Search results for: technical writing
1246 Social Media as a Source of Radicalization; A Case Study of Pakistan
Authors: Manam Hanfi
Abstract:
Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.Keywords: counter radicalization, extremism, social media, terrorism
Procedia PDF Downloads 1551245 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4051244 A Predictive Analytics Approach to Project Management: Reducing Project Failures in Web and Software Development Projects
Authors: Tazeen Fatima
Abstract:
Use of project management in web & software development projects is very significant. It has been observed that even with the application of effective project management, projects usually do not complete their lifecycle and fail. To minimize these failures, key performance indicators have been introduced in previous studies to counter project failures. However, there are always gaps and problems in the KPIs identified. Despite of incessant efforts at technical and managerial levels, projects still fail. There is no substantial approach to identify and avoid these failures in the very beginning of the project lifecycle. In this study, we aim to answer these research problems by analyzing the concept of predictive analytics which is a specialized technology and is very easy to use in this era of computation. Project organizations can use data gathering, compute power, and modern tools to render efficient Predictions. The research aims to identify such a predictive analytics approach. The core objective of the study was to reduce failures and introduce effective implementation of project management principles. Existing predictive analytics methodologies, tools and solution providers were also analyzed. Relevant data was gathered from projects and was analyzed via predictive techniques to make predictions well advance in time to render effective project management in web & software development industry.Keywords: project management, predictive analytics, predictive analytics methodology, project failures
Procedia PDF Downloads 3471243 Analysis Mechanized Boring (TBM) of Tehran Subway Line 7
Authors: Shahin Shabani, Pouya Pourmadadi
Abstract:
Tunnel boring machines (TBMs) have been used for the construction of various tunnels for mining projects for the purpose of access, conveyance of ore and waste, drainage, exploration, water supply and water diversion. Several mining projects have seen the successful and economic beneficial use of TBMs, and there is an increasing awareness of the benefits of TBMs for mining projects. Key technical considerations for the use of TBMs for the construction of tunnels for mining projects include geological issues (rock type, rock alteration, rock strength, rock abrasivity, durability, ground water inflows), depth of cover and the potential for overstressing/rockbursts, site access and terrain, portal locations, TBM constraints, minimum tunnel size, tunnel support requirements, contractor and labor experience, and project schedule demands. This study focuses on tunnelling mining, with the goal to develop methods and tools to be used to gain understanding of these processes, and to analyze metro of Tehran. The Metro Line 7 of Tehran is one of the Longest (26 Km) and deepest (27m) of projects that’s under implementation. Because of major differences like passing under all geotechnical layers of the town and encountering part of it with underground water table and also using mechanized excavation system, is one of special metro projects.Keywords: TBM, tunnel boring machines economic, metro, line 7
Procedia PDF Downloads 3841242 The Impact of the Knowledge-Sharing Factors on Improving Decision Making at Sultan Qaboos University Libraries
Authors: Aseela Alhinaai, Suliman Abdullah, Adil Albusaidi
Abstract:
Knowledge has been considered an important asset in private and public organizations. It is utilized in the libraries sector to run different operations of technical services and administrative works. As a result, the International Federation of Library Association (IFLA) established a department “Knowledge Management” in December 2003 to provide a deep understanding of the KM concept for professionals. These are implemented through different programs, workshops, and activities. This study aims to identify the impact of the knowledge-sharing factors (technology, collaboration, management support) to improve decision-making at Sultan Qaboos University Libraries. This study conducted a quantitative method using a questionnaire instrument to measure the impact of technology, collaboration, and management support on knowledge sharing that lead to improved decision-making. The study population is the (SQU) libraries (Main Library, Medical Library, College of Economic and political science library, and Art Library). The results showed that management support, collaboration, and technology use have a positive impact on the knowledge-sharing process, and knowledge-sharing positively affects the decision making process.Keywords: knowledge sharing, decision-making, information technology, management support, corroboration, Sultan Qaboos University
Procedia PDF Downloads 791241 Educational Experiences in Engineering in the COVID Era and Their Comparative Analysis, Spain, March to June 2020
Authors: Borja Bordel, Ramón Alcarria, Marina Pérez
Abstract:
