Search results for: tightly coupled memory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2732

Search results for: tightly coupled memory

1532 Corrosion Protection of Structural Steel by Surfactant Containing Reagents

Authors: D. Erdenechimeg, T. Bujinlkham, N. Erdenepurev

Abstract:

The anti-corrosion performance of fatty acid coated mild steel samples is studied. Samples of structural steel coated with collector reagents deposited from surfactant in ethanol solution and overcoated with an epoxy barrier paint. A quantitative corrosion rate was determined by linear polarization resistance method using biopotentiostat/galvanostat 400. Coating morphology was determined by scanning electronic microscopy. A test for hydrophobic surface of steel by surfactant was done. From the samples, the main component or high content iron was determined by chemical method and other metal contents were determined by Inductively Coupled Plasma-Optical Emission Spectrometry (ICP-OES) method. Prior to measuring the corrosion rate, mechanical and chemical treatments were performed to prepare the test specimens. Overcoating the metal samples with epoxy barrier paint after exposing them with surfactant the corrosion rate can be inhibited by 34-35 µm/year.

Keywords: corrosion, linear polarization resistance, coating, surfactant

Procedia PDF Downloads 99
1531 Unsteadiness Effects on Variable Thrust Nozzle Performance

Authors: A. M. Tahsini, S. Tadayon Mousavi

Abstract:

The purpose of this paper is to elucidate the flow unsteady behavior for moving plug in convergent-divergent variable thrust nozzle. Compressible axisymmetric Navier-Stokes equations are used to study this physical phenomenon. Different velocities are set for plug to investigate the effect of plug movement on flow unsteadiness. Variation of mass flow rate and thrust are compared under two conditions: First, the plug is placed at different positions and flow is simulated to reach the steady state (quasi steady simulation) and second, the plug is moved with assigned velocity and flow simulation is coupled with plug movement (unsteady simulation). If plug speed is high enough and its movement time scale is at the same order of the flow time scale, variation of the mass flow rate and thrust level versus plug position demonstrate a vital discrepancy under the quasi steady and unsteady conditions. This phenomenon should be considered especially from response time viewpoints in thrusters design.

Keywords: nozzle, numerical study, unsteady, variable thrust

Procedia PDF Downloads 349
1530 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 398
1529 Transforming Water-Energy-Gas Industry through Smart Metering and Blockchain Technology

Authors: Khoi A. Nguyen, Rodney A. Stewart, Hong Zhang

Abstract:

Advanced metering technologies coupled with informatics creates an opportunity to form digital multi-utility service providers. These providers will be able to concurrently collect a customers’ medium-high resolution water, electricity and gas demand data and provide user-friendly platforms to feed this information back to customers and supply/distribution utility organisations. With the emergence of blockchain technology, a new research area has been explored which helps bring this multi-utility service provider concept to a much higher level. This study aims at introducing a breakthrough system architecture where smart metering technology in water, energy, and gas (WEG) are combined with blockchain technology to provide customer a novel real-time consumption report and decentralized resource trading platform. A pilot study on 4 properties in Australia has been undertaken to demonstrate this system, where benefits for customers and utilities are undeniable.

Keywords: blockchain, digital multi-utility, end use, demand forecasting

Procedia PDF Downloads 171
1528 Investigating the Online Effect of Language on Gesture in Advanced Bilinguals of Two Structurally Different Languages in Comparison to L1 Native Speakers of L2 and Explores Whether Bilinguals Will Follow Target L2 Patterns in Speech and Co-speech

Authors: Armita Ghobadi, Samantha Emerson, Seyda Ozcaliskan

Abstract:

Being a bilingual involves mastery of both speech and gesture patterns in a second language (L2). We know from earlier work in first language (L1) production contexts that speech and co-speech gesture form a tightly integrated system: co-speech gesture mirrors the patterns observed in speech, suggesting an online effect of language on nonverbal representation of events in gesture during the act of speaking (i.e., “thinking for speaking”). Relatively less is known about the online effect of language on gesture in bilinguals speaking structurally different languages. The few existing studies—mostly with small sample sizes—suggests inconclusive findings: some show greater achievement of L2 patterns in gesture with more advanced L2 speech production, while others show preferences for L1 gesture patterns even in advanced bilinguals. In this study, we focus on advanced bilingual speakers of two structurally different languages (Spanish L1 with English L2) in comparison to L1 English speakers. We ask whether bilingual speakers will follow target L2 patterns not only in speech but also in gesture, or alternatively, follow L2 patterns in speech but resort to L1 patterns in gesture. We examined this question by studying speech and gestures produced by 23 advanced adult Spanish (L1)-English (L2) bilinguals (Mage=22; SD=7) and 23 monolingual English speakers (Mage=20; SD=2). Participants were shown 16 animated motion event scenes that included distinct manner and path components (e.g., "run over the bridge"). We recorded and transcribed all participant responses for speech and segmented it into sentence units that included at least one motion verb and its associated arguments. We also coded all gestures that accompanied each sentence unit. We focused on motion event descriptions as it shows strong crosslinguistic differences in the packaging of motion elements in speech and co-speech gesture in first language production contexts. English speakers synthesize manner and path into a single clause or gesture (he runs over the bridge; running fingers forward), while Spanish speakers express each component separately (manner-only: el corre=he is running; circle arms next to body conveying running; path-only: el cruza el puente=he crosses the bridge; trace finger forward conveying trajectory). We tallied all responses by group and packaging type, separately for speech and co-speech gesture. Our preliminary results (n=4/group) showed that productions in English L1 and Spanish L1 differed, with greater preference for conflated packaging in L1 English and separated packaging in L1 Spanish—a pattern that was also largely evident in co-speech gesture. Bilinguals’ production in L2 English, however, followed the patterns of the target language in speech—with greater preference for conflated packaging—but not in gesture. Bilinguals used separated and conflated strategies in gesture in roughly similar rates in their L2 English, showing an effect of both L1 and L2 on co-speech gesture. Our results suggest that online production of L2 language has more limited effects on L2 gestures and that mastery of native-like patterns in L2 gesture might take longer than native-like L2 speech patterns.

Keywords: bilingualism, cross-linguistic variation, gesture, second language acquisition, thinking for speaking hypothesis

Procedia PDF Downloads 76
1527 Organizational Climate being Knowledge Sharing Oriented: A Fuzzy-Set Analysis

Authors: Paulo Lopes Henriques, Carla Curado

Abstract:

According to literature, knowledge sharing behaviors are influenced by organizational values and structures, namely organizational climate. The manuscript examines the antecedents of the knowledge sharing oriented organizational climate. According to theoretical expectations the study adopts the following explanatory conditions: knowledge sharing costs, knowledge sharing incentives, perceptions of knowledge sharing contributing to performance and tenure. The study confronts results considering two groups of firms: nondigital (firms without intranet) vs digital (firms with intranet). The paper applies fsQCA technique to analyze data by using fsQCA 2.5 software (www.fsqca.com) testing several conditional arguments to explain the outcome variable. Main results strengthen claims on the relevancy of the contribution of knowledge sharing to performance. Secondly, evidence brings tenure - an explanatory condition that is associated to organizational memory – to the spotlight. The study provides an original contribution not previously addressed in literature, since it identifies the sufficient conditions sets to knowledge sharing oriented organizational climate using fsQCA, which is, to our knowledge, a novel application of the technique.

Keywords: fsQCA, knowledge sharing oriented organizational climate, knowledge sharing costs, knowledge sharing incentives

Procedia PDF Downloads 328
1526 Rapid Generation of Octagonal Pyramids on Silicon Wafer for Photovoltaics by Swift Anisotropic Chemical Etching Process

Authors: Sami Iqbal, Azam Hussain, Weiping Wu, Guo Xinli, Tong Zhang

Abstract:

A novel octagonal upright micro-pyramid structure was generated by wet chemical anisotropic etching on a monocrystalline silicon wafer (100). The primary objectives are to reduce front surface reflectance of silicon wafers, improve wettability, enhance surface morphology, and maximize the area coverage by generated octagonal pyramids. Under rigorous control and observation, the etching process' response time was maintained precisely. The experimental outcomes show a significant decrease in the optical surface reflectance of silicon wafers, with the lowest reflectance of 8.98%, as well as enhanced surface structure, periodicity, and surface area coverage of more than 85%. The octagonal silicon pyramid was formed with a high etch rate of 0.41 um/min and a much shorter reaction time with the addition of hydrofluoric acid coupled with magnetic stirring (mechanical agitation) at 300 rpm.

