Search results for: embedded computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1972

Search results for: embedded computing

322 A Study on the Korean Connected Industrial Parks Smart Logistics It Financial Enterprise Architecture

Authors: Ilgoun Kim, Jongpil Jeong

Abstract:

Recently, a connected industrial parks (CIPs) architecture using new technologies such as RFID, cloud computing, CPS, Big Data, 5G 5G, IIOT, VR-AR, and ventral AI algorithms based on IoT has been proposed. This researcher noted the vehicle junction problem (VJP) as a more specific detail of the CIPs architectural models. The VJP noted by this researcher includes 'efficient AI physical connection challenges for vehicles' through ventilation, 'financial and financial issues with complex vehicle physical connections,' and 'welfare and working conditions of the performing personnel involved in complex vehicle physical connections.' In this paper, we propose a public solution architecture for the 'electronic financial problem of complex vehicle physical connections' as a detailed task during the vehicle junction problem (VJP). The researcher sought solutions to businesses, consumers, and Korean social problems through technological advancement. We studied how the beneficiaries of technological development can benefit from technological development with many consumers in Korean society and many small and small Korean company managers, not some specific companies. In order to more specifically implement the connected industrial parks (CIPs) architecture using the new technology, we noted the vehicle junction problem (VJP) within the smart factory industrial complex and noted the process of achieving the vehicle junction problem performance among several electronic processes. This researcher proposes a more detailed, integrated public finance enterprise architecture among the overall CIPs architectures. The main details of the public integrated financial enterprise architecture were largely organized into four main categories: 'business', 'data', 'technique', and 'finance'.

Keywords: enterprise architecture, IT Finance, smart logistics, CIPs

Procedia PDF Downloads 138
321 Photovoltaic Modules Fault Diagnosis Using Low-Cost Integrated Sensors

Authors: Marjila Burhanzoi, Kenta Onohara, Tomoaki Ikegami

Abstract:

Faults in photovoltaic (PV) modules should be detected to the greatest extent as early as possible. For that conventional fault detection methods such as electrical characterization, visual inspection, infrared (IR) imaging, ultraviolet fluorescence and electroluminescence (EL) imaging are used, but they either fail to detect the location or category of fault, or they require expensive equipment and are not convenient for onsite application. Hence, these methods are not convenient to use for monitoring small-scale PV systems. Therefore, low cost and efficient inspection techniques with the ability of onsite application are indispensable for PV modules. In this study in order to establish efficient inspection technique, correlation between faults and magnetic flux density on the surface is of crystalline PV modules are investigated. Magnetic flux on the surface of normal and faulted PV modules is measured under the short circuit and illuminated conditions using two different sensor devices. One device is made of small integrated sensors namely 9-axis motion tracking sensor with a 3-axis electronic compass embedded, an IR temperature sensor, an optical laser position sensor and a microcontroller. This device measures the X, Y and Z components of the magnetic flux density (Bx, By and Bz) few mm above the surface of a PV module and outputs the data as line graphs in LabVIEW program. The second device is made of a laser optical sensor and two magnetic line sensor modules consisting 16 pieces of magnetic sensors. This device scans the magnetic field on the surface of PV module and outputs the data as a 3D surface plot of the magnetic flux intensity in a LabVIEW program. A PC equipped with LabVIEW software is used for data acquisition and analysis for both devices. To show the effectiveness of this method, measured results are compared to those of a normal reference module and their EL images. Through the experiments it was confirmed that the magnetic field in the faulted areas have different profiles which can be clearly identified in the measured plots. Measurement results showed a perfect correlation with the EL images and using position sensors it identified the exact location of faults. This method was applied on different modules and various faults were detected using it. The proposed method owns the ability of on-site measurement and real-time diagnosis. Since simple sensors are used to make the device, it is low cost and convenient to be sued by small-scale or residential PV system owners.