In March 2020, in Spain, a sanitary and unexpected crisis caused by COVID-19 was declared. All of a sudden, all degrees, classes and evaluation tests and projects had to be transformed into online activities. However, the chaotic situation generated by a complex operation like that, executed without any well-established procedure, led to very different experiences and, finally, results. In this paper, we are describing three experiences in two different Universities in Madrid. On the one hand, the Technical University of Madrid, a public university with little experience in online education. On the other hand, Alfonso X el Sabio University, a private university with more than five years of experience in online teaching. All analyzed subjects were related to computer engineering. Professors and students answered a survey and personal interviews were also carried out. Besides, the professors’ workload and the students’ academic results were also compared. From the comparative analysis of all these experiences, we are extracting the most successful strategies, methodologies, and activities. The recommendations in this paper will be useful for courses during the next months when the sanitary situation is still affecting an educational organization. While, at the same time, they will be considered as input for the upcoming digitalization process of higher education.Keywords: educational experience, online education, higher education digitalization, COVID, Spain
Procedia PDF Downloads 1401240 Identification of a Print Design Approach for the Application of Multicolour and Pattern Changing Effects
Authors: Dilusha Rajapakse
Abstract:
The main reason for printing coloured imageries, pattern or motif onto textiles is to enhance the visual appearance of the surface so that the final textile product would get the required attention from potential customers. Such colours and patterns are permanently applied onto the textiles using conventional static colourants, and we expect such decorations to be last for the entire lifecycle of the textile product. The focus of this research presentation is to discuss the ability to integrate multicolour and pattern changing aesthetics onto textiles with the application of water based photochromic colourants. By adopting a research through design approach, a number of iterative flatbed screen printing experiments were conducted to explore the process of printing water based photochromic colours on textile surfaces. The research resulted in several technical parameters that have to be considered during the process of screen printing. Moreover, a modified printing technique that could be used to apply decorative photographic imagery onto textile with multicolour changing effects was also identified. A number of product applications for such dynamic printed textiles were revealed, and appropriate visual evidence was referred to justify the finding.Keywords: dynamic aesthetics, multicolour changing textiles, non-emissive colours, printed textile design
Procedia PDF Downloads 3951239 AI Software Algorithms for Drivers Monitoring within Vehicles Traffic - SiaMOTO
Authors: Ioan Corneliu Salisteanu, Valentin Dogaru Ulieru, Mihaita Nicolae Ardeleanu, Alin Pohoata, Bogdan Salisteanu, Stefan Broscareanu
Abstract:
Creating a personalized statistic for an individual within the population using IT systems, based on the searches and intercepted spheres of interest they manifest, is just one 'atom' of the artificial intelligence analysis network. However, having the ability to generate statistics based on individual data intercepted from large demographic areas leads to reasoning like that issued by a human mind with global strategic ambitions. The DiaMOTO device is a technical sensory system that allows the interception of car events caused by a driver, positioning them in time and space. The device's connection to the vehicle allows the creation of a source of data whose analysis can create psychological, behavioural profiles of the drivers involved. The SiaMOTO system collects data from many vehicles equipped with DiaMOTO, driven by many different drivers with a unique fingerprint in their approach to driving. In this paper, we aimed to explain the software infrastructure of the SiaMOTO system, a system designed to monitor and improve driver driving behaviour, as well as the criteria and algorithms underlying the intelligent analysis process.Keywords: artificial intelligence, data processing, driver behaviour, driver monitoring, SiaMOTO
Procedia PDF Downloads 911238 Teachers’ Continuance Intention Towards Using Madrasati Platform: A Conceptual Framework
Authors: Fiasal Assiri, Joanna Wincenciak, David Morrison-Love
Abstract:
With the rapid spread of the COVID-19 pandemic, the Saudi government suspended students from going to school to combat the outbreak. As e-learning was not applied at all in schools, online teaching and learning have been revived in Saudi Arabia by providing a new platform called ‘Madrasati.’ Several studies have used the Decomposed Theory of Planned Behaviour (DTPB)to examineindividuals’ intention behavior in many fields. However, there is a lack of studies investigating the determinants of teachers’ continued intention touseMadrasati platform. The purpose of this paper is to present a conceptual model in light of DTPB. To enhance the predictability of the model, the study incorporates other variables, including learning content quality and interactivity as sub-factors under the perceived usefulness, students and government influences under the subjective norms, and technical support and prior e-learning experience under the perceived behavioral control. The model will be further validated using a mixed methods approach. Such findings would help administrators and stakeholders to understand teachers’ needs and develop new methods that might encourage teachers to continue using Madrasati effectively in their teaching.Keywords: madrasati, decomposed theory of planned behaviour, continuance intention, attitude, subjective norms, perceived behavioural control