Keywords: octagonal pyramids, rapid etching, solar cells, surface engineering, surface reflectance

Procedia PDF Downloads 101
1525 The Sectoral Differences in the Use of Construction Incentive

Authors: Qiuwen Ma, Sai On Cheung

Abstract:

Incentive contracting has been developed to push the agent team for extra effort. Generally, there are three types of incentive arrangement, namely incentive/penalty for super performance/underperformance, risk/reward sharing and future business opportunities. It is found that there are significant differences in the use of incentive arrangement in private and public projects. In Hong Kong, very few public projects have used future business as incentivizer whereas private developers often signal repeated business coupled with heavy penalty. This study was conducted to identify various attributes affecting the use of I/D in both private and public engineering sectors of Hong Kong. The diverging preferences were unveiled with reference to a literature review and semi-structured interviews with industry experts. The findings reveal the public/private sectors would consider the implementation issues regarding the various performance targets. The most deterministic factor for the public sector is about accountability. The private sector is in general skeptical about the need to provide extra for the contractors for what they have already contracted to perform.

Keywords: construction incentive, public/private projects, semi-structured interview, hong kong

Procedia PDF Downloads 102
1524 Divorce for Iranian-Canadian Women: A Life and Death Matter

Authors: Shila Khayambashi

Abstract:

Iran’s long history of patriarchy, coupled with the devaluation of women’s rights after Iran’s Islamic revolution of 1979, has subjected Iranian women to different forms of domestic abuse. Upon their migration, however, many Iranian women end their abusive relationship by filing for divorce. In many instances, leaving the abusive environment exposes these Iranian women to more dangerous circumstances. Iranian diasporic community has witnessed several domestically-charged fatalities in the past few years after the abused wives either ended their violent marriages or attempted to establish some control in their marital relationships. While the casualties have been reported in Iranian new media and press, the Canadian media failed to pay much attention to any of these cases. In this paper, I examine the post-migratory factors that encourage the abused Iranian women to leave their abusers after years of endurance. Additionally, I indicate the roles of organizational and governmental support for minority women who decide to terminate their violent relationships. I will also explore how the Canadian media outlets circumvent and ignore the cases of these minority victims.

Keywords: women's right, Divorce, Patriarchy, Domestic Abuse

Procedia PDF Downloads 134
1523 A Design Method for Wind Turbine Blade to Have Uniform Strength and Optimum Power Generation Performance

Authors: Pengfei Liu, Yiyi Xu

Abstract:

There have been substantial incidents of wind turbine blade fractures and failures due to the lack of systematic blade strength design method incorporated with the aerodynamic forces and power generation efficiency. This research was to develop a methodology and procedure for the wind turbine rotor blade strength taking into account the strength, integration, and aerodynamic performance in terms of power generation efficiency. The wind turbine blade designed using this method and procedure will have a uniform strength across the span to save unnecessary thickness in many blade radial locations and yet to maintain the optimum power generation performance. A turbine rotor code, taking into account both aerodynamic and structural properties, was developed. An existing wind turbine blade was used as an example. For a condition of extreme wind speed of 100 km per hour, the design reduced about 19% of material usage while maintaining the optimum power regeneration efficiency.

Keywords: renewable energy, wind turbine, turbine blade strength, aerodynamics-strength coupled optimization

Procedia PDF Downloads 179
1522 Hong Kong Chinese-Speaking Adolescents Diagnosed with Dyslexia: What Is and Is Not Improved?

Authors: Kevin Kien Hoa Chung

Abstract:

The present study was to investigate cognitive-linguistic skills that might distinguish the improved dyslexics from the non-improved dyslexics. Twenty-eight improved dyslexics and 28 non-improved dyslexics were selected from a pool of 254 students diagnosed as dyslexics in Grade 1 to 2. These students were administered measures: morphological skills, visual-orthographic skills, rapid naming skills, working memory, reading comprehension, writing, word reading, word dictation, and one-minute word reading. Findings showed that the improved dyslexics performed better than the non-improved dyslexics in visual-orthographic skills, word reading, one-minute reading, writing, and reading comprehension. Furthermore, the improved dyslexics showed fewer cognitive-linguistic deficits compared with the non-improved dyslexics. Among the 4 cognitive-linguistic measures, morphological skills and visual-orthographic skills showed the greatest power in discriminating the improved and non-improved dyslexics. Results underscore the importance of cognitive-linguistic skills underlying the manifestations of the improved and non-improved dyslexia in Chinese adolescents.

Keywords: adolescents, chinese language, improved dyslexics, non-improved dyslexics

Procedia PDF Downloads 391
1521 Monitoring System for Electronic Procurement Systems

Authors: Abdulah Fajar

Abstract:

Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.