Keywords: fault diagnosis, fault location, integrated sensors, PV modules

Procedia PDF Downloads 203
320 Migrants as Change Agents: A Study of Social Remittances between Finland and Russia

Authors: Ilona Bontenbal

Abstract:

In this research, the potential for societal change is researched through the idea of migrants as change agents. The viewpoint is on the potential that migrants have for affecting societal change in their country of origin through transmitting transnational peer-to-peer information. The focus is on the information that Russian migrants living in Finland transmit about their experiences and attitudes regarding the Nordic welfare state, its democratic foundation and the social rights embedded in it, to their family and friends in their country of origin. The welfare provision and level of democracy are very different in the two neighbouring countries of Finland and Russia. Finland is a Nordic welfare state with strong democratic institutions and a comprehensive actualizing of civil and social rights. In Russia, the state of democracy has on the other hand been declining, and the social and civil rights of its citizens are constantly undermined. Due to improvements in communications and travel technology, migrants can easily and relatively cheaply stay in contact with their family and friends in their country of origin. This is why it is possible for migrants to act as change agents. By telling about their experiences and attitudes about living in a democratic welfare state, migrants can affect what people in the country or origin know and think about welfare, democracy, and social rights. This phenomenon is approached through the concept of social remittances. Social remittances broadly stand for the ideas, know-how, world views, attitudes, norms of behavior, and social capital that flows through transnational networks from receiving- to sending- country communities and the other way around. The viewpoint is that historically and culturally formed democratic welfare models cannot be copied entirely nor that each country should achieve identical development paths, but rather that migrants themselves choose which aspects they see as important to remit to their acquaintances in their country of origin. This way the potential for social change and the agency of the migrants is accentuated. The empirical research material of this study is based on 30 qualitative interviews with Russian migrants living in Finland. Russians are the largest migrant group in Finland and Finland is a popular migration destination especially for individuals living in North-West Russia including the St. Petersburg region. The interviews are carried out in 2018-2019. The preliminary results indicate that Russian migrants discuss social rights and welfare a lot with their family members and acquaintances living in Russia. In general, the migrants feel that they have had an effect on the way that their friends and family think about Finland, the West, social rights and welfare provision. Democracy, on the other hand, is seen as a more difficult and less discussed topic. The transformative potential that the transmitted information and attitudes could have outside of the immediate circle of acquaintances on larger societal change is seen as ambiguous although not negligible.

Keywords: migrants as change agents, Russian migrants, social remittances, welfare and democracy

Procedia PDF Downloads 157
319 Periareolar Zigzag Incision in the Conservative Surgical Treatment of Breast Cancer

Authors: Beom-Seok Ko, Yoo-Seok Kim, Woo-Sung Lim, Ku-Sang Kim, Hyun-Ah Kim, Jin-Sun Lee, An-Bok Lee, Jin-Gu Bong, Tae-Hyun Kim, Sei-Hyun Ahn

Abstract:

Background: Breast conserving surgery (BCS) followed by radiation therapy is today standard therapy for early breast cancer. It is safe therapeutic procedure in early breast cancers, because it provides the same level of overall survival as mastectomy. There are a number of different types of incisions used to BCS. Avoiding scars on the breast is women’s desire. Numerous minimal approaches have evolved due to this concern. Periareolar incision is often used when the small tumor relatively close to the nipple. But periareolar incision has a disadvantages include limited exposure of the surgical field. In plastic surgery, various methods such as zigzag incisions have been recommended to achieve satisfactory esthetic results. Periareolar zigzag incision has the advantage of not only good surgical field but also contributed to better surgical scars. The purpose of this study was to evaluate the oncological safety of procedures by studying the status of the surgical margins of the excised tumor specimen and reduces the need for further surgery. Methods: Between January 2016 and September 2016, 148 women with breast cancer underwent BCS or mastectomy by the same surgeon in ASAN medical center. Patients with exclusion criteria were excluded from this study if they had a bilateral breast cancer or underwent resection of the other tumors or taken axillary dissection or performed other incision methods. Periareolar zigzag incision was performed and excision margins of the specimen were identified frozen sections and paraffin-embedded or permanent sections in all patients in this study. We retrospectively analyzed tumor characteristics, the operative time, size of specimen, the distance from the tumor to nipple. Results: A total of 148 patients were reviewed, 72 included in the final analysis, 76 excluded. The mean age of the patients was 52.6 (range 25-19 years), median tumor size was 1.6 cm (range, 0.2-8.8), median tumor distance from the nipple was 4.0 cm (range, 1.0-9.0), median excised specimen sized was 5.1 cm (range, 2.8-15.0), median operation time was 70.0 minute (range, 39-138). All patients were discharged with no sign of infection or skin necrosis. Free resection margin was confirmed by frozen biopsy and permanent biopsy in all samples. There were no patients underwent reoperation. Conclusions: We suggest that periareolar zigzag incision can provide a good surgical field to remove a relatively large tumor and may provide cosmetically good outcomes.