Procedia PDF Downloads 1051237 The Perspective of Smart Thermoregulation in Personal Protective Equipment
Authors: Alireza Saidi
Abstract:
Aside from injuries due to direct contact with hot or cold substances or objects, exposure to extreme temperatures in the workplace involves physical hazards to workers. On the other hand, a poorly acclimatized worker may have reduced performance and alertness and may, therefore, be more vulnerable to the risk of accidents and injuries. Due to the incompatibility of the standards put in place with certain workplaces and the lack of thermoregulation in many protective equipments, thermal strains remain among the physical risks most present in many work sectors. However, many of these problems can be overcome thanks to the potential of intelligent textile technologies allowing intelligent thermoregulation in protective equipment. Nowadays, technologies such as heating elements, cooling elements are applied in products intended for sport and leisure, and research work has been carried out in the integration of temperature sensors and thermal stress detectors in personal protective equipment. However, the usage of all of these technologies in personal protective equipment remains very marginal. This article presents a portrait of the current state of intelligent thermoregulation systems by carrying out a synthesis of technical developments, which is accompanied by a gap analysis of current developments. Thus, the research work necessary for the adaptation and integration of intelligent thermoregulation systems with personal protective equipment is discussed in order to offer a perspective of future developments.Keywords: personal protective equipment, smart textiles, thermoregulation, thermal strain
Procedia PDF Downloads 1101236 A Novel Framework for User-Friendly Ontology-Mediated Access to Relational Databases
Authors: Efthymios Chondrogiannis, Vassiliki Andronikou, Efstathios Karanastasis, Theodora Varvarigou
Abstract:
A large amount of data is typically stored in relational databases (DB). The latter can efficiently handle user queries which intend to elicit the appropriate information from data sources. However, direct access and use of this data requires the end users to have an adequate technical background, while they should also cope with the internal data structure and values presented. Consequently the information retrieval is a quite difficult process even for IT or DB experts, taking into account the limited contributions of relational databases from the conceptual point of view. Ontologies enable users to formally describe a domain of knowledge in terms of concepts and relations among them and hence they can be used for unambiguously specifying the information captured by the relational database. However, accessing information residing in a database using ontologies is feasible, provided that the users are keen on using semantic web technologies. For enabling users form different disciplines to retrieve the appropriate data, the design of a Graphical User Interface is necessary. In this work, we will present an interactive, ontology-based, semantically enable web tool that can be used for information retrieval purposes. The tool is totally based on the ontological representation of underlying database schema while it provides a user friendly environment through which the users can graphically form and execute their queries.Keywords: ontologies, relational databases, SPARQL, web interface
Procedia PDF Downloads 2721235 Application of Italian Guidelines for Existing Bridge Management
Authors: Giovanni Menichini, Salvatore Giacomo Morano, Gloria Terenzi, Luca Salvatori, Maurizio Orlando
Abstract:
The “Guidelines for Risk Classification, Safety Assessment, and Structural Health Monitoring of Existing Bridges” were recently approved by the Italian Government to define technical standards for managing the national network of existing bridges. These guidelines provide a framework for risk mitigation and safety assessment of bridges, which are essential elements of the built environment and form the basis for the operation of transport systems. Within the guideline framework, a workflow based on three main points was proposed: (1) risk-based, i.e., based on typical parameters of hazard, vulnerability, and exposure; (2) multi-level, i.e., including six assessment levels of increasing complexity; and (3) multirisk, i.e., assessing structural/foundational, seismic, hydrological, and landslide risks. The paper focuses on applying the Italian Guidelines to specific case studies, aiming to identify the parameters that predominantly influence the determination of the “class of attention”. The significance of each parameter is determined via sensitivity analysis. Additionally, recommendations for enhancing the process of assigning the class of attention are proposed.Keywords: bridge safety assessment, Italian guidelines implementation, risk classification, structural health monitoring