Keywords: procurement system, SNMP, LKPP, LPSE

Procedia PDF Downloads 427
1520 Design, Control and Autonomous Trajectory Tracking of an Octorotor Rotorcraft

Authors: Seyed Jamal Haddadi, M. Reza Mehranpour, Roya Sadat Mortazavi, Zahra Sadat Mortazavi

Abstract:

Principal aim of this research is trajectory tracking, attitude and position control scheme in real flight mode by an Octorotor helicopter. For more stability, in this Unmanned Aerial Vehicle (UAV), number of motors is increased to eight motors which end of each arm installed two coaxial counter rotating motors. Dynamic model of this Octorotor includes of motion equation for translation and rotation. Utilized controller is proportional-integral-derivative (PID) control loop. The proposed controller is designed such that to be able to attenuate an effect of external wind disturbance and guarantee stability in this condition. The trajectory is determined by a Global Positioning System (GPS). Also an ARM CortexM4 is used as microprocessor. Electronic board of this UAV designed as able to records all of the sensors data, similar to an aircraft black box in external memory. Finally after auto landing of Octorotor, flight data is shown in MATLAB software and Experimental results of the proposed controller show the effectiveness of our approach on the Autonomous Quadrotor in real conditions.

Keywords: octorotor, design, PID controller, autonomous, trajectory tracking

Procedia PDF Downloads 304
1519 Dimensioning of a Solar Dryer with Application of an Experiment Design Method for Drying Food Products

Authors: B. Touati, A. Saad, B. Lips, A. Abdenbi, M. Mokhtari.

Abstract:

The purpose of this study is an application of experiment design method for dimensioning of a solar drying system. NIMROD software was used to build up the matrix of experiments and to analyze the results. The software has the advantages of being easy to use and consists of a forced way, with some choices about the number and range of variation of the parameters, and the desired polynomial shape. The first design of experiments performed concern the drying with constant input characteristics of the hot air in the dryer and a second design of experiments in which the drying chamber is coupled with a solar collector. The first design of experiments allows us to study the influence of various parameters and get the studied answers in a polynomial form. The correspondence between the polynomial thus determined, and the model results were good. The results of the polynomials of the second design of experiments and those of the model are worse than the results in the case of drying with constant input conditions. This is due to the strong link between all the input parameters, especially, the surface of the sensor and the drying chamber, and the mass of the product.

Keywords: solar drying, experiment design method, NIMROD, mint leaves

Procedia PDF Downloads 503
1518 Reading Out of Curiosity: Making Undergraduates Competent in English

Authors: Ruwan Gunawardane

Abstract:

Second language teaching and learning is a complex process in which various factors are identified as having a negative impact on the competency in English among undergraduates of Sri Lanka. One such issue is the lack of intrinsic motivation among them to learn English despite the fact that they all know the importance of English. This study attempted to ascertain how the intrinsic motivation of undergraduates to learn English can be improved through reading out of curiosity. Humans are curious by nature, and cognitive psychology says that curiosity facilitates learning, memory, and motivation. The researcher carried out this study during the closure of universities due to the outbreak of the coronavirus through ‘Online Reading Café’, an online reading programme introduced by himself. He invited 1166 students of the Faculty of Science, University of Ruhuna, to read 50 articles taken from CNN and the BBC and posted at least two to three articles on the LMS of the faculty almost every day over a period of 23 days. The themes of the articles were based on the universe, exploration of planets, scientific experiments, evolution, etc., and the students were encouraged to collect as many words, phrases, and sentence structures as possible while reading and to form meaningful sentences using them. The data obtained through the students’ feedback was qualitatively analyzed. It was found that these undergraduates were interested in reading something out of curiosity, due to which intrinsic motivation is enhanced, and it facilitates competence in L2.

Keywords: English, competence, reading, curiosity

Procedia PDF Downloads 138
1517 Image Captioning with Vision-Language Models

Authors: Promise Ekpo Osaine, Daniel Melesse

Abstract:

Image captioning is an active area of research in the multi-modal artificial intelligence (AI) community as it connects vision and language understanding, especially in settings where it is required that a model understands the content shown in an image and generates semantically and grammatically correct descriptions. In this project, we followed a standard approach to a deep learning-based image captioning model, injecting architecture for the encoder-decoder setup, where the encoder extracts image features, and the decoder generates a sequence of words that represents the image content. As such, we investigated image encoders, which are ResNet101, InceptionResNetV2, EfficientNetB7, EfficientNetV2M, and CLIP. As a caption generation structure, we explored long short-term memory (LSTM). The CLIP-LSTM model demonstrated superior performance compared to the encoder-decoder models, achieving a BLEU-1 score of 0.904 and a BLEU-4 score of 0.640. Additionally, among the CNN-LSTM models, EfficientNetV2M-LSTM exhibited the highest performance with a BLEU-1 score of 0.896 and a BLEU-4 score of 0.586 while using a single-layer LSTM.

