings. A major part of building potential in terms of using natural energy resources depends on its physical features. So architectural decisions at the first step of the design process can influence the building's energy efficiency significantly. Implementation of semi-open spaces into solid apartment blocks inspired by the concept of courtyard in ancient buildings as a passive cooling strategy is currently enjoying great popularity. However, the analysis of these features and their effect on wind behavior at initial design steps is a difficult task for architects. The main objective of this research was to investigate the influence of semi-open to closed space ratio on airflow patterns in and around midrise buildings and introduce the best ratio in terms of harnessing natural ventilation. The main strategy of this paper was semi-experimental, and the research methodology was descriptive statistics. At the first step, by changing the terrace area, 6 models with various open to closed space ratios were created. These forms were then transferred to CFD software to calculate the primary indicators of natural ventilation potentials such as wind force coefficient, air flow rate, age of air distribution, etc. Investigations indicated that modifying the terrace area and, in other words, the open to closed space ratio influenced the wind force coefficient, airflow rate, and age of air distribution.

Keywords: natural ventilation, wind, midrise, open space, energy

Procedia PDF Downloads 161
1060 Holistic and Naturalistic Traditions of British Hygiene and Medicine, Reflected in E. W. Lane's Hygienic Medicine, 1859

Authors: Min Bae

Abstract:

Hygiene had traditionally meant ways of healthy and right living. However, the nineteenth century was the time when a gradual shift in medical and hygienic paradigms took place from holism to reductionism. Against this medical and social background, E. W. Lane (MD, Edinburgh, 1853) formulated his own medical philosophies in his book Hydropathy: Or Hygienic Medicine (1859). Until the 1880s when he published his last book on the hygienic medicine, he consistently intended to raise the importance of hygienic holism in medicine, while adopting hydropathy as his main therapeutic measure. Lane’s case reflects the mid-nineteenth century trend in which since the 1840s, the rational and holistic facets in medicine had significantly transferred to hydropathy, which was the most naturalistic healing system in the medical market. Hygiene for Lane was no longer the ancient form of ‘six non-naturals’. He emphasised physiology as the rational grounds for his project of the medicalisation of hygiene. His medical philosophy was profoundly naturalistic and holistic against the opposite trend of the contemporary hygiene and medicine. Conflicting aspects may often be best embodied in persons who stood on the boundaries between inside and outside. Lane’s theories on hygienic medicine did not develop into a new medical system which he believed would reconciliate orthodox medicine and hydropathy of his time had also adopted increasingly reductionist approaches since 1860s. Nevertheless, the naturalistic philosophies and approaches in Lane’s hygienic medicine demonstrates a continuous effort for a theoretical reformulation of hydropathy during its stagnant and declining period to constantly fit into the holistic paradigm of medicine and hygiene. Considering the fact that the nature cure concept in hydropathy and its individualistic approach were succeeded by naturopathy at the end of the century, analysis of Lane’s medical thoughts reveals part of a ‘thin red line’ of naturalism in the battleground between reductionism and holism during the nineteenth century in the history of medicine and hygiene.

Keywords: E. W. Lane, hygienic medicine, hydropathy, naturopath

Procedia PDF Downloads 324
1059 The Early Discovery and Confirmation of the Indus Valley Civilization

Authors: Muhammad Ishaqa, Quanchao Zhanga, Qian Wangb

Abstract:

The Indus Valley Civilization is predominantly found in the northeast of Afghanistan, Pakistan, and the northwest of India and is considered one of the four ancient civilizations of the Old World, as well as the first urban civilization in South Asia. In 1920, John Marshall and other archaeologists established the existence of this civilization. Over the course of a century, India and Pakistan have made significant advancements in their joint archaeological investigation and excavation, contributing to the study of the Indus Valley Civilization. Given the importance of early discovery and confirmation of this civilization, our research focuses on the academic history of its archaeology by gathering published research material. Our research begins by collecting research data associated with the Indus Valley Civilization and documenting the process of archaeological investigations and excavations from the 19th century until the present day. We also summarize the archaeological works conducted during different periods. Furthermore, we present the primary academic views on the Indus Civilization from the 19th century until the present, explaining their developmental process and highlighting recent research. This forms a foundation for further study. We discovered that the archaeological research of the Indus Civilization is significantly influenced by Western archaeology and has yet to establish an independent, local research system. We delve into the three primary sites of the Indus Valley Civilization - Harappa, Mohenjo-Daro, and Chanhudaro - discussing their history and archaeological excavation records. Our findings indicate that the Indus Civilization is solely dependent on archaeology, distinguishing it from the Sumerian Civilization and verifying that it originates from the Bronze Age of the Indus Valley. Lastly, we examine the primary academic issues associated with the Indus Civilization in greater depth. These issues include climate environment, political system, primitive religion, and academic contribution.