Keywords: periareolar zigzag incision, breast conserving surgery, breast cancer, resection margin

Procedia PDF Downloads 209
318 Design and Development of Fleet Management System for Multi-Agent Autonomous Surface Vessel

Authors: Zulkifli Zainal Abidin, Ahmad Shahril Mohd Ghani

Abstract:

Agent-based systems technology has been addressed as a new paradigm for conceptualizing, designing, and implementing software systems. Agents are sophisticated systems that act autonomously across open and distributed environments in solving problems. Nevertheless, it is impractical to rely on a single agent to do all computing processes in solving complex problems. An increasing number of applications lately require multiple agents to work together. A multi-agent system (MAS) is a loosely coupled network of agents that interact to solve problems that are beyond the individual capacities or knowledge of each problem solver. However, the network of MAS still requires a main system to govern or oversees the operation of the agents in order to achieve a unified goal. We had developed a fleet management system (FMS) in order to manage the fleet of agents, plan route for the agents, perform real-time data processing and analysis, and issue sets of general and specific instructions to the agents. This FMS should be able to perform real-time data processing, communicate with the autonomous surface vehicle (ASV) agents and generate bathymetric map according to the data received from each ASV unit. The first algorithm is developed to communicate with the ASV via radio communication using standard National Marine Electronics Association (NMEA) protocol sentences. Next, the second algorithm will take care of the path planning, formation and pattern generation is tested using various sample data. Lastly, the bathymetry map generation algorithm will make use of data collected by the agents to create bathymetry map in real-time. The outcome of this research is expected can be applied on various other multi-agent systems.

Keywords: autonomous surface vehicle, fleet management system, multi agent system, bathymetry

Procedia PDF Downloads 240
317 Comparing the ‘Urgent Community Care Team’ Clinical Referrals in the Community with Suggestions from the Clinical Decision Support Software Dem DX

Authors: R. Tariq, R. Lee

Abstract:

Background: Additional demands placed on senior clinical teams with ongoing COVID-19 management has accelerated the need to harness the wider healthcare professional resources and upskill them to take on greater clinical responsibility safely. The UK NHS Long Term Plan (2019)¹ emphasises the importance of expanding Advanced Practitioners’ (APs) roles to take on more clinical diagnostic responsibilities to cope with increased demand. In acute settings, APs are often the first point of care for patients and require training to take on initial triage responsibilities efficiently and safely. Critically, their roles include determining which onward services the patients may require, and assessing whether they can be treated at home, avoiding unnecessary admissions to the hospital. Dem Dx is a Clinical Reasoning Platform (CRP) that claims to help frontline healthcare professionals independently assess and triage patients. It guides the clinician from presenting complaints through associated symptoms to a running list of differential diagnoses, media, national and institutional guidelines. The objective of this study was to compare the clinical referral rates and guidelines adherence registered by the HMR Urgent Community Care Team (UCCT)² and Dem Dx recommendations using retrospective cases. Methodology: 192 cases seen by the UCCT were anonymised and reassessed using Dem Dx clinical pathways. We compared the UCCT’s performance with Dem Dx regarding the appropriateness of onward referrals. We also compared the clinical assessment regarding adherence to NICE guidelines recorded on the clinical notes and the presence of suitable guidance in each case. The cases were audited by two medical doctors. Results: Dem Dx demonstrated appropriate referrals in 85% of cases, compared to 47% in the UCCT team (p<0.001). Of particular note, Dem Dx demonstrated an almost 65% (p<0.001) improvement in the efficacy and appropriateness of referrals in a highly experienced clinical team. The effectiveness of Dem Dx is in part attributable to the relevant NICE and local guidelines found within the platform's pathways and was found to be suitable in 86% of cases. Conclusion: This study highlights the potential of clinical decision support, as Dem Dx, to improve the quality of onward clinical referrals delivered by a multidisciplinary team in primary care. It demonstrated that it could support healthcare professionals in making appropriate referrals, especially those that may be overlooked by providing suitable clinical guidelines directly embedded into cases and clear referral pathways. Further evaluation in the clinical setting has been planned to confirm those assumptions in a prospective study.