Keywords: multi-modal AI systems, image captioning, encoder, decoder, BLUE score

Procedia PDF Downloads 77
1516 Effects of Daily Temperature Changes on Transient Heat and Moisture Transport in Unsaturated Soils

Authors: Davood Yazdani Cherati, Ali Pak, Mehrdad Jafarzadeh

Abstract:

This research contains the formulation of a two-dimensional analytical solution to transient heat, and moisture flow in a semi-infinite unsaturated soil environment under the influence of daily temperature changes. For this purpose, coupled energy conservation and mass fluid continuity equations governing hydrothermal behavior of unsaturated soil media are presented in terms of temperature and volumetric moisture content. In consideration of the soil environment as an infinite half-space and by linearization of the governing equations, Laplace–Fourier transformation is conducted to convert differential equations with partial derivatives (PDEs) to ordinary differential equations (ODEs). The obtained ODEs are solved, and the inverse transformations are calculated to determine the solution to the system of equations. Results indicate that heat variation induces moisture transport in both horizontal and vertical directions.

Keywords: analytical solution, heat conduction, hydrothermal analysis, laplace–fourier transformation, two-dimensional

Procedia PDF Downloads 216
1515 Preparation and Visible Light Photoactivity of N-Doped ZnO/ZnS Photocatalysts

Authors: Nuray Güy, Mahmut Özacar

Abstract:

Semiconductor nanoparticles such as TiO₂ and ZnO as photocatalysts are very efficient catalysts for wastewater treatment by the chemical utilization of light energy, which is capable of converting the toxic and nonbiodegradable organic compounds into carbon dioxide and mineral acids. ZnO semiconductor has a wide bandgap energy of 3.37 eV and a relatively large exciton binding Energy (60 meV), thus can absorb only UV light with the wavelength equal to or less than 385 nm. It exhibits low efficiency under visible light illumination due to its wide band gap energy. In order to improve photocatalytic activity of ZnO under visible light, band gap of ZnO may be narrowed by doping such as N, C, S nonmetal ions and coupled two separate semiconductors possessing different energy levels for their corresponding conduction and valence bands. ZnS has a wider band gap (Eg=3.7 eV) than ZnO and generates electron–hole pairs by photoexcitation rapidly. In the present work, N doped ZnO/ZnS nano photocatalysts with visible-light response were synthesized by microwave-hydrothermal method using thiourea as N source. The prepared photocatalysts were characterized by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM) and UV–visible (UV–vis). The photocatalytic activities samples and undoped ZnO have been studied for the degradation of dye, and have also been compared with together.

Keywords: photocatalyst, synthesis, visible light, ZnO/ZnS

Procedia PDF Downloads 281
1514 Modeling and Energy Analysis of Limestone Decomposition with Microwave Heating

Authors: Sofia N. Gonçalves, Duarte M. S. Albuquerque, José C. F. Pereira

Abstract:

The energy transition is spurred by structural changes in energy demand, supply, and prices. Microwave technology was first proposed as a faster alternative for cooking food. It was found that food heated instantly when interacting with high-frequency electromagnetic waves. The dielectric properties account for a material’s ability to absorb electromagnetic energy and dissipate this energy in the form of heat. Many energy-intense industries could benefit from electromagnetic heating since many of the raw materials are dielectric at high temperatures. Limestone sedimentary rock is a dielectric material intensively used in the cement industry to produce unslaked lime. A numerical 3D model was implemented in COMSOL Multiphysics to study the limestone continuous processing under microwave heating. The model solves the two-way coupling between the Energy equation and Maxwell’s equations as well as the coupling between heat transfer and chemical interfaces. Complementary, a controller was implemented to optimize the overall heating efficiency and control the numerical model stability. This was done by continuously matching the cavity impedance and predicting the required energy for the system, avoiding energy inefficiencies. This controller was developed in MATLAB and successfully fulfilled all these goals. The limestone load influence on thermal decomposition and overall process efficiency was the main object of this study. The procedure considered the Verification and Validation of the chemical kinetics model separately from the coupled model. The chemical model was found to correctly describe the chosen kinetic equation, and the coupled model successfully solved the equations describing the numerical model. The interaction between flow of material and electric field Poynting vector revealed to influence limestone decomposition, as a result from the low dielectric properties of limestone. The numerical model considered this effect and took advantage from this interaction. The model was demonstrated to be highly unstable when solving non-linear temperature distributions. Limestone has a dielectric loss response that increases with temperature and has low thermal conductivity. For this reason, limestone is prone to produce thermal runaway under electromagnetic heating, as well as numerical model instabilities. Five different scenarios were tested by considering a material fill ratio of 30%, 50%, 65%, 80%, and 100%. Simulating the tube rotation for mixing enhancement was proven to be beneficial and crucial for all loads considered. When uniform temperature distribution is accomplished, the electromagnetic field and material interaction is facilitated. The results pointed out the inefficient development of the electric field within the bed for 30% fill ratio. The thermal efficiency showed the propensity to stabilize around 90%for loads higher than 50%. The process accomplished a maximum microwave efficiency of 75% for the 80% fill ratio, sustaining that the tube has an optimal fill of material. Electric field peak detachment was observed for the case with 100% fill ratio, justifying the lower efficiencies compared to 80%. Microwave technology has been demonstrated to be an important ally for the decarbonization of the cement industry.

