Search results for: transmission power system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 22935

Search results for: transmission power system

8535 Buzan Mind Mapping: An Efficient Technique for Note-Taking

Authors: T. K. Tee, M. N. A. Azman, S. Mohamed, M. Muhammad, M. M. Mohamad, J. Md Yunos, M. H. Yee, W. Othman

Abstract:

Buzan mind mapping is an efficient system of note-taking that makes revision a fun thing to do for students. Tony Buzan has been teaching children all over the world for the past thirty years and has proved that mind maps are the magic formula in the classroom for everyone. The purpose of this paper is to discuss the importance of Buzan mind mapping as a note-taking technique for the secondary school students. This paper also examines the mind mapping technique, advantages and disadvantages of hand-drawn mind maps. Samples of students’ mind maps were presented and discussed.

Keywords: Buzan mind mapping, note-taking technique, hand-drawn, mind maps

Procedia PDF Downloads 540
8534 Semantic Analysis of the Change in Awareness of Korean College Admission Policy

Authors: Sujin Hwang, Hyerang Park, Hyunchul Kim

Abstract:

The purpose of this study is to find the effectiveness of the admission simplification policy. The number of online news articles about ‘high school record’ was collected and semantically analyzed to identify and analyze the social awareness during 2014 to 2015. The main results of the study are as follows: First, there was a difference in expectations that the burden of the examinees would decrease as announced by KCUE. Thus, there was still a strain on the university entrance exam after the enforcement of the policy. Second, private tutoring is expanding in different forms, rather than reducing the policy. It is different from the prediction that examinees can prepare for university admissions without the private tutoring. Thus, the college admission rules currently enforced needs to be improved. The reasonable college admission system changes are discussed.

Keywords: education policy, private tutoring, shadow education, education admission policy

Procedia PDF Downloads 227
8533 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 166
8532 Computational Analysis of Thermal Degradation in Wind Turbine Spars' Equipotential Bonding Subjected to Lightning Strikes

Authors: Antonio A. M. Laudani, Igor O. Golosnoy, Ole T. Thomsen

Abstract:

Rotor blades of large, modern wind turbines are highly susceptible to downward lightning strikes, as well as to triggering upward lightning; consequently, it is necessary to equip them with an effective lightning protection system (LPS) in order to avoid any damage. The performance of existing LPSs is affected by carbon fibre reinforced polymer (CFRP) structures, which lead to lightning-induced damage in the blades, e.g. via electrical sparks. A solution to prevent internal arcing would be to electrically bond the LPS and the composite structures such that to obtain the same electric potential. Nevertheless, elevated temperatures are achieved at the joint interfaces because of high contact resistance, which melts and vaporises some of the epoxy resin matrix around the bonding. The produced high-pressure gasses open up the bonding and can ignite thermal sparks. The objective of this paper is to predict the current density distribution and the temperature field in the adhesive joint cross-section, in order to check whether the resin pyrolysis temperature is achieved and any damage is expected. The finite element method has been employed to solve both the current and heat transfer problems, which are considered weakly coupled. The mathematical model for electric current includes Maxwell-Ampere equation for induced electric field solved together with current conservation, while the thermal field is found from heat diffusion equation. In this way, the current sub-model calculates Joule heat release for a chosen bonding configuration, whereas the thermal analysis allows to determining threshold values of voltage and current density not to be exceeded in order to maintain the temperature across the joint below the pyrolysis temperature, therefore preventing the occurrence of outgassing. In addition, it provides an indication of the minimal number of bonding points. It is worth to mention that the numerical procedures presented in this study can be tailored and applied to any type of joints other than adhesive ones for wind turbine blades. For instance, they can be applied for lightning protection of aerospace bolted joints. Furthermore, they can even be customized to predict the electromagnetic response under lightning strikes of other wind turbine systems, such as nacelle and hub components.

Keywords: carbon fibre reinforced polymer, equipotential bonding, finite element method, FEM, lightning protection system, LPS, wind turbine blades

Procedia PDF Downloads 165
8531 Measurement and Simulation of Axial Neutron Flux Distribution in Dry Tube of KAMINI Reactor

Authors: Manish Chand, Subhrojit Bagchi, R. Kumar

Abstract:

A new dry tube (DT) has been installed in the tank of KAMINI research reactor, Kalpakkam India. This tube will be used for neutron activation analysis of small to large samples and testing of neutron detectors. DT tube is 375 cm height and 7.5 cm in diameter, located 35 cm away from the core centre. The experimental thermal flux at various axial positions inside the tube has been measured by irradiating the flux monitor (¹⁹⁷Au) at 20kW reactor power. The measured activity of ¹⁹⁸Au and the thermal cross section of ¹⁹⁷Au (n,γ) ¹⁹⁸Au reaction were used for experimental thermal flux measurement. The flux inside the tube varies from 10⁹ to 10¹⁰ and maximum flux was (1.02 ± 0.023) x10¹⁰ n cm⁻²s⁻¹ at 36 cm from the bottom of the tube. The Au and Zr foils without and with cadmium cover of 1-mm thickness were irradiated at the maximum flux position in the DT to find out the irradiation specific input parameters like sub-cadmium to epithermal neutron flux ratio (f) and the epithermal neutron flux shape factor (α). The f value was 143 ± 5, indicates about 99.3% thermal neutron component and α value was -0.2886 ± 0.0125, indicates hard epithermal neutron spectrum due to insufficient moderation. The measured flux profile has been validated using theoretical model of KAMINI reactor through Monte Carlo N-Particle Code (MCNP). In MCNP, the complex geometry of the entire reactor is modelled in 3D, ensuring minimum approximations for all the components. Continuous energy cross-section data from ENDF-B/VII.1 as well as S (α, β) thermal neutron scattering functions are considered. The neutron flux has been estimated at the corresponding axial locations of the DT using mesh tally. The thermal flux obtained from the experiment shows good agreement with the theoretically predicted values by MCNP, it was within ± 10%. It can be concluded that this MCNP model can be utilized for calculating other important parameters like neutron spectra, dose rate, etc. and multi elemental analysis can be carried out by irradiating the sample at maximum flux position using measured f and α parameters by k₀-NAA standardization.

Keywords: neutron flux, neutron activation analysis, neutron flux shape factor, MCNP, Monte Carlo N-Particle Code

Procedia PDF Downloads 165
8530 Contribution of Hydrogen Peroxide in the Selective Aspect of Prostate Cancer Treatment by Cold Atmospheric Plasma

Authors: Maxime Moreau, Silvère Baron, Jean-Marc Lobaccaro, Karine Charlet, Sébastien Menecier, Frédéric Perisse

Abstract:

Cold Atmospheric Plasma (CAP) is an ionized gas generated at atmospheric pressure with the temperature of heavy particles (molecules, ions, atoms) close to the room temperature. Recent studies have shown that both in-vitro and in-vivo plasma exposition to many cancer cell lines are efficient to induce the apoptotic way of cell death. In some other works, normal cell lines seem to be less impacted by plasma than cancer cell lines. This is called selectivity of plasma. It is highly likely that the generated RNOS (Reactive Nitrogen Oxygen Species) in the plasma jet, but also in the medium, play a key-role in this selectivity. In this study, two CAP devices will be compared to electrical power, chemical species composition and their efficiency to kill cancer cells. A particular focus on the action of hydrogen peroxide will be made. The experiments will take place as described next for both devices: electrical and spectroscopic characterization for different voltages, plasma treatment of normal and cancer cells to compare the CAP efficiency between cell lines and to show that death is induced by an oxidative stress. To enlighten the importance of hydrogen peroxide, an inhibitor of H2O2 will be added in cell culture medium before treatment and a comparison will be made between the results of cell viability in this case and those from a simple plasma exposition. Besides, H2O2 production will be measured by only treating medium with plasma. Cell lines will also be exposed to different concentrations of hydrogen peroxide in order to characterize the cytotoxic threshold for cells and to make a comparison with the quantity of H2O2 produced by CAP devices. Finally, the activity of catalase for different cell lines will be quantified. This enzyme is an important antioxidant agent against hydrogen peroxide. A correlation between cells response to plasma exposition and this activity could be a strong argument in favor of the predominant role of H2O2 to explain the selectivity of plasma cancer treatment by cold atmospheric plasma.

Keywords: cold atmospheric plasma, hydrogen peroxide, prostate cancer, selectivity

Procedia PDF Downloads 149
8529 Comparison Analysis of CFD Turbulence Fluid Numerical Study for Quick Coupling

Authors: JoonHo Lee, KyoJin An, JunSu Kim, Young-Chul Park

Abstract:

In this study, the fluid flow characteristics and performance numerical study through CFD model of the Non-split quick coupling for flow control in hydraulic system equipment for the aerospace business group focused to predict. In this study, we considered turbulence models for the application of Computational Fluid Dynamics for the CFD model of the Non-split Quick Coupling for aerospace business. In addition to this, the adequacy of the CFD model were verified by comparing with standard value. Based on this analysis, accurate the fluid flow characteristics can be predicted. It is, therefore, the design of the fluid flow characteristic contribute the reliability for the Quick Coupling which is required in industries on the basis of research results.

