Search results for: rail transport infrastructure
2369 Key Roles of the N-Type Oxide Layer in Hybrid Perovskite Solar Cells
Authors: Thierry Pauporté
Abstract:
Wide bandgap n-type oxide layers (TiO2, SnO2, ZnO etc.) play key roles in perovskite solar cells. They act as electron transport layers, and they permit the charge separation. They are also the substrate for the preparation of perovskite in the direct architecture. Therefore, they have a strong influence on the perovskite loading, its crystallinity and they can induce a degradation phenomenon upon annealing. The interface between the oxide and the perovskite is important, and the quality of this heterointerface must be optimized to limit the recombination of charges phenomena and performance losses. One can also play on the oxide and use two oxide contact layers for improving the device stability and durability. These aspects will be developed and illustrated on the basis of recent results obtained at Chimie-ParisTech.Keywords: oxide, hybrid perovskite, solar cells, impedance
Procedia PDF Downloads 3172368 The Application of Hellomac Rockfall Alert System in Rockfall Barriers: An Explainer
Authors: Kinjal Parmar, Matteo Lelli
Abstract:
The usage of IoT technology as a rockfall alert system is relatively new. This paper explains the potential of such an alert system called HelloMac from Maccaferri which provides transportation infrastructure asset owners the way to effectively utilize their resources in the detection of boulder impacts on rockfall barriers. This would ensure a faster assessment of the impacted barrier and subsequently facilitates the implementation of remedial works in an effective and timely manner. In addition, the HelloMac can also be integrated with another warning system to alert vehicle users of the unseen dangers ahead. HelloMac is developed to work also in remote areas, where cell coverage is not available. User gets notified when a rockfall even occurs via mobile app, SMS and email. Using such alarming systems effectively, we can reduce the risk of rockfall hazard.Keywords: rockfall, barrier, HelloMac, rockfall alert system
Procedia PDF Downloads 522367 Temperature Dependent Magneto-Transport Properties of MnAl Binary Alloy Thin Films
Authors: Vineet Barwal, Sajid Husain, Nanhe Kumar Gupta, Soumyarup Hait, Sujeet Chaudhary
Abstract:
High perpendicular magnetic anisotropy (PMA) and low damping constant (α) in ferromagnets are one of the few necessary requirements for their potential applications in the field of spintronics. In this regards, ferromagnetic τ-phase of MnAl possesses the highest PMA (Ku > 107 erg/cc) at room temperature, high saturation magnetization (Ms~800 emu/cc) and a Curie temperature of ~395K. In this work, we have investigated the magnetotransport behaviour of this potentially useful binary system MnₓAl₁₋ₓ films were synthesized by co-sputtering (pulsed DC magnetron sputtering) on Si/SiO₂ (where SiO₂ is native oxide layer) substrate using 99.99% pure Mn and Al sputtering targets. Films of constant thickness (~25 nm) were deposited at the different growth temperature (Tₛ) viz. 30, 300, 400, 500, and 600 ºC with a deposition rate of ~5 nm/min. Prior to deposition, the chamber was pumped down to a base pressure of 2×10⁻⁷ Torr. During sputtering, the chamber was maintained at a pressure of 3.5×10⁻³ Torr with the 55 sccm Ar flow rate. Films were not capped for the purpose of electronic transport measurement, which leaves a possibility of metal oxide formation on the surface of MnAl (both Mn and Al have an affinity towards oxide formation). In-plane and out-of-plane transverse magnetoresistance (MR) measurements on films sputtered under optimized growth conditions revealed non-saturating behavior with MR values ~6% and 40% at 9T, respectively at 275 K. Resistivity shows a parabolic dependence on the field H, when the H is weak. At higher H, non-saturating positive MR that increases exponentially with the strength of magnetic field is observed, a typical character of hopping type conduction mechanism. An anomalous decrease in MR is observed on lowering the temperature. From the temperature dependence of reistivity, it is inferred that the two competing states are metallic and semiconducting, respectively and the energy scale of the phenomenon produces the most interesting effects, i.e., the metal-insulator transition and hence the maximum sensitivity to external fields, at room temperature. Theory of disordered 3D systems effectively explains the crossover temperature coefficient of resistivity from positive to negative with lowering of temperature. These preliminary findings on the MR behavior of MnAl thin films will be presented in detail. The anomalous large MR in mixed phase MnAl system is evidently useful for future spintronic applications.Keywords: magnetoresistance, perpendicular magnetic anisotropy, spintronics, thin films
Procedia PDF Downloads 1252366 Mountain Architectural Design Under the Concept of Pedestrian-oriented Cities: Taking Bai Xiang Ju as an Example