Keywords: CFD numerical simulations, efficiency optimization, electromagnetic heating, impedance matching, limestone continuous processing

Procedia PDF Downloads 175
1513 Investigation on the Changes in the Chemical Composition and Ecological State of Soils Contaminated with Heavy Metals

Authors: Metodi Mladenov

Abstract:

Heavy metals contamination of soils is a big problem mainly as a result of industrial production. From this point of view, this is of interests the processes for decontamination of soils for crop of production with low content of heavy metals and suitable for consumption from the animals and the peoples. In the current article, there are presented data for established changes in chemical composition and ecological state on soils contaminated from non-ferrous metallurgy manufacturing, for seven years time period. There was done investigation on alteration of pH, conductivity and contain of the next elements: As, Cd, Cu, Cr, Ni, Pb, Zn, Co, Mn and Al. Also, there was done visual observations under the processes of recovery of root-inhabitable soil layer and reforestation. Obtained data show friendly changes for the investigated indicators pH and conductivity and decreasing of content of some form analyzed elements. Visual observations show augmentation of plant cover areas and change in species structure with increase of number of shrubby and wood specimens.

Keywords: conductivity, contamination of soils, chemical composition, inductively coupled plasma–optical emission spectrometry, heavy metals, visual observation

Procedia PDF Downloads 180
1512 Variations of Metaphors: Wittgenstein's Contribution to Literary Studies

Authors: Dorit Lemberger

Abstract:

Wittgenstein directly used the term "metaphor" only infrequently and with reservations, but his writings include a number of metaphors that have become imprinted in the philosophical memory of Western thought. For example, the ladder in his book Tractatus, or in Philosophical investigations - the ancient city, the beetle in a box, the fly in the fly-bottle, and the duck-rabbit. In light of Wittgenstein's stressing, throughout his investigations, that the only language that exists is ordinary language, and that there is no "second-order" language, the question should be asked: How do these metaphors function, specifically, and in general, how are we to relate to language use that exceeds the normal? Wittgenstein did not disregard such phenomena, but he proposed viewing them in a different way, that would enable understanding them as uses in ordinary language, without necessarily exceeding such language. Two important terms that he coined in this context are "secondary sense" and "experience of meaning". Each denotes language use as reflective of a subjective element characteristic of the speaker, such as intent, experience, or emphasis of a certain aspect. More recent Wittgenstein scholars added the term "quasi-metaphor", that refers to his discussion of the possibility of aesthetic judgment. This paper will examine how, according to Wittgenstein, these terms function without exceeding ordinary language, and will illustrate how they can be applied, in an analysis of the poem "Butterfly" by Nelly Sachs.

Keywords: metaphor, quasi-metaphor, secondary sense, experience of meaning

Procedia PDF Downloads 437
1511 Ultrahigh Thermal Stability of Dielectric Permittivity in 0.6Bi(Mg₁/₂Ti₁/₂)O₃-0.4Ba₀.₈Ca₀.₂(Ti₀.₈₇₅Nb₀.₁₂₅)O₃

Authors: Kaiyuan Chena, Senentxu Lanceros-Méndeza, Laijun Liub, Qi Zhanga

Abstract:

0.6Bi(Mg1/2Ti1/2)O3-0.4Ba0.8Ca0.2(Nb0.125Ti0.875)O3 (0.6BMT-0.4BCNT) ceramics with a pseudo-cubic structure and re-entrant dipole glass behavior have been investigated via X-ray diffraction and dielectric permittivity-temperature spectra. It shows an excellent dielectric-temperature stability with small variations of dielectric permittivity (± 5%, 420 - 802 K) and dielectric loss tangent (tanδ < 2.5%, 441 - 647 K) in a wide temperature range. Three dielectric anomalies are observed from 290 K to 1050 K. The low-temperature weakly coupled re-entrant relaxor behavior was described using Vogel-Fulcher law and the new glass model. The mid- and high-temperature dielectric anomalies are characterized by isothermal impedance and electrical modulus. The activation energy of both dielectric relaxation and conductivity follows the Arrhenius law in the temperature ranges of 633 - 753 K and 833 - 973 K, respectively. The ultrahigh thermal stability of the dielectric permittivity is attributed to the weakly coupling of polar clusters, the formation of diffuse phase transition (DPT) and the local phase transition of calcium-containing perovskite.

Keywords: permittivity, relaxor, electronic ceramics, activation energy

Procedia PDF Downloads 102
1510 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 439
1509 Simulation to Detect Virtual Fractional Flow Reserve in Coronary Artery Idealized Models

Authors: Nabila Jaman, K. E. Hoque, S. Sawall, M. Ferdows

Abstract:

Coronary artery disease (CAD) is one of the most lethal diseases of the cardiovascular diseases. Coronary arteries stenosis and bifurcation angles closely interact for myocardial infarction. We want to use computer-aided design model coupled with computational hemodynamics (CHD) simulation for detecting several types of coronary artery stenosis with different locations in an idealized model for identifying virtual fractional flow reserve (vFFR). The vFFR provides us the information about the severity of stenosis in the computational models. Another goal is that we want to imitate patient-specific computed tomography coronary artery angiography model for constructing our idealized models with different left anterior descending (LAD) and left circumflex (LCx) bifurcation angles. Further, we want to analyze whether the bifurcation angles has an impact on the creation of narrowness in coronary arteries or not. The numerical simulation provides the CHD parameters such as wall shear stress (WSS), velocity magnitude and pressure gradient (PGD) that allow us the information of stenosis condition in the computational domain.

Keywords: CAD, CHD, vFFR, bifurcation angles, coronary stenosis

Procedia PDF Downloads 157
1508 The Effects of Normal Aging on Reasoning Ability: A Dual-Process Approach

Authors: Jamie A. Prowse Turner, Jamie I. D. Campbell, Valerie A. Thompson

Abstract:

The objective of the current research was to use a dual-process theory framework to explain these age-related differences in reasoning. Seventy-two older (M = 80.0 years) and 72 younger (M = 24.6 years) adults were given a variety of reasoning tests (i.e., a syllogistic task, base rate task, the Cognitive Reflection Test, and a perspective manipulation), as well as independent tests of capacity (working memory, processing speed, and inhibition), thinking styles, and metacognitive ability, to account for these age-related differences. It was revealed that age-related differences were limited to problems that required Type 2 processing and were related to differences in cognitive capacity, individual difference factors, and strategy choice. Furthermore, older adults’ performance can be improved by reasoning from another’s’ perspective and cannot, at this time, be explained by metacognitive differences between young and older adults. All of these findings fit well within a dual-process theory of reasoning, which provides an integrative framework accounting for previous findings and the findings presented in the current manuscript.

Keywords: aging, dual-process theory, performance, reasoning ability

Procedia PDF Downloads 191
1507 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 185
1506 A Destination Marketing Study on Capitalising on the Cultural Link between Ireland and North America Using Social Media

Authors: Colm Barcoe, Garvan Whelan

Abstract:

This study examines how a destination marketing organisation can use social media channels to engage the interests of the US and Canadian markets in a way that maximises the number of visits (and revisits) to Ireland. The research reveals how the cultural link between Ireland and North America is exploited through the use of social media strategies. The findings are based on quantitative and qualitative empirical data obtained through a survey of North American holidaymakers in the pre, during and post trip phases coupled with in-depth interviews of 20 industry experts who are responsible for the implementation of relationship marketing strategies for this segment. The qualitative data was analysed using Netnography in order to provide insights into the effectiveness of various social media channels in developing cultural links between Ireland and North American tourists. The findings of this investigation will extend an under-researched body of literature pertaining to Ireland and North America. The empirical evidence of this study will be of value to both academics and industry practitioners.