Procedia PDF Downloads 571234 Embracing Transculturality by Internationalising the EFL Classroom
Authors: Karen Jacob
Abstract:
Over the last decades, there has been a rise in the use of CLIL (content and language integrated learning) methodology as a way of reinforcing FL (foreign language) acquisition. CLIL techniques have also been transferred to the formal instruction-based FL classroom where through content-based lessons and project work it can very often say that teachers are ‘clilling’ in the FL classroom. When it comes to motivating students to acquire an FL, we have to take into account that English is not your run-of-the-mill FL: English is an international language (EIL). Consequently, this means that EFL students should be able to use English as an international medium of communication. This leads to the assumption that along with FL competence, speakers of EIL will need to become competent international citizens with knowledge of other societies, both contextually and geographically, and be flexible, open-minded, respectful and sensitive towards other world groups. Rather than ‘intercultural’ competence we should be referring to ‘transcultural’ competence. This paper reports the implementation of a content- and task-based approach to EFL teaching which was applied to two groups of 15 year-olds from two schools on the Spanish island of Mallorca during the school year 2015-2016. Students worked on three units of work that aimed at ‘internationalising’ the classroom by introducing topics that would encourage them to become transculturally aware of the world in which they live. In this paper we discuss the feedback given by the teachers and students on various aspects of the approach in order to answer the following research questions: 1) To what extent were the students motivated by the content and activities of the classes?; 2) Did this motivation have a positive effect on the students’ overall results for the subject; 3) Did the participants show any signs of becoming transculturally aware. Preliminary results from qualitative data show that the students enjoyed the move away from the more traditional EFL content and, as a result, they became more competent in speaking and writing. Students also appeared to become more knowledgeable and respectful towards the ‘other’. The EFL approach described in this paper takes a more qualitative approach to research by describing what is really going on in the EFL classroom and makes a conscious effort to provide real examples of not only the acquisition of linguistic competence but also the acquisition of other important communication skills that are of utmost importance in today's international arena.Keywords: CLIL, content- and task-based learning, internationalisation, transcultural competence
Procedia PDF Downloads 2411233 Study of Village Scale Community Based Water Supply and Sanitation Program (Pamsimas) in Indonesia
Authors: Reza Eka Putra
Abstract:
Pamsimas is a community based drinking water supply and sanitation program which is contributed by local community, local government, central government, and World Bank with the aim of achieving Water Supply and Sanitation - the Millennium Development Goals (WSS-MDGs) target. This program is supported by the Ministry of Public Works as the executing agency with the cooperation of Ministry of Interior and the Ministry of Health. Field observations were conducted in two rural samples of 2009 beneficiaries Pamsimas West Java, which is in Ponggang Village, Subang District. The study was evaluated through several parameters, including technical, health, and empowerment aspect. Evaluation was done by comparing the parameters of success that has been set by Pamsimas through Pamsimas book manuals with the parameters from Sanitation & Infrastructure course regarding the appropriate application of technology in society. The result of the study is that the potency of the community before the program is implemented in the village is the determining factor. Stronger cooperation pattern in Ponggang Vilage results in a successful program. Both villages showed a pattern of behavior changes from indiscriminate defecation to sanitary latrine use. Besides, there is a decline in the number of cases of diarrheal disease since the year of Pamsimas implementation.Keywords: millenium development goals, community develpoment, water supply, sanitation
Procedia PDF Downloads 2541232 A Comparative Study on Software Patent: The Meaning of 'Use' in Direct Infringement
Authors: Tien Wei Daniel Hwang
Abstract:
The computer program inventors, particularly in Fintech, are unwilling to apply for patents in Taiwan after 2014. Passing the ‘statutory subject matter eligibility’ test and becoming the system patent are not the only cause to the reduction in the number of application. Taiwanese court needs to resolve whether the defendants had ‘used’ that software patent in patent direct infringement suit. Both 35 U.S.C. § 271(a) and article 58 paragraph 2 of Taiwan Patent Law don’t define the meaning of ‘use’ in the statutes. Centillion Data Sys., LLC v. Qwest Commc’ns Int’l, Inc. reconsidered the meaning of ‘use’ in system patent infringement, and held that ‘a party must put the invention into service, i.e., control the system as a whole and obtain benefit from it.’ In Taiwan, Intellectual Property Office, Ministry of Economic Affairs, has explained that ‘using’ the patent is ‘achieving the technical effect of the patent.’ Nonetheless, this definition is too broad to apply to not only the software patent but also the traditional patent. To supply the friendly environment for Fintech corporations, this article aims to let Taiwanese court realize why and how United States District Court, S.D. Indiana, Indianapolis Division and United States Court of Appeals, Federal Circuit defined the meaning of ‘use’ in 35 U.S.C. § 271(a). However, this definition is so lax and confuses many defendants in United States. Accordingly, this article indicates the elements in Taiwan Patent Law are different with 35 U.S.C. § 271(a), so Taiwanese court can follow the interpretation of ‘use’ in Centillion Data case without the same obstacle.Keywords: direct infringement, FinTech, software patent, use