Keywords: CFD, FEM, quick coupling, turbulence

Procedia PDF Downloads 385
8528 Interstellar Mission to Wolf 359: Possibilities for the Future

Authors: Rajasekar Anand Thiyagarajan

Abstract:

One of the driving forces of mankind is the “le r`eve d'etoiles" or the “dream of stars", which has been the dynamo of our civilization. Since the beginning of the dawn of the civilization, mankind has looked upon the heavens with wonder and he has tried to understand the meaning of those twinkling lights. As human history has progressed, the understanding of those twinkling lights has progressed, as we now know a lot of information about stars. However, the dream of stars or the dream of reaching those stars always remains within the expectations of mankind. In fact, the needs of the civilization constantly drive for better knowledge and the capability of reaching those stars is one such way that knowledge and exultation can be achieved. This paper takes a futuristic case study of an interstellar mission to Wolf 359, which is approximately 8.3 light years away from us. In terms of galactic distances, 8.3 light years is not much, but as far as present space technology capabilities are concerned, it is next to impossible for us to reach those distances. Several studies have been conducted on various missions to Alpha Centauri and other nearby stars such as Barnard's star and Wolf 359. However, taking a more distant star such as Wolf 359 will help test the mankind's drive for interstellar exploration, as exotic means of travel are needed. This paper will take a futuristic case study of the event and various possibilities of space travel will be discussed in detail. Comprehensive tables and graphs will be given, which will depict the amount of time that will pass at each mode of travel and more importantly some idea on the cost in terms of energy as well as money will be discussed within today's context. In addition, prerequisites to an interstellar mission to Wolf 359 will be given in detail as well as a sample mission which will take place to that particular destination. Even though the possibility of such a mission is probably nonexistent for the 21st century, it is essential to do these exercises so that mankind's understanding of the universe will be increased. In addition, this paper hopes to establish some general guidelines for such an interstellar mission.

Keywords: wolf 359, interstellar mission, alpha centauri, core diameter, core length, reflector thickness enrichment, gas temperature, reflector temperature, power density, mass of the space craft, acceleration of the space craft, time expansion

Procedia PDF Downloads 428
8527 Towards a Conscious Design in AI by Overcoming Dark Patterns

Authors: Ayse Arslan

Abstract:

One of the important elements underpinning a conscious design is the degree of toxicity in communication. This study explores the mechanisms and strategies for identifying toxic content by avoiding dark patterns. Given the breadth of hate and harassment attacks, this study explores a threat model and taxonomy to assist in reasoning about strategies for detection, prevention, mitigation, and recovery. In addition to identifying some relevant techniques such as nudges, automatic detection, or human-ranking, the study suggests the use of major metrics such as the overhead and friction of solutions on platforms and users or balancing false positives (e.g., incorrectly penalizing legitimate users) against false negatives (e.g., users exposed to hate and harassment) to maintain a conscious design towards fairness.

Keywords: AI, ML, algorithms, policy, system design

Procedia PDF Downloads 122
8526 The Application of Data Mining Technology in Building Energy Consumption Data Analysis

Authors: Liang Zhao, Jili Zhang, Chongquan Zhong

Abstract:

Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.

Keywords: data mining, data analysis, prediction, optimization, building operational performance

Procedia PDF Downloads 854
8525 Powering Profits: A Dynamic Approach to Sales Marketing and Electronics

Authors: Muhammad Awais Kiani, Maryam Kiani

Abstract:

This abstract explores the confluence of these two domains and highlights the key factors driving success in sales marketing for electronics. The abstract begins by digging into the ever-evolving landscape of consumer electronics, emphasizing how technological advancements and the growth of smart devices have revolutionized the way people interact with electronics. This paradigm shift has created tremendous opportunities for sales and marketing professionals to engage with consumers on various platforms and channels. Next, the abstract discusses the pivotal role of effective sales marketing strategies in the electronics industry. It highlights the importance of understanding consumer behavior, market trends, and competitive landscapes and how this knowledge enables businesses to tailor their marketing efforts to specific target audiences. Furthermore, the abstract explores the significance of leveraging digital marketing techniques, such as social media advertising, search engine optimization, and influencer partnerships, to establish brand identity and drive sales in the electronics market. It emphasizes the power of storytelling and creating captivating content to engage with tech-savvy consumers. Additionally, the abstract emphasizes the role of customer relationship management (CRM) systems and data analytics in optimizing sales marketing efforts. It highlights the importance of leveraging customer insights and analyzing data to personalize marketing campaigns, enhance customer experience, and ultimately drive sales growth. Lastly, the abstract concludes by underlining the importance of adapting to the ever-changing landscape of the electronics industry. It encourages businesses to embrace innovation, stay informed about emerging technologies, and continuously evolve their sales marketing strategies to meet the evolving needs and expectations of consumers. Overall, this abstract sheds light on the captivating realm of sales marketing in the electronics industry, emphasizing the need for creativity, adaptability, and a deep understanding of consumers to succeed in this rapidly evolving market.