Keywords: Ireland, marketing, North America, relationship, strategies

Procedia PDF Downloads 184
1505 Parametric Optimization of Wire Electric Discharge Machining (WEDM) for Aluminium Metal Matrix Composites

Authors: G. Rajyalakhmi, C. Karthik, Gerson Desouza, Rimmie Duraisamy

Abstract:

In this present work, metal matrix composites with combination of aluminium with (Sic/Al2O3) were fabricated using stir casting technique. The objective of the present work is to optimize the process parameters of Wire Electric Discharge Machining (WEDM) composites. Pulse ON Time, Pulse OFF Time, wire feed and sensitivity are considered as input process parameters with responses Material Removal Rate (MRR), Surface Roughness (SR) for optimization of WEDM process. Taguchi L18 Orthogonal Array (OA) is used for experimentation. Grey Relational Analysis (GRA) is coupled with Taguchi technique for multiple process parameters optimization. ANOVA (Analysis of Variance) is used for finding the impact of process parameters individually. Finally confirmation experiments were carried out to validate the predicted results.

Keywords: parametric optimization, particulate reinforced metal matrix composites, Taguchi-grey relational analysis, WEDM

Procedia PDF Downloads 581
1504 Steady State Charge Transport in Quantum Dots: Nonequilibrium Green's Function (NEGF) vs. Single Electron Analysis

Authors: Mahesh Koti

Abstract:

In this paper, we present a quantum transport study of a quantum dot in steady state in the presence of static gate potential. We consider a quantum dot coupled to the two metallic leads. The quantum dot under study is modeled through Anderson Impurity Model (AIM) with hopping parameter modulated through voltage drop between leads and the central dot region. Based on the Landauer's formula derived from Nonequilibrium Green's Function and Single Electron Theory, the essential ingredients of transport properties are revealed. We show that the results out of two approaches closely agree with each other. We demonstrate that Landauer current response derived from single electron approach converges with non-zero interaction through gate potential whereas Landauer current response derived from Nonequilibrium Green's Function (NEGF) hits a pole.

Keywords: Anderson impurity model (AIM), nonequilibrium Green's function (NEGF), Landauer's formula, single electron analysis

Procedia PDF Downloads 471
1503 Integrative Omics-Portrayal Disentangles Molecular Heterogeneity and Progression Mechanisms of Cancer

Authors: Binder Hans

Abstract:

Cancer is no longer seen as solely a genetic disease where genetic defects such as mutations and copy number variations affect gene regulation and eventually lead to aberrant cell functioning which can be monitored by transcriptome analysis. It has become obvious that epigenetic alterations represent a further important layer of (de-)regulation of gene activity. For example, aberrant DNA methylation is a hallmark of many cancer types, and methylation patterns were successfully used to subtype cancer heterogeneity. Hence, unraveling the interplay between different omics levels such as genome, transcriptome and epigenome is inevitable for a mechanistic understanding of molecular deregulation causing complex diseases such as cancer. This objective requires powerful downstream integrative bioinformatics methods as an essential prerequisite to discover the whole genome mutational, transcriptome and epigenome landscapes of cancer specimen and to discover cancer genesis, progression and heterogeneity. Basic challenges and tasks arise ‘beyond sequencing’ because of the big size of the data, their complexity, the need to search for hidden structures in the data, for knowledge mining to discover biological function and also systems biology conceptual models to deduce developmental interrelations between different cancer states. These tasks are tightly related to cancer biology as an (epi-)genetic disease giving rise to aberrant genomic regulation under micro-environmental control and clonal evolution which leads to heterogeneous cellular states. Machine learning algorithms such as self organizing maps (SOM) represent one interesting option to tackle these bioinformatics tasks. The SOMmethod enables recognizing complex patterns in large-scale data generated by highthroughput omics technologies. It portrays molecular phenotypes by generating individualized, easy to interpret images of the data landscape in combination with comprehensive analysis options. Our image-based, reductionist machine learning methods provide one interesting perspective how to deal with massive data in the discovery of complex diseases, gliomas, melanomas and colon cancer on molecular level. As an important new challenge, we address the combined portrayal of different omics data such as genome-wide genomic, transcriptomic and methylomic ones. The integrative-omics portrayal approach is based on the joint training of the data and it provides separate personalized data portraits for each patient and data type which can be analyzed by visual inspection as one option. The new method enables an integrative genome-wide view on the omics data types and the underlying regulatory modes. It is applied to high and low-grade gliomas and to melanomas where it disentangles transversal and longitudinal molecular heterogeneity in terms of distinct molecular subtypes and progression paths with prognostic impact.

Keywords: integrative bioinformatics, machine learning, molecular mechanisms of cancer, gliomas and melanomas

Procedia PDF Downloads 148