Procedia PDF Downloads 3011231 Effects of Net Height of Crab Entangling Nets on the Capture of Targeted Economically Important Portunid Species and Non-Target Species
Authors: Rizalyn Gonzales, Harold Monteclaro
Abstract:
This study determined the effects of net height on the capture performance of crab entangling nets. Fishing trials were conducted using nets with the following net heights: 1) 12 meshes down (MD), 2) 24 MD and 3) 50 MD. A total of 1,290 individuals comprising of 87 species belonging to 53 families were caught. One-way ANOVA showed that net height significantly affects various catch parameters such as catch per unit effort (CPUE) of the total and target catch, amount of non-target catch, sizes and species richness. The use of appropriate net height is a potential technical measure for a selective but still efficient crab entangling net fishery. Lower net height significantly reduced non-target catch up to 70%. While lower nets decreased the CPUE of target catch such as blue swimming crab Portunus pelagicus and christian crab Charybdis feriatus up to 65% in 12 MD, catch in 24 MD was not significantly different with that in 50 MD. The use of 24 MD also resulted in capturing larger-sized Portunus pelagicus. Catch species richness decreased up to 58% in lower nets. These results are useful to fisheries managers and government institutions to develop or improve existing regulations towards a sustainable crab fishery particularly blue swimming crabs.Keywords: blue swimming crabs, catch per unit effort, crab entangling nets, net height
Procedia PDF Downloads 2201230 Stock Market Prediction Using Convolutional Neural Network That Learns from a Graph
Authors: Mo-Se Lee, Cheol-Hwi Ahn, Kee-Young Kwahk, Hyunchul Ahn
Abstract:
Over the past decade, deep learning has been in spotlight among various machine learning algorithms. In particular, CNN (Convolutional Neural Network), which is known as effective solution for recognizing and classifying images, has been popularly applied to classification and prediction problems in various fields. In this study, we try to apply CNN to stock market prediction, one of the most challenging tasks in the machine learning research. In specific, we propose to apply CNN as the binary classifier that predicts stock market direction (up or down) by using a graph as its input. That is, our proposal is to build a machine learning algorithm that mimics a person who looks at the graph and predicts whether the trend will go up or down. Our proposed model consists of four steps. In the first step, it divides the dataset into 5 days, 10 days, 15 days, and 20 days. And then, it creates graphs for each interval in step 2. In the next step, CNN classifiers are trained using the graphs generated in the previous step. In step 4, it optimizes the hyper parameters of the trained model by using the validation dataset. To validate our model, we will apply it to the prediction of KOSPI200 for 1,986 days in eight years (from 2009 to 2016). The experimental dataset will include 14 technical indicators such as CCI, Momentum, ROC and daily closing price of KOSPI200 of Korean stock market.Keywords: convolutional neural network, deep learning, Korean stock market, stock market prediction
Procedia PDF Downloads 4251229 Factors Affecting Sustainability of a 3D Printed Object
Authors: Kadrefi Athanasia, Fronimaki Evgenia, Mavri Maria
Abstract:
3D Printing (3DP) is a distinct, disruptive technology that belongs to a wider group of manufacturing technologies, Additive Manufacturing (AM). In 3DP, a custom digital file turns into a solid object using a single computer and a 3D printer. Among multiple advantages, 3DP offers production with fewer steps compared to conventional manufacturing, lower production costs, and customizable designs. 3DP can be performed by several techniques, while the most common is Fused Deposition Modeling (FDM). FDM belongs to a wider group of AM techniques, material extrusion, where a digital file converts into a solid object using raw material (called filament) melted in high temperatures. As in most manufacturing procedures, environmental issues have been raised here, too. This study aims to review the literature on issues that determine technical and mechanical factors that affect the sustainability and resilience of a final 3D-printed object. The research focuses on the collection of papers that deal with 3D printing techniques and use keywords or phrases like ‘3D printed objects’, ‘factors of 3DP sustainability’, ‘waste materials,’ ‘infill patterns,’ and ‘support structures.’ After determining factors, a pilot survey will be conducted at the 3D Printing Lab in order to define the significance of each factor in the final 3D printed object.Keywords: additive manufacturing, 3D printing, sustainable manufacturing, sustainable production