Keywords: marketing industry, electronics, sales impact, e-commerce

Procedia PDF Downloads 75
8524 Features of Annual Junior Men's Kayak Training Loads in China

Authors: Liu Haitao, Wang Hengyong

Abstract:

This paper attempts to kayak, Zhaoqing City, the annual training program for young men, the deconstruction and analysis, describe the characteristics of their training load, Young people to extract the key issues for training kayak, kayak training young people to clarify in Zhaoqing City, and the cause of the bottlenecks. On one hand, scientifically arranging for the coaches to adjust training load and provide the basis for periodic structure, for young people to provide practical reference kayak athletes. On the other hand, through their training load research, enrich the theoretical system kayak training project for junior kayak athletes to provide a theoretical basis.

Keywords: juniors, kayak, training programs, full year

Procedia PDF Downloads 591
8523 Facile Synthesis of Copper Based Nanowires Suitable for Lithium Ion Battery Application

Authors: Zeinab Sanaee, Hossein Jafaripour

Abstract:

Copper is an excellent conductive material that is widely used in the energy devices such as Lithium-ion batteries and supercapacitors as the current collector. On the other hand, copper oxide nanowires have been used in these applications as potential electrode material. In this paper, nanowires of Copper and Copper oxide have been synthesized through a simple and time and cost-effective approach. The thermally grown Copper oxide nanowires have been converted into Copper nanowires through annealing in the Hydrogen atmosphere in a DC-PECVD system. To have a proper Copper nanostructure formation, an Au nanolayer was coated on the surface of Copper oxide nanowires. The results show the successful achievement of Copper nanowires without deformation or cracking. These structures have a great potential for Lithium-ion batteries and supercapacitors.

Keywords: Copper, Copper oxide, nanowires, Hydrogen annealing, Lithium ion battery

Procedia PDF Downloads 88
8522 Tolerating Input Faults in Asynchronous Sequential Machines

Authors: Jung-Min Yang

Abstract:

A method of tolerating input faults for input/state asynchronous sequential machines is proposed. A corrective controller is placed in front of the considered asynchronous machine to realize model matching with a reference model. The value of the external input transmitted to the closed-loop system may change by fault. We address the existence condition for the controller that can counteract adverse effects of any input fault while maintaining the objective of model matching. A design procedure for constructing the controller is outlined. The proposed reachability condition for the controller design is validated in an illustrative example.

Keywords: asynchronous sequential machines, corrective control, fault tolerance, input faults, model matching

Procedia PDF Downloads 424
8521 Determination of Friction and Damping Coefficients of Folded Cover Mechanism Deployed by Torsion Springs

Authors: I. Yilmaz, O. Taga, F. Kosar, O. Keles

Abstract:

In this study, friction and damping coefficients of folded cover mechanism were obtained in accordance with experimental studies and data. Friction and damping coefficients are the most important inputs to accomplish a mechanism analysis. Friction and damping are two objects that change the time of deployment of mechanisms and their dynamic behaviors. Though recommended friction coefficient values exist in literature, damping is differentiating feature according to mechanic systems. So the damping coefficient should be obtained from mechanism test outputs. In this study, the folded cover mechanism use torsion springs for deploying covers that are formerly close folded position. Torsion springs provide folded covers with desirable deploying time according to variable environmental conditions. To verify all design revisions with system tests will be so costly so that some decisions are taken in accordance with numerical methods. In this study, there are two folded covers required to deploy simultaneously. Scotch-yoke and crank-rod mechanisms were combined to deploy folded covers simultaneously. The mechanism was unlocked with a pyrotechnic bolt onto scotch-yoke disc. When pyrotechnic bolt was exploded, torsion springs provided rotational movement for mechanism. Quick motion camera was recording dynamic behaviors of system during deployment case. Dynamic model of mechanism was modeled as rigid body with Adams MBD (multi body dynamics) then torque values provided by torsion springs were used as an input. A well-advised range of friction and damping coefficients were defined in Adams DOE (design of experiment) then a large number of analyses were performed until deployment time of folded covers run in with test data observed in record of quick motion camera, thus the deployment time of mechanism and dynamic behaviors were obtained. Same mechanism was tested with different torsion springs and torque values then outputs were compared with numerical models. According to comparison, it was understood that friction and damping coefficients obtained in this study can be used safely when studying on folded objects required to deploy simultaneously. In addition to model generated with Adams as rigid body the finite element model of folded mechanism was generated with Abaqus then the outputs of rigid body model and finite element model was compared. Finally, the reasonable solutions were suggested about different outputs of these solution methods.