Authors: Xiaohan Wang
Abstract:
In the rapid urbanization process, urban design concepts are shifting towards people-oriented approaches. Emphasizing the pedestrian experience promotes urban livability and sustainable development. In mountainous cities, the inconvenience of transportation caused by complex terrain makes pedestrian-friendly architectural design one of the entry points for problem-solving. This paper mainly takes the high-rise residential area of Bai Xiang Ju in Chongqing as an example to explore the architectural design strategies of mountainous cities under the concept of pedestrian-oriented urban design, providing valuable references and insights for similar urban architectural designs.Keywords: pedestrian city, Bai Xiang Ju, mountain architecture, pedestrian infrastructure, pedestrian-oriented design
Procedia PDF Downloads 62365 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time
Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi
Abstract:
MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.Keywords: DSR, OLSR, quality of service, routing protocols, MANET
Procedia PDF Downloads 5522364 Design and Analysis for a 4-Stage Crash Energy Management System for Railway Vehicles
Authors: Ziwen Fang, Jianran Wang, Hongtao Liu, Weiguo Kong, Kefei Wang, Qi Luo, Haifeng Hong
Abstract:
A 4-stage crash energy management (CEM) system for subway rail vehicles used by Massachusetts Bay Transportation Authority (MBTA) in the USA is developed in this paper. The 4 stages of this new CEM system include 1) energy absorbing coupler (draft gear and shear bolts), 2) primary energy absorbers (aluminum honeycomb structured box), 3) secondary energy absorbers (crush tube), and 4) collision post and corner post. A sliding anti-climber and a fixed anti-climber are designed at the front of the vehicle cooperating with the 4-stage CEM to maximize the energy to be absorbed and minimize the damage to passengers and crews. In order to investigate the effectiveness of this CEM system, both finite element (FE) methods and crashworthiness test have been employed. The whole vehicle consists of 3 married pairs, i.e., six cars. In the FE approach, full-scale railway car models are developed and different collision cases such as a single moving car impacting a rigid wall, two moving cars into a rigid wall, two moving cars into two stationary cars, six moving cars into six stationary cars and so on are investigated. The FE analysis results show that the railway vehicle incorporating this CEM system has a superior crashworthiness performance. In the crashworthiness test, a simplified vehicle front end including the sliding anti-climber, the fixed anti-climber, the primary energy absorbers, the secondary energy absorber, the collision post and the corner post is built and impacted to a rigid wall. The same test model is also analyzed in the FE and the results such as crushing force, stress, and strain of critical components, acceleration and velocity curves are compared and studied. FE results show very good comparison to the test results.Keywords: railway vehicle collision, crash energy management design, finite element method, crashworthiness test
Procedia PDF Downloads 4042363 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product
Authors: Tanawat Hongthai, Dusit Thanapatay
Abstract:
This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC
Procedia PDF Downloads 2812362 The Analysis of Movement Pattern during Reach and Grasp in Stroke Patients: A Kinematic Approach
Authors: Hyo Seon Choi, Ju Sun Kim, DY Kim
Abstract:
Introduction: This study was aimed to evaluate temporo-spatial patterns during the reach and grasp task in hemiplegic stroke patients and to identify movement pattern according to severity of motor impairment. Method: 29 subacute post-stroke patients were enrolled in this study. The temporo-spatial and kinematic data were obtained during reach and grasp task through 3D motion analysis (VICON). The reach and grasp task was composed of four sub-tasks: reach (T1), transport to mouth (T2), transport back to table (T3) and return (T4). The movement time, joint angle and sum of deviation angles from normative data were compared between affected side and unaffected side. They were also compared between two groups (mild to moderate group: 28~66, severe group: 0~27) divided by upper-Fugl-Meyer Assessment (FMA) scale. Result: In affected side, total time and durations of all four tasks were significantly longer than those in unaffected side (p < 0.001). The affected side demonstrated significant larger shoulder abduction, shoulder internal rotation, wrist flexion, wrist pronation, thoracic external rotation and smaller shoulder flexion during reach and grasp task (p < 0.05). The significant differences between mild to moderate group and severe group were observed in total duration, durations of T1, T2, and T3 in reach and grasp task (p < 0.01). The severe group showed significant larger shoulder internal rotation during T2 (p < 0.05) and