Procedia PDF Downloads 651228 Modeling of Micro-Grid System Components Using MATLAB/Simulink
Authors: Mahmoud Fouad, Mervat Badr, Marwa Ibrahim
Abstract:
Micro-grid system is presently considered a reliable solution for the expected deficiency in the power required from future power systems. Renewable power sources such as wind, solar and hydro offer high potential of benign power for future micro-grid systems. Micro-Grid (MG) is basically a low voltage (LV) or medium voltage (MV) distribution network which consists of a number of called distributed generators (DG’s); micro-sources such as photovoltaic array, fuel cell, wind turbine etc. energy storage systems and loads; operating as a single controllable system, that could be operated in both grid-connected and islanded mode. The capacity of the DG’s is sufficient to support all; or most, of the load connected to the micro-grid. This paper presents a micro-grid system based on wind and solar power sources and addresses issues related to operation, control, and stability of the system. Using Matlab/Simulink, the system is modeled and simulated to identify the relevant technical issues involved in the operation of a micro-grid system based on renewable power generation units.Keywords: micro-grid system, photovoltaic, wind turbine, energy storage, distributed generation, modeling
Procedia PDF Downloads 4341227 Research on the Dynamic Characteristics of Multi-Condition Penetration of Concrete by Warhead-Fuze Systems
Authors: Shaoxiang Wang, Xiangjin Zhang
Abstract:
This study focuses on the overload environment and dynamic response of the core components (i.e., sensors) within the fuze of a warhead-fuze system during penetration of typical targets. Considering the connection structure between the warhead and the fuze, as well as the internal structure of the fuze, a finite element model of the warhead-fuze system penetrating a semi-infinite thick concrete target was constructed using the finite element analysis software LS-DYNA for numerical simulation. The results reveal that the response signal of the sensors inside the warhead-fuze system is larger in magnitude and exhibits greater vibration disturbances compared to the acceleration signal of the warhead. Moreover, the study uncovers the dynamic response characteristics of the sensors within the warhead-fuze system under multi-condition scenarios involving different target strengths and penetration angles. The research findings provide a sound basis for the rapid and effective prediction of the dynamic response and overload characteristics of critical modules within the fuze under different working conditions, offering technical references for the integrated design of warhead-fuze systems.Keywords: penetration, warhead-fuze system, multi-condition, acceleration overload signal, numerical simulation
Procedia PDF Downloads 261226 Use of Information and Communication Technology (ICT) Among Nigerian Colleges of Education Lecturers: A Gender Analysis Approach
Authors: Rasheed A. Saliu, Sunday E. Ogundipe, Oluwaseun A. Adefila
Abstract:
Information and Communication Technology (ICT) in recent time has transformed the means by which we inform ourselves, with world events and areas of personal interests, and further our learning. Today, for many, books and journals are no longer the first or primary source of information or learning. We now regularly rely on images, video, animations and sound to acquire information and to learn. Increased and improved access to the internet has accelerated this phenomenon. We now acquire and access information in ways fundamentally different from the pre-ICT era. But to what extent is academic staff in colleges of education, having access to and the utilising of ICT devices in their lecture deliveries especially in School of Science and Vocational and Technical? The main focus of this paper is to proffer solution to this salient question. It is essentially an empirical study carried out in five colleges of education in south-west zone of Nigeria. The target population was the academic staff in the selected institution. A total number of 150 male and female lecturers were contacted for the study. The main instrument was questionnaire. The finding reveals that male lecturers are much more ICT inclined than women folk in the academics. Some recommendations were made to endear academics to utilizing ICT at their disposal to foster qualitative delivery in this digital era.Keywords: education, gender, ICT, Nigeria
Procedia PDF Downloads 2971225 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value
Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck
Abstract:
This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI
Procedia PDF Downloads 2181224 Developing Measurement Instruments for Enterprise Resources Planning (ERP) Post-Implementation Failure Model
Authors: Malihe Motiei, Nor Hidayati Zakaria, Davide Aloini
Abstract:
This study aims to present a method to develop the failure measurement model for ERP post-implementation. To achieve this outcome, the study firstly evaluates the suitability of Technology-Organization-Environment framework for the proposed conceptual model. This study explains how to discover the constructs and subsequently to design and evaluate the constructs as formative or reflective. Constructs are used including reflective and purely formative. Then, the risk dimensions are investigated to determine the instruments to examine the impact of risk on ERP failure after implementation. Two construct as formative constructs consist inadequate implementation and poor organizational decision making. Subsequently six construct as reflective construct include technical risks, operational risks, managerial risks, top management risks, lack of external risks, and user’s inefficiency risks. A survey was conducted among Iranian industries to collect data. 69 data were collected from manufacturing sectors and the data were analyzed by Smart PLS software. The results indicated that all measurements included 39 critical risk factors were acceptable for the ERP post-implementation failure model.Keywords: critical risk factors (CRFs), ERP projects, ERP post-implementation, measurement instruments, ERP system failure measurement model
Procedia PDF Downloads 3631223 Screening Methodology for Seismic Risk Assessment of Aging Structures in Oil and Gas Plants
Authors: Mohammad Nazri Mustafa, Pedram Hatami Abdullah, M. Fakhrur Razi Ahmad Faizul
Abstract:
With the issuance of Malaysian National Annex 2017 as a part of MS EN 1998-1:2015, the seismic mapping of Malaysian Peninsular including Sabah and Sarawak has undergone some changes in terms of the Peak Ground Acceleration (PGA) value. The revision to the PGA has raised a concern on the safety of oil and gas onshore structures as these structures were not designed to accommodate the new PGA values which are much higher than the previous values used in the original design. In view of the high numbers of structures and buildings to be re-assessed, a risk assessment methodology has been developed to prioritize and rank the assets in terms of their criticality against the new seismic loading. To-date such risk assessment method for oil and gas onshore structures is lacking, and it is the main intention of this technical paper to share the risk assessment methodology and risk elements scoring finalized via Delphi Method. The finalized methodology and the values used to rank the risk elements have been established based on years of relevant experience on the subject matter and based on a series of rigorous discussions with professionals in the industry. The risk scoring is mapped against the risk matrix (i.e., the LOF versus COF) and hence, the overall risk for the assets can be obtained. The overall risk can be used to prioritize and optimize integrity assessment, repair and strengthening work against the new seismic mapping of the country.Keywords: methodology, PGA, risk, seismic
Procedia PDF Downloads 1511222 Software Tool Design for Heavy Oil Upgrading by Hydrogen Donor Addition in a Hydrodynamic Cavitation Process
Authors: Munoz A. Tatiana, Solano R. Brandon, Montes C. Juan, Cierco G. Javier
Abstract:
The hydrodynamic cavitation is a process in which the energy that the fluids have in the phase changes is used. From this energy, local temperatures greater than 5000 °C are obtained where thermal cracking of the fluid molecules takes place. The process applied to heavy oil affects variables such as viscosity, density, and composition, which constitutes an important improvement in the quality of crude oil. In this study, the need to design a software through mathematical integration models of mixing, cavitation, kinetics, and reactor, allows modeling changes in density, viscosity, and composition of a heavy oil crude, when the fluid passes through a hydrodynamic cavitation reactor. In order to evaluate the viability of this technique in the industry, a heavy oil of 18° API gravity, was simulated using naphtha as a hydrogen donor at concentrations of 1, 2 and 5% vol, where the simulation results showed an API gravity increase to 0.77, 1.21 and 1.93° respectively and a reduction viscosity by 9.9, 12.9 and 15.8%. The obtained results allow to have a favorable panorama on this technological development, an appropriate visualization on the generation of innovative knowledge of this technique and the technical-economic opportunity that benefits the development of the hydrocarbon sector related to heavy crude oil that includes the largest world oil production.Keywords: hydrodynamic cavitation, thermal cracking, hydrogen donor, heavy oil upgrading, simulator
Procedia PDF Downloads 1501221 Evaluating the Effect of Modern Technologies and Technics to Supply Energy of Buildings Using New Energies
Authors: Ali Reza Ghaffari, Hassan Saghi
Abstract:
Given the limitation of fossil resources to supply energy to buildings, recent years have seen a revival of interest in new technologies that produce the energy using new forms of energy in many developed countries. In this research, first the potentials of new energies in Iran are discussed and then based on case studies undertaken in a building in Tehran, the effects of utilizing new solar energy technology for supplying the energy of buildings are investigated. Then, by analyzing the data recorded over a four-year period, the technical performance of this system is investigated. According to the experimental operation plan, this system requires an auxiliary heating circuit for continuous operation over a year. Also, in the economic analysis, real conditions are considered and the results are recorded based on long-term data. Considering the purchase and commissioning building, supplementary energy consumption, etc. a comparison is drawn between the costs of using a solar water heater in a residential unit with the energy costs of a similar unit equipped with a conventional gas water heater. Given the current price of energy, using a solar water heater in the country will not economical, but considering the global energy prices, this system will have a return on investment after 4.5 years. It also produces 81% less pollution and saves about $21.5 on environmental pollution cleanup.Keywords: energy supply, new energies, new technologies, buildings