Keywords: damping, friction, pyro-technic, scotch-yoke

Procedia PDF Downloads 326
8520 Plants as Alternative Covers at Contaminated Sites

Authors: M. Grifoni, G. Petruzzelli, M. Barbafieri, I. Rosellini, B. Pezzarossa, F. Pedron

Abstract:

Evapotranspiration (ET) covers are an alternative cover system that utilizes water balance approach to maximize the ET process to reduce the contaminants leaching through the soil profile. Microcosm tests allow to identify in a short time the most suitable plant species to be used as alternative covers, their survival capacity, and simultaneously the transpiration and evaporation rate of the cover in a specific contaminated soil. This work shows the soil characterization and ET results of microcosm tests carried out on two contaminated soils by using Triticum durum and Helianthus annuus species. The data indicated that transpiration was higher than evaporation, supporting the use of plants as alternative cover at this contaminated site.

Keywords: contaminated sites, evapotranspiration cover, evapotranspiration, microcosm experiments

Procedia PDF Downloads 292
8519 Molecular Biomonitoring of Bacterial Pathogens in Wastewater

Authors: Desouky Abd El Haleem, Sahar Zaki

Abstract:

This work was conducted to develop a one-step multiplex PCR system for rapid, sensitive, and specific detection of three different bacterial pathogens, Escherichia coli, Pseudomonas aeruginosa, and Salmonella spp, directly in wastewater without prior isolation on selective media. As a molecular confirmatory test after isolation of the pathogens by classical microbiological methods, PCR-RFLP of their amplified 16S rDNA genes was performed. It was observed that the developed protocols have significance impact in the ability to detect sensitively, rapidly and specifically the three pathogens directly in water within short-time, represents a considerable advancement over more time-consuming and less-sensitive methods for identification and characterization of these kinds of pathogens.

Keywords: multiplex PCR, bacterial pathogens, Escherichia coli, Pseudomonas aeruginosa, Salmonella spp.

Procedia PDF Downloads 452
8518 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0

Authors: Harris Niavis, Dimitra Politaki

Abstract:

The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.

Keywords: blockchain, data quality, industry4.0, product quality

Procedia PDF Downloads 191
8517 Economic Analysis of Policy Instruments for Energy Efficiency

Authors: Etidel Labidi

Abstract:

Energy efficiency improvement is one of the means to reduce energy consumption and carbon emissions. Recently, some developed countries have implemented the tradable white certificate scheme (TWC) as a new policy instrument based on market approach to support energy efficiency improvements. The major focus of this paper is to compare the White Certificates (TWC) scheme as an innovative policy instrument for energy efficiency improvement to other policy instruments: energy taxes and regulations setting a minimum level of energy efficiency. On the basis of our theoretical discussion and numerical simulation, we show that the white certificates system is the most interesting policy instrument for saving energy because it generates the most important level of energy savings and the least increase in energy service price.

Keywords: energy savings, energy efficiency, energy policy, white certificates

Procedia PDF Downloads 335
8516 Temperature Profile Modelling in Flexible Pavement Design

Authors: Csaba Tóth, Éva Lakatos, László Pethő, Seoyoung Cho

Abstract:

The temperature effect on asphalt pavement structure is a crucial factor at the design stage. In this paper, by applying the German guidelines for temperature along the asphalt depth is estimated. The aim is to consider temperature profiles in different seasons in numerical modelling. The model is built with an elastic and isotropic solid element with 19 subdivisions of asphalt layers to reflect the temperature variation. Comparison with the simple three-layer pavement system (asphalt layers, base, and subgrade layers) will be followed to see the difference in result without temperature variation along with the depth. Finally, the fatigue life calculation was checked to prove the validity of the methodology of considering the temperature in the numerical modelling.