Keywords: Indus Valley civilization, archaeology, Harappa, Mohenjo-Daro

Procedia PDF Downloads 48
1058 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 494
1057 The Feminine Speech and the Ritual of Death in Albania

Authors: Aida Lamaj

Abstract:

Death is an inevitable phenomenon in our life, in the same way, are also the ritual of death accompanied by the dirge and the keening performed by men. Keening is a phenomenon common among all peoples, the instances in which the ritual of death and keening coincide, as a special phenomenon of its, are numerous given the fact that keening is an outcome of an extremely special emotional state. However, even during the ritual of death, every people try to display through words its qualities, a multitude of characteristics preserved and transmitted with fanaticism from one generation to the other. The ritual of death constitutes an important element of our tradition and at the same time a material always interesting to be studied in minute details. In this study, we have tried to limit ourselves to the feminine speech, since keening, in general in Albania has been carried out by women. Differences and similarities among keening on the national scale, from the diachronic and synchronic point of view, can be seen clearly if we compare the Albanian creations in different regions. The similarities and differences within the Albanian culture serve as a typical paradigm to study how the ancient elements of outlook that the Albanians have had on death, history, and the social organization in these regions have been preserved and transmitted and above all, in what way these feelings have been clothed from the linguistic point of view, the typologies of keening and of all of the ritual of death, which clearly shows archaic forms as well as new developments. These data have been gathered not only by conducting various surveys but also by observing closely the linguistic behavior of women in Albania during the ritual of death. The study has encompassed the popular lyric poetry as well as new entries, whereas from the geographic point of view we focus mainly in the Southern regions, although examples from other regions where Albanian speaking people live are also present. The main results of the study show that women use much more than men dialect form, peripheral language elements and descriptive elements during their speech in the ritual of death.

Keywords: feminine speech in Albania, linguistic characteristics of the dirge, ritual of death, the typologies of keening

Procedia PDF Downloads 158
1056 Designing a Cyclic Redundancy Checker-8 for 32 Bit Input Using VHDL

Authors: Ankit Shai

Abstract:

CRC or Cyclic Redundancy Check is one of the most common, and one of the most powerful error-detecting codes implemented on modern computers. Most of the modern communication protocols use some error detection algorithms in digital networks and storage devices to detect accidental changes to raw data between transmission and reception. Cyclic Redundancy Check, or CRC, is the most popular one among these error detection codes. CRC properties are defined by the generator polynomial length and coefficients. The aim of this project is to implement an efficient FPGA based CRC-8 that accepts a 32 bit input, taking into consideration optimal chip area and high performance, using VHDL. The proposed architecture is implemented on Xilinx ISE Simulator. It is designed while keeping in mind the hardware design, complexity and cost factor.

Keywords: cyclic redundancy checker, CRC-8, 32-bit input, FPGA, VHDL, ModelSim, Xilinx

Procedia PDF Downloads 289
1055 DNA Multiplier: A Design Architecture of a Multiplier Circuit Using DNA Molecules

Authors: Hafiz Md. Hasan Babu, Khandaker Mohammad Mohi Uddin, Nitish Biswas, Sarreha Tasmin Rikta, Nuzmul Hossain Nahid

Abstract:

Nanomedicine and bioengineering use biological systems that can perform computing operations. In a biocomputational circuit, different types of biomolecules and DNA (Deoxyribose Nucleic Acid) are used as active components. DNA computing has the capability of performing parallel processing and a large storage capacity that makes it diverse from other computing systems. In most processors, the multiplier is treated as a core hardware block, and multiplication is one of the time-consuming and lengthy tasks. In this paper, cost-effective DNA multipliers are designed using algorithms of molecular DNA operations with respect to conventional ones. The speed and storage capacity of a DNA multiplier are also much higher than a traditional silicon-based multiplier.