wrist flexion during T2, T3 (p < 0.05) than mild to moderate group. In range of motion during each task, shoulder abduction-adduction during T2 and T3, shoulder internal-external rotation during T2, elbow flexion-extension during T1 showed significant difference between two groups (p < 0.05). The severe group had significant larger total deviation angles in shoulder internal-external rotation and wrist extension-flexion during reach and grasp task (p < 0.05). Conclusion: This study suggests that post-stroke hemiplegic patients have an unique temporo-spatial and kinematic patterns during reach and grasp task, and the movement pattern may be related to affected upper limb severity. These results may be useful to interpret the motion of upper extremity in stroke patients.Keywords: Fugl-Meyer Assessment (FMA), motion analysis, reach and grasp, stroke
Procedia PDF Downloads 2392361 Development of a Mathematical Model to Characterize the Oil Production in the Federal Republic of Nigeria Environment
Authors: Paul C. Njoku, Archana Swati Njoku
Abstract:
The study deals with the development of a mathematical model to characterize the oil production in Nigeria. This is calculated by initiating the dynamics of oil production in million barrels revenue plan cost of oil production in million nairas and unit cost of production from 1974-1982 in the contest of the federal Republic of Nigeria. This country export oil to other countries as well as importing specialized crude. The transport network from origin/destination tij to pairs is taking into account simulation runs, optimization have been considered in this study.Keywords: mathematical oil model development dynamics, Nigeria, characterization barrels, dynamics of oil production
Procedia PDF Downloads 3872360 ISIS and Its Impact on Geographical Change in Iraq’s Population
Authors: Pshtiwan Shafiq Ahmed
Abstract:
The invasion of Iraq was a turning point in Iraq, destroying the economic infrastructure of several important strategic and historic cities, including Mosul, Anbar and Diyala, which will take decades to rebuild It left 18,805 people dead and 37,000 injured, destroying hundreds of villages and cities, displacing 2.3 million people, and increasing the number of orphans The increase in the number of windows and the destruction of society and the structure of the population so that the number of children, women and the elderly has increased. Religious clashes have increased and religious cleansing has begun, trying to eradicate Christianity, Yazidis and Kakais from the whole of Iraq, causing the largest number of Christians, Yazidis and Kakais to leave Iraq and many of them went missing.Keywords: ISIS, population change, geographical change, Iraq
Procedia PDF Downloads 922359 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 2862358 Influence of Acceptor Dopant on the Physicochemical and Transport Properties of Textured BaCe0.5Zr0.3ln0.2O3−Δ Materials (Ln = Yb, Y, Cd, Sm, Nd)
Authors: J. Lyagaeva, D. Medvedev, A. Brouzgou, A. Demin, P. Tsiakaras
Abstract:
The investigation of highly conductive and chemically stable electrolytes for solid oxide fuel cells (SOFC) is a necessity. The aim of the present work is to study the influence of acceptor dopant on the functional properties of textured BaCe0.5Zr0.3Ln0.2O3−δ (Ln = Yb, Y, Gd, Sm, Nd) ceramics. The X-Ray diffraction analysis, scanning electron microscopy, dilatometry and 4-probe dc method of conductivity measurements were used. It was found that the mean grain size of ceramics increases (from 1.4 to 3.2 μm), thermal expansion coefficient grows (from 7.6•10–6 to 10.7•10–6 К–1), but ionic conductivity decreases (from 14 to 3 mS cm–1 at 900°С), when ionic radii of impurity acceptor increases from 0.868 Å (Yb3+) to 0.983 Å (Nd3+).Keywords: acceptor dopant, crystal structure, proton-conducting, SOFC
Procedia PDF Downloads 3712357 Investigating the Problems in Landscape Design Education in Selcuk University Agriculture Faculty Landscape Architecture Department (Konya-Turkey)
Authors: Banu Ozturk Kurtaslan, Ruhugul Ozge Ocak
Abstract:
In this study, educational problems related to landscape design education which is an important study area of landscape architecture discipline. It is important to research about the problems in S.U. Agriculture Faculty Landscape Architecture Department which is a new department, started its B.Sc. education in 2011; and developing some suggestions on this issue in terms of future of the department. In the context of the study a questionnaire has been developed to conduct to the B.Sc. students. The questions has been prepared under the topics of education program, instructor, student, physical infrastructure and other problems.Keywords: landscape design, landscape design education, problems, Selcuk University Landscape Architecture Department
Procedia PDF Downloads 5032356 Hypersonic Propulsion Requirements for Sustained Hypersonic Flight for Air Transportation
Authors: James Rate, Apostolos Pesiridis
Abstract:
In this paper, the propulsion requirements required to achieve sustained hypersonic flight for commercial air transportation are evaluated. In addition, a design methodology is developed and used to determine the propulsive capabilities of both ramjet and scramjet engines. Twelve configurations are proposed for hypersonic flight using varying combinations of turbojet, turbofan, ramjet and scramjet engines. The optimal configuration was determined based on how well each of the configurations met the projected requirements for hypersonic commercial transport. The configurations were separated into four sub-configurations each comprising of three unique derivations. The first sub-configuration comprised four afterburning turbojets and either one or two ramjets idealised for Mach 5 cruise. The number of ramjets required was dependent on the thrust required to accelerate the vehicle from a speed where the turbojets cut out to Mach 5 cruise. The second comprised four afterburning turbojets and either one or two scramjets, similar to the first configuration. The third used four turbojets, one scramjet and one ramjet to aid acceleration from Mach 3 to Mach 5. The fourth configuration was the same as the third, but instead of turbojets, it implemented turbofan engines for the preliminary acceleration of the vehicle. From calculations which determined the fuel consumption at incremental Mach numbers this paper found that the ideal solution would require four turbojet engines and two Scramjet engines. The ideal mission profile was determined as being an 8000km sortie based on an averaging of popular long haul flights with strong business ties, which included Los Angeles to Tokyo, London to New York and Dubai to Beijing. This paper deemed that these routes would benefit from hypersonic transport links based on the previously mentioned factors. This paper has found that this configuration would be sufficient for the 8000km flight to be completed in approximately two and a half hours and would consume less fuel than Concord in doing so. However, this propulsion configuration still result in a greater fuel cost than a conventional passenger. In this regard, this investigation contributes towards the specification of the engine requirements throughout a mission profile for a hypersonic passenger vehicle. A number of assumptions have had to be made for this theoretical approach but the authors believe that this investigation lays the groundwork for appropriate framing of the propulsion requirements for sustained hypersonic flight for commercial air transportation. Despite this, it does serve as a crucial step in the development of the propulsion systems required for hypersonic commercial air transportation. This paper provides a methodology and a focus for the development of the propulsion systems that would be required for sustained hypersonic flight for commercial air transportation.Keywords: hypersonic, ramjet, propulsion, Scramjet, Turbojet, turbofan
Procedia PDF Downloads 3202355 Effect of Cloud Computing on Enterprises
Authors: Amir Rashid
Abstract:
Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS
Procedia PDF Downloads 3422354 Big Data Strategy for Telco: Network Transformation
Abstract:
Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.Keywords: big data, next generation networks, network transformation, strategy
Procedia PDF Downloads 3612353 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network
Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola
Abstract:
Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques
Procedia PDF Downloads 3862352 An Efficiency Measurement of E-Government Performance for United Nation Ranking Index
Authors: Yassine Jadi, Lin Jie
Abstract:
In order to serve the society in an electronic manner, many developing countries have launched tremendous e-government projects. The strategies of development and implementation e-government system have reached different levels, and to ensure consistency of development, the governments need to evaluate e-government performance. The United nation has design e-government development ranking index (EGDI) that rely on three indexes, Online service index (OSI), Telecommunication Infrastructure index (TII), and human capital index( HCI) which are not reflecting the interaction between a government and their citizens. Based on data envelopment analyses (DEA) technique, we are using E-participating index (EPI) as an output of government effort to evaluate the performance of e-government system. Therefore, the ranking index can be achieved in efficiency manner.Keywords: e-government, DEA, efficiency measurement, EGDI
Procedia PDF Downloads 3762351 Reforms in China's Vaccine Administration: Vulnerabilities, Legislative Progresses and the Systemic View of Vaccine Administration Law
Authors: Lin Tang, Xiaoxia Guo, Lingling Zhang
Abstract:
Recent vaccine scandals overshadowed China’s accomplishment of public health, triggering discussions on the causes of vaccine incidents. Through legal interpretation of selected vaccine incidents and analysis of systemic vulnerabilities in vaccine circulation and lot release, a panoramic review of legislative progresses in the vaccine administration sheds the light on this debate. In essence, it is the combination of the lagging legal system and the absence of information technology infrastructure in the process of vaccine administration reform that has led to the recurrence of vaccine incidents. These findings have significant implications for further improvement of vaccine administration and China’s participation in global healthcare.Keywords: legislation, lot release, public health, reform, vaccine administration, vaccine circulation
Procedia PDF Downloads 1542350 Method for Controlling the Groundwater Polluted by the Surface Waters through Injection Wells
Authors: Victorita Radulescu
Abstract:
Introduction: The optimum exploitation of agricultural land in the presence of an aquifer polluted by the surface sources requires close monitoring of groundwater level in both periods of intense irrigation and in absence of the irrigations, in times of drought. Currently in Romania, in the south part of the country, the Baragan area, many agricultural lands are confronted with the risk of groundwater pollution in the absence of systematic irrigation, correlated with the climate changes. Basic Methods: The non-steady flow of the groundwater from an aquifer can be described by the Bousinesq’s partial differential equation. The finite element method was used, applied to the porous media needed for the water mass balance equation. By the proper structure of the initial and boundary conditions may be modeled the flow in drainage or injection systems of wells, according to the period of irrigation or prolonged drought. The boundary conditions consist of the groundwater levels required at margins of the analyzed area, in conformity to the reality of the pollutant emissaries, following the method of the double steps. Major Findings/Results: The drainage condition is equivalent to operating regimes on the two or three rows of wells, negative, as to assure the pollutant transport, modeled with the variable flow in groups of two adjacent nodes. In order to obtain the level of the water table, in accordance with the real constraints, are needed, for example, to be restricted its top level below of an imposed value, required in each node. The objective function consists of a sum of the absolute values of differences of the infiltration flow rates, increased by a large penalty factor when there are positive values of pollutant. In these conditions, a balanced structure of the pollutant concentration is maintained in the groundwater. The spatial coordinates represent the modified parameters during the process of optimization and the drainage flows through wells. Conclusions: The presented calculation scheme was applied to an area having a cross-section of 50 km between two emissaries with various levels of altitude and different values of pollution. The input data were correlated with the measurements made in-situ, such as the level of the bedrock, the grain size of the field, the slope, etc. This method of calculation can also be extended to determine the variation of the groundwater in the aquifer following the flood wave propagation in envoys.Keywords: environmental protection, infiltrations, numerical modeling, pollutant transport through soils
Procedia PDF Downloads 1562349 Cross-Cultural Psychiatry: An Analysis of Mental Health Care Accessibility and Societal Attitudes in South Asia and the USA
Authors: Irfan Khan, Chiemeka David Ekene Arize, Hilly Swami
Abstract:
Mental health care access and stigma present global challenges, with disparities significantly influenced by economic, cultural, and societal factors. This paper focuses on the mental health care systems of South Asia and the United States, comparing how cultural norms, infrastructure, and policy affect mental health care accessibility and effectiveness in both regions. In South Asia, mental health care is hindered by a combination of underfunding, a critical shortage of professionals, and deeply ingrained cultural stigmas that deter help-seeking. Traditional beliefs often link mental disorders to supernatural causes, and women face additional barriers due to gender disparities. Despite recent policy reforms, implementation remains a challenge, particularly in rural areas. In contrast, the U.S. has a more developed healthcare infrastructure but continues to grapple with stigma, particularly within professional settings like law enforcement. Interventions such as the use of community health workers (CHWs) and collaborative care models have improved access, especially among underserved populations. However, the U.S. still faces disparities in care for minority groups, where cultural competence and stigma reduction are critical for improving outcomes. The paper’s comparative analysis identifies transferable strategies from the U.S. that could be adapted to South Asia’s