Keywords: advanced practitioner, clinical reasoning, clinical decision-making, management, multidisciplinary team, referrals, triage

Procedia PDF Downloads 126
316 Chaotic Representation: Translating Gender in Cantonese Opera Performances

Authors: Kar Yue Chan

Abstract:

Cantonese opera is a valuable heritage originated from South China, and started to span its influence across the area to Hong Kong, and became extremely popular back in the 1950s to the 1970s. It has also been honoured and recognized as one treasurable item on the Intangible Cultural Heritage of Humanity on the Representative List of UNESCO since 2009. A certain level of difficulty is encountered when one identifies the gender roles and representations from a usual performance of Cantonese opera, as conventional practices of Cantonese opera display to the audience that many of the male hero roles are played by female upon the prior knowledge of all audience, and it is understandable for them as well because in the past there were insufficient male actors and performers on the market. Female actresses, in some senses, are more capable to sing near-male voices, and their appearances in heroic operatic attires are more appreciated by general audience. Therefore, perspectives of 'feminine representation' and the 'Reception Theory' in literature are conducive to analyzing such phenomenon. In spite of some 'normal' performances with romantic love stories or historical accounts involving often a talented intellectual and a beautiful wise lady (in Chinese caizi jiaren 才子佳人), in which the male role is actually male and the female role is actually female, there have still been some opera titles specifically manifesting these extreme gender associations by putting together displacement of gender roles in the same performance in view of such chaotic complication. On top of all other factors, translators dealing with any operatic texts face plenty of challenges upon transferring Cantonese operatic performances into English. It is found that translators need to deal with cultural elements embedded in the lyrics; the form (which is as delicate as those deriving from classical Chinese poetry); the gender misplacements that affect the mood and tone of the lyrics that much when they are in the process of translating. Some lyrics and tunes are specifically designed for a particular gender role to perform, while some others are more generic; both of which require different and specific translation strategies. After scrutinizing the various sources of reference, readers of this paper should be well informed of a significance which lies in the refined nature of the poetic form and content that signifies in the way the distinguished gender voice segregation of the discourse from which the lyrics are derived, and definitely also through the on-stage performability aspect of the task. In order to produce a relatively short and concise translated version which fits performance needs, all of the above factors will be looked at in this paper with relevant examples and analysis.

Keywords: Cantonese opera, translation, chaotic gender, performance

Procedia PDF Downloads 102
315 How Virtualization, Decentralization, and Network-Building Change the Manufacturing Landscape: An Industry 4.0 Perspective

Authors: Malte Brettel, Niklas Friederichsen, Michael Keller, Marius Rosenberg

Abstract:

The German manufacturing industry has to withstand an increasing global competition on product quality and production costs. As labor costs are high, several industries have suffered severely under the relocation of production facilities towards aspiring countries, which have managed to close the productivity and quality gap substantially. Established manufacturing companies have recognized that customers are not willing to pay large price premiums for incremental quality improvements. As a consequence, many companies from the German manufacturing industry adjust their production focusing on customized products and fast time to market. Leveraging the advantages of novel production strategies such as Agile Manufacturing and Mass Customization, manufacturing companies transform into integrated networks, in which companies unite their core competencies. Hereby, virtualization of the process- and supply-chain ensures smooth inter-company operations providing real-time access to relevant product and production information for all participating entities. Boundaries of companies deteriorate, as autonomous systems exchange data, gained by embedded systems throughout the entire value chain. By including Cyber-Physical-Systems, advanced communication between machines is tantamount to their dialogue with humans. The increasing utilization of information and communication technology allows digital engineering of products and production processes alike. Modular simulation and modeling techniques allow decentralized units to flexibly alter products and thereby enable rapid product innovation. The present article describes the developments of Industry 4.0 within the literature and reviews the associated research streams. Hereby, we analyze eight scientific journals with regards to the following research fields: Individualized production, end-to-end engineering in a virtual process chain and production networks. We employ cluster analysis to assign sub-topics into the respective research field. To assess the practical implications, we conducted face-to-face interviews with managers from the industry as well as from the consulting business using a structured interview guideline. The results reveal reasons for the adaption and refusal of Industry 4.0 practices from a managerial point of view. Our findings contribute to the upcoming research stream of Industry 4.0 and support decision-makers to assess their need for transformation towards Industry 4.0 practices.