Keywords: biological systems, DNA multiplier, large storage, parallel processing

Procedia PDF Downloads 208
1054 Rail-To-Rail Output Op-Amp Design with Negative Miller Capacitance Compensation

Authors: Muhaned Zaidi, Ian Grout, Abu Khari bin A’ain

Abstract:

In this paper, a two-stage op-amp design is considered using both Miller and negative Miller compensation techniques. The first op-amp design uses Miller compensation around the second amplification stage, whilst the second op-amp design uses negative Miller compensation around the first stage and Miller compensation around the second amplification stage. The aims of this work were to compare the gain and phase margins obtained using the different compensation techniques and identify the ability to choose either compensation technique based on a particular set of design requirements. The two op-amp designs created are based on the same two-stage rail-to-rail output CMOS op-amp architecture where the first stage of the op-amp consists of differential input and cascode circuits, and the second stage is a class AB amplifier. The op-amps have been designed using a 0.35mm CMOS fabrication process.

Keywords: op-amp, rail-to-rail output, Miller compensation, Negative Miller capacitance

Procedia PDF Downloads 333
1053 Development and Acceptance of a Proposed Module for Enhancing the Reading and Writing Skills in Baybayin: The Traditional Writing System in the Philippines

Authors: Maria Venus G. Solares

Abstract:

The ancient Filipinos had their own spelling or alphabet that differed from the modern Roman alphabet brought by the Spaniards. It consists of seventeen letters, three vowels, and fourteen consonants and is called Baybayin. The word Baybayin is a Tagalog word that refers to all the letters used in writing a language, an alphabet; however, it is also a syllable. The House Bill 4395, first proposed by Rep. Leopoldo Bataoil of the second district of Pangasinan in 2011, which later became House Bill 1022 of what he called The Declaration of the Baybayin as the National Writing System of the Philippines, prompted the researcher to conduct a study on the topic. The main objective of this study was to develop and assess the proposed module for enhancing the reading and writing skills in Baybayin of the students. The researchers wanted to ensure the acceptability of the Baybayin using the proposed module and meet the needs of students in developing their ability to read and write Baybayin through the module. The researchers used quasi-experimental research in this study. The data was collected through the initial and final analysis of the students of Adamson University's ABM 1102 using convenient sampling techniques. Based on statistical analysis of data using weighted mean, standard deviation, and paired t-tests, the proposed module helped improve the students' literacy skills, and the response exercises in the proposed module changed the acceptability of the Baybayin in their minds. The study showed that there was an important difference in the scores of students before and after the use of the module. The student's response to the assessment of their reading and writing skills on Baybayin was highly acceptable. This study will help develop the reading and writing skills of the students in Baybayin and teach Baybayin in response to the revival of a part of Philippine culture that has been long forgotten.

Keywords: Baybayin, proposed module, skill, acceptability

Procedia PDF Downloads 131
1052 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 449
1051 Spatial Behavioral Model-Based Dynamic Data-Driven Diagram Information Model

Authors: Chiung-Hui Chen

Abstract:

Diagram and drawing are important ways to communicate and the reproduce of architectural design, Due to the development of information and communication technology, the professional thinking of architecture and interior design are also change rapidly. In development process of design, diagram always play very important role. This study is based on diagram theories, observe and record interaction between man and objects, objects and space, and space and time in a modern nuclear family. Construct a method for diagram to systematically and visualized describe the space plan of a modern nuclear family toward a intelligent design, to assist designer to retrieve information and check/review event pattern of past and present.