Keywords: temperature profile, flexible pavement modeling, finite element method, temperature modeling

Procedia PDF Downloads 271
8515 Some Basic Problems for the Elastic Material with Voids in the Case of Approximation N=1 of Vekua's Theory

Authors: Bakur Gulua

Abstract:

In this work, we consider some boundary value problems for the plate. The plate is the elastic material with voids. The state of plate equilibrium is described by the system of differential equations that is derived from three-dimensional equations of equilibrium of an elastic material with voids (Cowin-Nunziato model) by Vekua's reduction method. Its general solution is represented by means of analytic functions of a complex variable and solutions of Helmholtz equations. The problem is solved analytically by the method of the theory of functions of a complex variable.

Keywords: the elastic material with voids, boundary value problems, Vekua's reduction method, a complex variable

Procedia PDF Downloads 129
8514 Enhancing Healthcare Delivery in Low-Income Markets: An Exploration of Wireless Sensor Network Applications

Authors: Innocent Uzougbo Onwuegbuzie

Abstract:

Healthcare delivery in low-income markets is fraught with numerous challenges, including limited access to essential medical resources, inadequate healthcare infrastructure, and a significant shortage of trained healthcare professionals. These constraints lead to suboptimal health outcomes and a higher incidence of preventable diseases. This paper explores the application of Wireless Sensor Networks (WSNs) as a transformative solution to enhance healthcare delivery in these underserved regions. WSNs, comprising spatially distributed sensor nodes that collect and transmit health-related data, present opportunities to address critical healthcare needs. Leveraging WSN technology facilitates real-time health monitoring and remote diagnostics, enabling continuous patient observation and early detection of medical issues, especially in areas with limited healthcare facilities and professionals. The implementation of WSNs can enhance the overall efficiency of healthcare systems by enabling timely interventions, reducing the strain on healthcare facilities, and optimizing resource allocation. This paper highlights the potential benefits of WSNs in low-income markets, such as cost-effectiveness, increased accessibility, and data-driven decision-making. However, deploying WSNs involves significant challenges, including technical barriers like limited internet connectivity and power supply, alongside concerns about data privacy and security. Moreover, robust infrastructure and adequate training for local healthcare providers are essential for successful implementation. It further examines future directions for WSNs, emphasizing innovation, scalable solutions, and public-private partnerships. By addressing these challenges and harnessing the potential of WSNs, it is possible to revolutionize healthcare delivery and improve health outcomes in low-income markets.

Keywords: wireless sensor networks (WSNs), healthcare delivery, low-Income markets, remote patient monitoring, health data security

Procedia PDF Downloads 39
8513 Decolonial Theorization of Epistemic Agency in Language Policy Management: Case of Plurinational Ecuador

Authors: Magdalena Madany-Saá

Abstract:

This paper compares the language management of two language policies in plurinational Ecuador: (1) mandatory English language teaching that uses Western standards of quality, and (2) indigenous educación intercultural bilingüe, which promotes ancestral knowledge and the indigenous languages of Ecuador. The data are from a comparative institutional ethnography conducted between 2018 and 2022 in English and Kichwa teacher preparation programs in an Ecuadorian teachers’ college. Specifically, the paper explores frameworks of knowledge promoted by different educational actors in both teacher education programs and the ways in which the Ecuadorian transformation towards a knowledge-based economy is intertwined with the country’s linguistic policies. Focusing on the specific role of language advocates and their discursive role in knowledge production, the paper elaborates on the notion of agency in Language Policy and Planning (LPP), referred to as epistemic agency. Specifically, the epistemic agency is conceptualized through the analysis of English language epistemic advocates who participate in empowering English language policies and endorse knowledge production in that language. By proposing an epistemic agency, this paper argues that in the context of knowledge-based societies, advocates are key in transferring the policies from the political to the epistemic realm – where decisions about what counts as legitimate knowledge are made. The study uses the decolonial option as its analytical framework for critiquing the hegemonic perpetuation of modernity and its knowledge-based models in Latin America derived from the colonial matrix of power. Through this theoretical approach, it is argued that if indigenous stakeholders are only viewed as political actors and not as knowledge producers, the hegemony of Global English will reinforce a knowledge-based society constructed upon Global North modernity. In the absence of strong epistemic advocates for indigenous language policies, powerful Global English advocates occupy such vacancies at the language management level, thus dominating the ecology of knowledge in a plurinational and plurilingual Ecuador.