context, such as integrating mental health care into primary care and using digital interventions to bridge the treatment gap in rural areas. Additionally, South Asia's community-centered approaches offer insights that could enhance the cultural adaptability of interventions in the U.S., particularly for ethnic minorities and immigrant populations. Through a systematic review, this paper examines intervention strategies, stigma, policy support, and the cultural and social determinants of mental health in both regions. The findings emphasize the need for culturally tailored mental health interventions and policy reforms that promote access and reduce stigma. Recommendations include enhancing public awareness, integrating mental health services into primary care, expanding community-based programs, and leveraging digital health interventions. This research contributes to the global discourse on mental health by highlighting culturally sensitive approaches that can be adapted to improve mental health care access and outcomes in both South Asia and the United States.Keywords: mental health stigma South Asia, mental health care accessibility South Asia, cultural influences mental health South Asia, mental health interventions USA, cross-cultural mental health care
Procedia PDF Downloads 322348 Integrated Geophysical Surveys for Sinkhole and Subsidence Vulnerability Assessment, in the West Rand Area of Johannesburg
Authors: Ramoshweu Melvin Sethobya, Emmanuel Chirenje, Mihlali Hobo, Simon Sebothoma
Abstract:
The recent surge in residential infrastructure development around the metropolitan areas of South Africa has necessitated conditions for thorough geotechnical assessments to be conducted prior to site developments to ensure human and infrastructure safety. This paper appraises the success in the application of multi-method geophysical techniques for the delineation of sinkhole vulnerability in a residential landscape. Geophysical techniques ERT, MASW, VES, Magnetics and gravity surveys were conducted to assist in mapping sinkhole vulnerability, using an existing sinkhole as a constraint at Venterspost town, West of Johannesburg city. A combination of different geophysical techniques and results integration from those proved to be useful in the delineation of the lithologic succession around sinkhole locality, and determining the geotechnical characteristics of each layer for its contribution to the development of sinkholes, subsidence and cavities at the vicinity of the site. Study results have also assisted in the determination of the possible depth extension of the currently existing sinkhole and the location of sites where other similar karstic features and sinkholes could form. Results of the ERT, VES and MASW surveys have uncovered dolomitic bedrock at varying depths around the sites, which exhibits high resistivity values in the range 2500-8000ohm.m and corresponding high velocities in the range 1000-2400 m/s. The dolomite layer was found to be overlain by a weathered chert-poor dolomite layer, which has resistivities between the range 250-2400ohm.m, and velocities ranging from 500-600m/s, from which the large sinkhole has been found to collapse/ cave in. A compiled 2.5D high resolution Shear Wave Velocity (Vs) map of the study area was created using 2D profiles of MASW data, offering insights into the prevailing lithological setup conducive for formation various types of karstic features around the site. 3D magnetic models of the site highlighted the regions of possible subsurface interconnections between the currently existing large sinkhole and the other subsidence feature at the site. A number of depth slices were used to detail the conditions near the sinkhole as depth increases. Gravity surveys results mapped the possible formational pathways for development of new karstic features around the site. Combination and correlation of different geophysical techniques proved useful in delineation of the site geotechnical characteristics and mapping the possible depth extend of the currently existing sinkhole.Keywords: resistivity, magnetics, sinkhole, gravity, karst, delineation, VES
Procedia PDF Downloads 812347 Analysis of the Homogeneous Turbulence Structure in Uniformly Sheared Bubbly Flow Using First and Second Order Turbulence Closures
Authors: Hela Ayeb Mrabtini, Ghazi Bellakhal, Jamel Chahed
Abstract:
The presence of the dispersed phase in gas-liquid bubbly flow considerably alters the liquid turbulence. The bubbles induce turbulent fluctuations that enhance the global liquid turbulence level and alter the mechanisms of turbulence. RANS modeling of uniformly sheared flows on an isolated sphere centered in a control volume is performed using first and second order turbulence closures. The sphere is placed in the production-dissipation equilibrium zone where the liquid velocity is set equal to the relative velocity of the bubbles. The void fraction is determined by the ratio between the sphere volume and the control volume. The analysis of the turbulence statistics on the control volume provides numerical results that are interpreted with regard to the effect of the bubbles wakes on the turbulence structure in uniformly sheared bubbly flow. We assumed for this purpose that at low void fraction where there is no hydrodynamic interaction between the bubbles, the single-phase flow simulation on an isolated sphere is representative on statistical average of a sphere network. The numerical simulations were firstly validated against the experimental data of bubbly homogeneous turbulence with constant shear and then extended to produce numerical results for a wide range of shear rates from 0 to 10 s^-1. These results are compared with our turbulence closure proposed for gas-liquid bubbly flows. In this closure, the turbulent stress tensor in the liquid is split into a turbulent dissipative part produced by the gradient of the mean velocity which also contains the turbulence generated in the bubble wakes and a pseudo-turbulent non-dissipative part induced by the bubbles displacements. Each part is determined by a specific transport equation. The simulations of uniformly sheared flows on an isolated sphere reproduce the mechanisms related to the turbulent part, and the numerical results are in perfect accordance with the modeling of the transport equation of the turbulent part. The reduction of second order turbulence closure provides a description of the modification of turbulence structure by the bubbles presence using a dimensionless number expressed in terms of two-time scales characterizing the turbulence induced by the shear and that induced by bubbles displacements. The numerical simulations carried out in the framework of a comprehensive analysis reproduce particularly the attenuation of the turbulent friction showed in the experimental results of bubbly homogeneous turbulence subjected to a constant shear.Keywords: gas-liquid bubbly flows, homogeneous turbulence, turbulence closure, uniform shear
Procedia PDF Downloads 4632346 Supergranulation and Its Turbulent Convection
Authors: U. Paniveni
Abstract:
A few parameters of supergranular cells are studied using intensity patterns from the Kodaikanal Solar Observatory and Dopplergrams from SOHO. The turbulent aspect of the solar supergranulation is established by examining the interrelationships amongst the parameters characterizing a supergranular cell, namely size, lifetime, area, perimeter, fractal dimension, and horizontal flow velocity. The complexity of supergranular cells depicted by their fractal dimension is indicative of their non-laminar characteristics. The findings corroborate Kolmogorov’s theory of turbulence. Some parameters of supergranular cells also show a latitudinal dependence. Supergranulation is a synonym of convective phenomenon and hence can shed light on the physical conditions in the convection zone of the Sun. It plays a major role in the transport and dispersal of magnetic fields that may have a relation to the phases of the solar cycle.Keywords: sun, granulation, convection, turbulence
Procedia PDF Downloads 422345 Investigation of Optical Requirements for Power System Assets Monitoring with Unmanned Aerial Vehicles
Authors: Ioana Pisica, Dimitrios Gkritzapis
Abstract:
The significance of UAS in scientific applications has been amply demonstrated in recent years. The combinations of portability and quasi-static positioning by means of flying in close loop path make them versatile and efficient in the inspection of power systems infrastructure. In this paper, we critically assess several platforms and sensor capabilities to identify their pros and cons in relation to the power systems assets to be monitored. In this respect, it is paramount the flights to be conducted by using UAS which bear certain suitable features, such as responsive and easy control, video capturing in real time, autonomous routing of pre-planned flight programming with differentiating payloads. The outcome of this research is a set of optimal requirements for power system assets monitoring with UAS.Keywords: platforms, power system, sensors, UAVs
Procedia PDF Downloads 2872344 A Study on the Non-Destructive Test Characterization of Carbon Fiber Reinforced Plastics Using Thermo-Graphic Camera
Authors: Hee Jae Shin, In Pyo Cha, Min Sang Lee, Hyun Kyung Yoon, Tae Ho Kim, Yoon Sun Lee, Lee Ku Kwac, Hong Gun Kim
Abstract:
Non-destructive testing and evaluation techniques for assessing the integrity of composite structures are essential to both reduce manufacturing costs and out of service time of transport means due to maintenance. In this study, Analyze into non-destructive test characterization of carbon fiber reinforced plastics(CFRP) internal and external defects using thermo-graphic camera and transient thermography method. non-destructive testing were characterized by defect size(∅8,∅10,∅12,∅14) and depth(1.2mm,2.4mm).Keywords: Non-Destructive Test (NDT), thermal characteristic, thermographic camera, Carbon Fiber Reinforced Plastics(CFRP).