Keywords: digital diagram, information model, context aware, data analysis

Procedia PDF Downloads 329
1050 A Prediction Model of Tornado and Its Impact on Architecture Design

Authors: Jialin Wu, Zhiwei Lian, Jieyu Tang, Jingyun Shen

Abstract:

Tornado is a serious and unpredictable natural disaster, which has an important impact on people's production and life. The probability of being hit by tornadoes in China was analyzed considering the principles of tornado formation. Then some suggestions on layout and shapes for newly-built buildings were provided combined with the characteristics of tornado wind fields. Fuzzy clustering and inverse closeness methods were used to evaluate the probability levels of tornado risks in various provinces based on classification and ranking. GIS was adopted to display the results. Finally, wind field single-vortex tornado was studied to discuss the optimized design of rural low-rise houses in Yancheng, Jiangsu as an example. This paper may provide enough data to support building and urban design in some specific regions.

Keywords: tornado probability, computational fluid dynamics, fuzzy mathematics, optimal design

Procedia PDF Downloads 125
1049 Modeling Landscape Performance: Evaluating the Performance Benefits of the Olmsted Brothers’ Proposed Parkway Designs for Los Angeles

Authors: Aaron Liggett

Abstract:

This research focuses on the visionary proposal made by the Olmsted Brothers Landscape Architecture firm in the 1920s for a network of interconnected parkways in Los Angeles. Their envisioned parkways aimed to address environmental and cultural strains by providing green space for recreation, wildlife habitat, and stormwater management while serving as multimodal transportation routes. Although the parkways were never constructed, through an evidence-based approach, this research presents a framework for evaluating the potential functionality and success of the parkways by modeling and visualizing their quantitative and qualitative landscape performance and benefits. Historical documents and innovative digital modeling tools produce detailed analysis, modeling, and visualization of the parkway designs. A set of 1928 construction documents are used to analyze and interpret the design intent of the parkways. Grading plans are digitized in CAD and modeled in Sketchup to produce 3D visualizations of the parkway. Drainage plans are digitized to model stormwater performance. Planting plans are analyzed to model urban forestry and biodiversity. The EPA's Storm Water Management Model (SWMM) predicts runoff quantity and quality. The USDA Forests Service tools evaluate carbon sequestration and air quality. Spatial and overlay analysis techniques are employed to assess urban connectivity and the spatial impacts of the parkway designs. The study reveals how the integration of blue infrastructure, green infrastructure, and transportation infrastructure within the parkway design creates a multifunctional landscape capable of offering alternative spatial and temporal uses. The analysis demonstrates the potential for multiple functional, ecological, aesthetic, and social benefits to be derived from the proposed parkways. The analysis of the Olmsted Brothers' proposed Los Angeles parkways, which predated contemporary ecological design and resiliency practices, demonstrates the potential for providing multiple functional, ecological, aesthetic, and social benefits within urban designs. The findings highlight the importance of integrated blue, green, and transportation infrastructure in creating a multifunctional landscape that simultaneously serves multiple purposes. The research contributes new methods for modeling and visualizing landscape performance benefits, providing insights and techniques for informing future designs and sustainable development strategies.

Keywords: landscape architecture, ecological urban design, greenway, landscape performance

Procedia PDF Downloads 121
1048 3+3 Regional Cooperation Format and the South Caucasus

Authors: Eka Darbaidze

Abstract:

Due to its important geopolitical location and strategic economic situation, the South Caucasus has been a region that has been a crossroads of interests between different states and empires since ancient times. Over the centuries, the forms of international relations with regard to the South Caucasus region have been constantly changing, however, the national interests of the Caucasian nations as well as the interests of the regional hegemonic powers in relation to the countries of the South Caucasus have remained almost unchanged. The conflict-ridden South Caucasus's attempt to create a new format of regional cooperation has a rather rich history, dating back to the collapse of the Soviet Union. However, despite the diversity of initiatives, they do not deviate from the format of political statements and it is natural that the case was never settled before their implementation, as none of the previous cooperation initiatives was able to reach all members of the region. The current regional co-operation platform is linked to the name of Turkish President Recep Tayyip Erdogan, who spoke out about the initiative during a visit to Azerbaijan. The so-called 3 + 3 platform for regional cooperation involves cooperation between three countries in the South Caucasus (Armenia, Azerbaijan and Georgia) and three "big neighbors" - Russia, Turkey and Iran. Very soon, the initiative received a positive response from the authorities of Azerbaijan, Iran and Armenia. According to them, this cooperation platform will strengthen cooperation between the countries involved in the regional platform and will focus on security, economic and transport issues. Our goal is to determine the interests of the main regional actors involved in the South Caucasus Cooperation Platform (3 + 3): Iran, Russia and Turkey. Our goal is also to determine what threats, risks or benefits may be associated with the involvement of the three countries of the South Caucasus: Azerbaijan, Armenia and Georgia in this platform and what will be the consequences for Georgia, whose 20% of its internationally recognized borders are still occupied by Russia and whose territory is still under creeping occupation.