Keywords: educación intercultural bilingüe, English language teaching, epistemic agency, language advocates, plurinationality

Procedia PDF Downloads 38
8512 Mathematical Modeling of Switching Processes in Magnetically Controlled MEMS Switches

Authors: Sergey M. Karabanov, Dmitry V. Suvorov, Dmitry Yu. Tarabrin

Abstract:

The operating principle of magnetically controlled microelectromechanical system (MEMS) switches is based on controlling the beam movement under the influence of a magnetic field. Currently, there is a MEMS switch design with a flexible ferromagnetic electrode in the form of a fixed-terminal beam, with an electrode fastened on a straight or cranked anchor. The basic performance characteristics of magnetically controlled MEMS switches (service life, sensitivity, contact resistance, fast response) are largely determined by the flexible electrode design. To ensure the stable and controlled motion of the flexible electrode, it is necessary to provide the optimal design of a flexible electrode.

Keywords: flexible electrode, magnetically controlled MEMS, mathematical modeling, mechanical stress

Procedia PDF Downloads 181
8511 Towards a Common Architecture for Cloud Computing Interoperability

Authors: Sana Kouchi, Hassina Nacer, Kadda Beghdad-bey

Abstract:

Cloud computing is growing very fast in the market and has become one of the most controversial discussed developments in recent years. Cloud computing providers become very numerous in these areas and each of them prefers its own cloud computing infrastructure, due to the incompatibility of standards and cloud access formats, which prevents them from accepting to support cloud computing applications in a standardized manner, this heterogeneity creates the problem of interoperability between clouds, and considering that cloud customers are probably in search of an interoperable cloud computing, where they will have total control over their applications and simply migrate their services as needed, without additional development investment. A cloud federation strategy should be considered. In this article, we propose a common architecture for the cloud that is based on existing architectures and also the use of best practices from ICT frameworks, such as IBM, ITIL, NIST, etc., to address the interoperability of architectures issues in a multi-cloud system.

Keywords: cloud computing, reference architecture, interoperability, standard

Procedia PDF Downloads 174
8510 Effect of Culture and Parenting Styles on Ambivalent Sexism in Mexican Population

Authors: Ilse Gonzalez-Rivera, Rolando Diaz-Loving

Abstract:

Family, and parents in particular, are the main agents of socialization of children since they transmit values, beliefs, and cultural norms based on their own guidelines, so that children acquire the knowledge on how to interact with others in terms of the interaction with their parents. One way to measure socialization parenting is through parenting styles. Parenting styles are the set of parental behaviors that have a direct effect on the development of specific behaviors of children. The ideal parenting style depends on the cultural characteristics where people develop. In Mexico, the hierarchical structure of the family is built on a model in which men are dominant over women and their power is legitimized. This research explores the effect of parenting styles and the culture of the ambivalent sexism in the Mexican population. 150 men and 150 women participated. The instrument of individualism-collectivism was used to measure culture; participants also answered the instrument of ambivalent sexism and the parenting styles questionnaire. Regression analyses were done using sexism as the dependent variable and individualism-collectivism and parenting styles as independent variables. In addition, an analysis of variance between parental styles and gender of the participants was performed. The results indicate that the permissive style and authoritarian style are predictors of ambivalent sexism and higher levels of collectivism predict higher levels of sexism in both men and women. It is also found that parents tend to use authoritarian parenting style with women and permissive style with males. These results confirm the findings of other studies that indicate that parenting is an important variable that influences the interaction of adults. On the other hand, the effect of collectivism on sexism may be related to the fact that gender Mexican rules are rigid and for people with higher levels of collectivism, the social rules are more important than individual interests. In conclusion, these results indicate that both culture and parenting styles contribute to the maintenance of the status quo and prejudice towards women. Therefore, it is necessary to create proposals that break with this cultural paradigm and to further develop democratic styles of parenting with the aim of reducing prejudice and the legitimization of gender roles.

Keywords: culture, gender, parenting style, sexism

Procedia PDF Downloads 261
8509 Assessing Pain Using Morbid Motion Monitor System in the Pain Management of Nurse Practitioner

Authors: Mohammad Reza Dawoudi

Abstract:

With the increasing rate of patients suffering from chronic pain, several methods for evaluating of chronic pain are suggested. Motion of morbid has been defined as the rate of pine and it is linked with various co-morbid conditions. This study provides a summary of procedure useful to statistics performing direct behavioral observation in hospital settings. We describe the need for and usefulness of comprehensive “morbid motions” observations; provide a primer on the identification, definition, and assessment of morbid behaviors; and outline and discuss specific statistical procedures, including formulating referral motions, describing and conducting the observation. We also provide practical devices for observing and analyzing the obtained information into a report that guides clinical intervention.