Procedia PDF Downloads 1621220 Comparative Toxicity of Garlic Juice and Dicofol to Population of Citrus Mites
Authors: Y. Atibi, A. Boutaleb Joutei, T. Slimani
Abstract:
Insecticidal properties of Alliaceae are widely known, they are plant with varied biological properties. Garlic and onion are known for their positive effect on health, including the prevention of cardiovascular disease and some digestive cancers. These health benefits molecules are also responsible for pest potential control of Alliaceae. With these properties, we can consider using Alliaceae as acaricides. The purpose of this study was to compare the effect of chemical and biopesticides on citrus mites, especially Tetranychus urticae, Panonychus citri and Eutetranychus orientalis. Chemical treatment (Dicofol) and biopesticides (Garlic juice + Alcohol) applied on this study to control the various stages of mites, have reduced the proliferation of mobile forms and reducing the number of eggs to acceptable levels. Garlic juice + alcohol revealed efficiency from 50 to 57.69 % against the mobile forms of T. urticae, however, it was effective against the mobile forms of P. citri and E. orientalis with an efficiency of 85.71 % and 100 % respectively, its action has also reduced the number of eggs of T. urticae and E. orientalis at low levels. Therefore, this biopesticide is conceivable viewpoint technical and economic as the infestation by mite is low.Keywords: Garlic juice, acaricide, biopesticide, mites, alcohol, Tetranychus urticae, Panonychus citri, Eutetranychus orientalis.
Procedia PDF Downloads 5241219 Numerical Study of Rayleight Number and Eccentricity Effect on Free Convection Fluid Flow and Heat Transfer of Annulus
Authors: Ali Reza Tahavvor‚ Saeed Hosseini, Behnam Amiri
Abstract:
Concentric and eccentric annulus is used frequently in technical and industrial applications such as nuclear reactors, thermal storage system and etc. In this paper, computational fluid dynamics (CFD) is used to investigate two dimensional free convection of laminar flow in annulus with isotherm cylinders surface and cooler inner surface. Problem studied in thirty different cases. Due to natural convection continuity and momentum equations are coupled and must be solved simultaneously. Finite volume method is used for solving governing equations. The purpose was to obtain the eccentricity effect on Nusselt number in different Rayleight numbers, so streamlines and temperature fields must be determined. Results shown that the highest Nusselt number values occurs in degree of eccentricity equal to 0.5 upward for inner cylinder and degree of eccentricity equal to 0.3 upward for outer cylinder. Side eccentricity reduces the outer cylinder Nusselt number but increases inner cylinder Nusselt number. The trend in variation of Nusselt number with respect to eccentricity remain similar in different Rayleight numbers. Correlations are included to calculate the Nusselt number of the cylinders.Keywords: natural convection, concentric, eccentric, Nusselt number, annulus
Procedia PDF Downloads 3701218 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card
Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi
Abstract:
In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan
Procedia PDF Downloads 1291217 Performants: Making the Organization of Concerts Easier
Authors: Ioannis Andrianakis, Panagiotis Panagiotopoulos, Kyriakos Chatzidimitriou, Dimitrios Tampakis, Manolis Falelakis
Abstract:
Live music, whether performed in organized venues, restaurants, hotels or any other spots, creates value chains that support and develop local economies and tourism development. In this paper, we describe PerformAnts, a platform that increases the mobility of musicians and their accessibility to remotely located venues by rationalizing the cost of live acts. By analyzing the event history and taking into account their potential availability, the platform provides bespoke recommendations to both bands and venues while also facilitating the organization of tours and helping rationalize transportation expenses by realizing an innovative mechanism called “chain booking”. Moreover, the platform provides an environment where complicated tasks such as technical and financial negotiations, concert promotion or copyrights are easily manipulated by users using best practices. The proposed solution provides important benefits to the whole spectrum of small/medium size concert organizers, as the complexity and the cost of the production are rationalized. The environment is also very beneficial for local talent, musicians that are very mobile, venues located away from large urban areas or in touristic destinations, and managers who will be in a position to coordinate a larger number of musicians without extra effort.Keywords: machine learning, music industry, creative industries, web applications
Procedia PDF Downloads 97