Keywords: South Caucasus, Georgia's interest, the interests of Iran, the interests of Turkey, Russian interests, Georgia's occupation

Procedia PDF Downloads 197
1047 Tourism Industry, Cultural Exchange Affect on Public and International Health Status

Authors: Farshad Kalantari

Abstract:

Tourism industry has gained a progressive trend within the past years, which affect the cultural exchange among different nations. It is obvious that each country has its own culture, heritage and history, which can be manifested in the population lifestyle and pattern of living. the lifestyle can be considered as an indicator for health status, as the culture may affect way of living, which known as lifestyle and its components, including dietary pattern, physical activity status and other social behaviours. As a result, it seems that each culture can transfer the lifestyle to other societies by international communications. Moreover, different regions and countries may benefit from natural resources, which can be a leading cause for tourist attraction, in the other words, natural resources and culture, can affect the tourist turnover in a region, and as a result, it can be hypothesised that it may affect the exchange of lifestyle including dietary pattern and physical activity. In the positive way, this can make a region to health pole for other nationalities to gain benefit from that culture in order to improve their quality of life and health status. In this paper has aimed to assess the effect of culture and heritage on tourism rate and the effect of natural resources along with cultural lifestyle on public health and international exchange between other regions. It was hypothesised that by using culture in a positive manner, positive aspect of lifestyle, including ancient physical activity patter, can be transfer and exchange with other regions, which can improve health status as a result. Moreover, it was focused on how to design and recruit strategies to improve the way of gaining benefits from resources and lifestyle in order to improve tourism industry and its rate, which may bring beneficial outcomes, including financial, cultural and health outcomes.

Keywords: toursim, health, culture, sport, lifestyle

Procedia PDF Downloads 57
1046 An Integrated CFD and Experimental Analysis on Double-Skin Window

Authors: Sheam-Chyun Lin, Wei-Kai Chen, Hung-Cheng Yen, Yung-Jen Cheng, Yu-Cheng Chen

Abstract:

Result from the constant dwindle in natural resources, the alternative way to reduce the costs in our daily life would be urgent to be found in the near future. As the ancient technique based on the theory of solar chimney since roman times, the double-skin façade are simply composed of two large glass panels in purpose of daylighting and also natural ventilation in the daytime. Double-skin façade is generally installed on the exterior side of buildings as function as the window, so there’s always a huge amount of passive solar energy the façade would receive to induce the airflow every sunny day. Therefore this article imposes a domestic double-skin window for residential usage and attempts to improve the volume flow rate inside the cavity between the panels by the frame geometry design, the installation of outlet guide plate and the solar energy collection system. Note that the numerical analyses are applied to investigate the characteristics of flow field, and the boundary conditions in the simulation are totally based on the practical experiment of the original prototype. Then we redesign the prototype from the knowledge of the numerical results and fluid dynamic theory, and later the experiments of modified prototype will be conducted to verify the simulation results. The velocities at the inlet of each case are increase by 5%, 45% and 15% from the experimental data, and also the numerical simulation results reported 20% improvement in volume flow rate both for the frame geometry design and installation of outlet guide plate.