Procedia PDF Downloads 5362343 Ensuring Sustainable Urban Mobility in Indian Cities: Need for Creating People Friendly Roadside Public Spaces
Authors: Pushplata Garg
Abstract:
Mobility, is an integral part of living and sustainability of urban mobility, is essential not only for, but also for addressing global warming and climate change. However, very little is understood about the obstacles/hurdles and likely challenges in the success of plans for sustainable urban mobility in Indian cities from the public perspective. Whereas some of the problems and issues are common to all cities, others vary considerably with financial status, function, the size of cities and culture of a place. Problems and issues similar in all cities relate to availability, efficiency and safety of public transport, last mile connectivity, universal accessibility, and essential planning and design requirements of pedestrians and cyclists are same. However, certain aspects like the type of means of public transportation, priority for cycling and walking, type of roadside activities, are influenced by the size of the town, average educational and income level of public, financial status of the local authorities, and culture of a place. The extent of public awareness, civic sense, maintenance of public spaces and law enforcement vary significantly from large metropolitan cities to small and medium towns in countries like India. Besides, design requirements for shading, location of public open spaces and sitting areas, street furniture, landscaping also vary depending on the climate of the place. Last mile connectivity plays a major role in success/ effectiveness of public transport system in a city. In addition to the provision of pedestrian footpaths connecting important destinations, sitting spaces and necessary amenities/facilities along footpaths; pedestrian movement to public transit stations is encouraged by the presence of quality roadside public spaces. It is not only the visual attractiveness of streetscape or landscape or the public open spaces along pedestrian movement channels but the activities along that make a street vibrant and attractive. These along with adequate spaces to rest and relax encourage people to walk as is observed in cities with successful public transportation systems. The paper discusses problems and issues of pedestrians for last mile connectivity in the context of Delhi, Chandigarh, Gurgaon, and Roorkee- four Indian cities representing varying urban contexts, that is, of metropolitan, large and small cities.Keywords: pedestrianisation, roadside public spaces, last mile connectivity, sustainable urban mobility
Procedia PDF Downloads 2532342 Towards a Common Architecture for Cloud Computing Interoperability
Authors: Sana Kouchi, Hassina Nacer, Kadda Beghdad-bey
Abstract:
Cloud computing is growing very fast in the market and has become one of the most controversial discussed developments in recent years. Cloud computing providers become very numerous in these areas and each of them prefers its own cloud computing infrastructure, due to the incompatibility of standards and cloud access formats, which prevents them from accepting to support cloud computing applications in a standardized manner, this heterogeneity creates the problem of interoperability between clouds, and considering that cloud customers are probably in search of an interoperable cloud computing, where they will have total control over their applications and simply migrate their services as needed, without additional development investment. A cloud federation strategy should be considered. In this article, we propose a common architecture for the cloud that is based on existing architectures and also the use of best practices from ICT frameworks, such as IBM, ITIL, NIST, etc., to address the interoperability of architectures issues in a multi-cloud system.Keywords: cloud computing, reference architecture, interoperability, standard
Procedia PDF Downloads 1742341 A Study on Big Data Analytics, Applications and Challenges
Authors: Chhavi Rana
Abstract:
The aim of the paper is to highlight the existing development in the field of big data analytics. Applications like bioinformatics, smart infrastructure projects, Healthcare, and business intelligence contain voluminous and incremental data, which is hard to organise and analyse and can be dealt with using the framework and model in this field of study. An organization's decision-making strategy can be enhanced using big data analytics and applying different machine learning techniques and statistical tools on such complex data sets that will consequently make better things for society. This paper reviews the current state of the art in this field of study as well as different application domains of big data analytics. It also elaborates on various frameworks in the process of Analysis using different machine-learning techniques. Finally, the paper concludes by stating different challenges and issues raised in existing research.Keywords: big data, big data analytics, machine learning, review
Procedia PDF Downloads 862340 A Study on Big Data Analytics, Applications, and Challenges
Authors: Chhavi Rana
Abstract:
The aim of the paper is to highlight the existing development in the field of big data analytics. Applications like bioinformatics, smart infrastructure projects, healthcare, and business intelligence contain voluminous and incremental data which is hard to organise and analyse and can be dealt with using the framework and model in this field of study. An organisation decision-making strategy can be enhanced by using big data analytics and applying different machine learning techniques and statistical tools to such complex data sets that will consequently make better things for society. This paper reviews the current state of the art in this field of study as well as different application domains of big data analytics. It also elaborates various frameworks in the process of analysis using different machine learning techniques. Finally, the paper concludes by stating different challenges and issues raised in existing research.Keywords: big data, big data analytics, machine learning, review
Procedia PDF Downloads 95