Keywords: assessing pain, DNA modeling, image matching technique, pain scale

Procedia PDF Downloads 414
8508 On Cloud Computing: A Review of the Features

Authors: Assem Abdel Hamed Mousa

Abstract:

The Internet of Things probably already influences your life. And if it doesn’t, it soon will, say computer scientists; Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives. Alan Kay of Apple calls this "Third Paradigm" computing. Ubiquitous computing is essentially the term for human interaction with computers in virtually everything. Ubiquitous computing is roughly the opposite of virtual reality. Where virtual reality puts people inside a computer-generated world, ubiquitous computing forces the computer to live out here in the world with people. Virtual reality is primarily a horse power problem; ubiquitous computing is a very difficult integration of human factors, computer science, engineering, and social sciences. The approach: Activate the world. Provide hundreds of wireless computing devices per person per office, of all scales (from 1" displays to wall sized). This has required new work in operating systems, user interfaces, networks, wireless, displays, and many other areas. We call our work "ubiquitous computing". This is different from PDA's, dynabooks, or information at your fingertips. It is invisible; everywhere computing that does not live on a personal device of any sort, but is in the woodwork everywhere. The initial incarnation of ubiquitous computing was in the form of "tabs", "pads", and "boards" built at Xerox PARC, 1988-1994. Several papers describe this work, and there are web pages for the Tabs and for the Boards (which are a commercial product now): Ubiquitous computing will drastically reduce the cost of digital devices and tasks for the average consumer. With labor intensive components such as processors and hard drives stored in the remote data centers powering the cloud , and with pooled resources giving individual consumers the benefits of economies of scale, monthly fees similar to a cable bill for services that feed into a consumer’s phone.

Keywords: internet, cloud computing, ubiquitous computing, big data

Procedia PDF Downloads 384
8507 Experimental Study of the Efficacy and Emission Properties of a Compression Ignition Engine Running on Fuel Additives with Varying Engine Loads

Authors: Faisal Mahroogi, Mahmoud Bady, Yaser H. Alahmadi, Ahmed Alsisi, Sunny Narayan, Muhammad Usman Kaisan

Abstract:

The Kingdom of Saudi Arabia established Saudi Vision 2030, an initiative of the government with the goal of promoting more socioeconomic as well as cultural diversity. The kingdom, which is dedicated to sustainable development and clean energy, uses cutting-edge approaches to address energy-related issues, including the circular carbon economy (CCE) and a more varied energy mix. In order for Saudi Arabia to achieve its Vision 2030 goal of having a net zero future by 2060, sustainability is essential. By addressing the energy and climate issues of the modern world with responsibility and innovation, Vision 2030 is turning into a global role model for the transition to a sustainable future. As per the Ambitions of the National Environment Strategy of the Saudi Ministry of Environment, Agriculture, and Water (MEWA), raising environmental compliance across all sectors and reducing pollution and adverse environmental impacts are critical focus areas. As a result, the current study presents an experimental analysis of the performance and exhaust emissions of a diesel engine running mostly on waste cooking oil (WCO). A one-cylinder direct-injection diesel engine with constant speed and natural aspiration is the engine type utilized. Research was done on how the engine performed and emission parameters when fueled with a mixture of 10% butanol, 10% diesel, 10% WCO, and 10% diethyl ether (D70B10W10DD10). The study's findings demonstrated that engine emissions of nitrogen oxides (NOX) and carbon monoxide (CO) varied significantly depending on the load being applied. The brake thermal efficiency, cylinder pressure, and the brake power of the engine were all impacted by load change.

Keywords: ICE, waste cooking oil, fuel additives, butanol, combustion, emission characteristics

Procedia PDF Downloads 66
8506 Counterfeit Product Detection Using Block Chain

Authors: Sharanya C. H., Pragathi M., Vathsala R. S., Theja K. V., Yashaswini S.

Abstract:

Identifying counterfeit products have become increasingly important in the product manufacturing industries in recent decades. This current ongoing product issue of counterfeiting has an impact on company sales and profits. To address the aforementioned issue, a functional blockchain technology was implemented, which effectively prevents the product from being counterfeited. By utilizing the blockchain technology, consumers are no longer required to rely on third parties to determine the authenticity of the product being purchased. Blockchain is a distributed database that stores data records known as blocks and several databases known as chains across various networks. Counterfeit products are identified using a QR code reader, and the product's QR code is linked to the blockchain management system. It compares the unique code obtained from the customer to the stored unique code to determine whether or not the product is original.

Keywords: blockchain, ethereum, QR code

Procedia PDF Downloads 178