Keywords: solar energy, double-skin façades, thermal buoyancy, fluid machinery

Procedia PDF Downloads 489
1045 Cortex-M3 Based Virtual Platform Implementation for Software Development

Authors: Jun Young Moon, Hyeonggeon Lee, Jong Tae Kim

Abstract:

In this paper, we present Cortex-M3 based virtual platform which can virtualize wearable hardware platform and evaluate hardware performance. Cortex-M3 is very popular microcontroller in wearable devices, hardware sensors and display devices. This platform can be used to implement software layer for specific hardware architecture. By using the proposed platform the software development process can be parallelized with hardware development process. We present internal mechanism to implement the proposed virtual platform and describe how to use the proposed platform to develop software by using case study which is low cost wearable device that uses Cortex-M3.

Keywords: electronic system level design, software development, virtual platform, wearable device

Procedia PDF Downloads 368
1044 Another Beautiful Sounds: Building the Memory of Sound of Peddling in Beijing with Digital Technology

Authors: Dan Wang, Qing Ma, Xiaodan Wang, Tianjiao Qi

Abstract:

The sound of peddling in Beijing, also called “yo-heave-ho” or “cry of one's ware”, is a unique folk culture and usually found in Beijing hutong. For the civilians in Beijing, sound of peddling is part of their childhood. And for those who love the traditional culture of Beijing, it is an old song singing the local conditions and customs of the ancient city. For example, because of his great appreciation, the British poet Osbert Stewart once put sound of peddling which he had heard in Beijing as a street orchestra performance in the article named "Beijing's sound and color".This research aims to collect and integrate the voice/photo resources and historical materials of sound concerning peddling in Beijing by digital technology in order to protect the intangible cultural heritage and pass on the city memory. With the goal in mind, the next stage is to collect and record all the materials and resources based on the historical documents study and interviews with civilians or performers. Then set up a metadata scheme (which refers to the domestic and international standards such as "Audio Data Processing Standards in the National Library", DC, VRA, and CDWA, etc.) to describe, process and organize the sound of peddling into a database. In order to fully show the traditional culture of sound of peddling in Beijing, web design and GIS technology are utilized to establish a website and plan holding offline exhibitions and events for people to simulate and learn the sound of peddling by using VR/AR technology. All resources are opened to the public and civilians can share the digital memory through not only the offline experiential activities, but also the online interaction. With all the attempts, a multi-media narrative platform has been established to multi-dimensionally record the sound of peddling in old Beijing with text, images, audio, video and so on.

Keywords: sound of peddling, GIS, metadata scheme, VR/AR technology

Procedia PDF Downloads 299
1043 Streaming Communication Component for Multi-Robots

Authors: George Oliveira, Luana D. Fronza, Luiza Medeiros, Patricia D. M. Plentz

Abstract:

The research presented in this article is part of a wide project that proposes a scheduling system for multi-robots in intelligent warehouses employing multi-robot path-planning (MPP) and multi-robot task allocation (MRTA) to reconcile multiple restrictions (task delivery time, task priorities, charging capacity, and robots battery capacity). We present the software component capable of interconnecting an open streaming processing architecture and robot operating system (ROS), ensuring communication and message exchange between robots and the environment in which they are inserted. Simulation results show the good performance of our proposed technique for connecting ROS and streaming platforms.

Keywords: complex distributed systems, mobile robots, smart warehouses, streaming platforms

Procedia PDF Downloads 181
1042 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 445
1041 Self-Organization-Based Approach for Embedded Real-Time System Design

Authors: S. S. Bendib, L. W. Mouss, S. Kalla

Abstract:

This paper proposes a self-organization-based approach for real-time systems design. The addressed issue is the mapping of an application onto an architecture of heterogeneous processors while optimizing both makespan and reliability. Since this problem is NP-hard, a heuristic algorithm is used to obtain efficiently approximate solutions. The proposed approach takes into consideration the quality as well as the diversity of solutions. Indeed, an alternate treatment of the two objectives allows to produce solutions of good quality while a self-organization approach based on the neighborhood structure is used to reorganize solutions and consequently to enhance their diversity. Produced solutions make different compromises between the makespan and the reliability giving the user the possibility to select the solution suited to his (her) needs.

Keywords: embedded real-time systems design, makespan, reliability, self-organization, compromises

Procedia PDF Downloads 130
1040 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 469