Keywords: Industry 4.0., mass customization, production networks, virtual process-chain

Procedia PDF Downloads 253
314 Cloud and Natural Language Processing (NLP) to Solve the Problem of Service Continuity

Authors: Mohammed Tou, Adel Toumoh

Abstract:

The availability of IT services within organizations has become increasingly important; however, in an interconnected world favoring the distribution and offshoring of organizational information system components, availability is directly based on the constancy and uninterrupted flow of the Internet. Internet attendance guarantees the continuity of IT services. In this communication, we introduce paradigms around the concept of service continuity, as well as the technical approaches and methodologies leading to its resolution. As the heart of the problem is indeed the non-continuity of service, we first start by framing the notion of continuity in the context of services offered by the information system and identify the failures resulting from the discontinuity; thus, we refer to related research to extract the tools and technological paradigms allowing the implementation of solutions that guarantee a minimum of service continuity. If the main element causing continuity is the availability of the Internet, it is obvious to look for an alternative path, which is a conventional PSTN telephone network. To complete the chain of solutions, we mainly used concepts such as voice and speech recognition, AI, NLP, and cloud computing. The research led us to introduce an important element between the user and the service: the request represented by a voice message. Thus, the broker guarantees the delivery of the message to the right recipient service, as well as the response to the user. All of these elements are orchestrated by a pipeline that guarantees the integrity of the request and response. The concepts related to speech recognition are used for the initiation of the process of the solution, along with the combination of NLP, with its two statistical approaches and neural networks, and cloud technology secures the solution in both directions. The targeted solution does not replace 100 \ 100 the availability, by default, of the service; however, our research aims for a minimum of continuity by preventing the organizational information system from being put into total shutdown mode.

Keywords: Cloud, PSTN, NPL, NLU, AI, MTTR, MTBF, RPO, RTO, SLA, SLO, LSR, SRS

Procedia PDF Downloads 17
313 Plantar Neuro-Receptor Activation in Total Knee Arthroplasty Patients: Impact on Clinical Function, Pain, and Stiffness - A Randomized Controlled Trial

Authors: Woolfrey K., Woolfrey M., Bolton C. L., Warchuk D.

Abstract:

Objectives: Osteoarthritis is the most common joint disease of adults worldwide. Despite total knee arthroplasty (TKA) demonstrating high levels of success, 20% of patients report dissatisfaction with their result. VOXX Wellness Stasis Socks are embedded with a proprietary pattern of neuro-receptor activation points that have been proven to activate a precise neuro-response, according to the pattern theory of haptic perception, which stimulates improvements in pain and function. The use of this technology in TKA patients may prove beneficial as an adjunct to recovery as many patients suffer from deficits to their proprioceptive system caused by ligamentous damage and alterations to mechanoreceptors during the procedure. We hypothesized that VOXX Wellness Stasis Socks are a safe, cost-effective, and easily scalable strategy to support TKA patients through their recovery. Design: Double-blinded, placebo-controlled randomized trial. Participants: Patients scheduled to receive TKA were considered eligible for inclusion in the trial. Interventions: Intervention group (I): VOXX Wellness Stasis socks containing receptor point-activation technology. Control group (C): VOXX Wellness Stasis socks without receptor point-activation technology. Sock use during the waking hours x 6 weeks. Main Outcome Measures: Western Ontario McMaster Universities Osteoarthritis Index (WOMAC) questionnaire completed at baseline, 2 weeks, and 6 weeks to assess pain, stiffness, and physical function. Results: Data analysis using SPSS software. P-values, effect sizes, and confidence intervals are reported to assess clinical relevance of the finding. Physical status classifications were compared using t-test. Within-subject and between-subject differences in the mean WOMAC were analyzed by ANOVA. Effect size was analyzed using Cramer’s V. Consistent improvement in WOMAC scores for pain and stiffness at 2 weeks post op in the I over the C group. The womac scores assessing physical function showed a consistent improvement at both 2 and 6 weeks post op in the I group compared to C group. Conclusions: VOXX proved to be a low cost, safe intervention in TKA to help patients improve with regard to pain, stiffness, and physical function. Disclosures: None

Keywords: osteoarthritis, RCT, pain management, total knee arthroplasty

Procedia PDF Downloads 509
312 An Appraisal of Mining Sector Corporate Social Responsibility Processes in Mhondoro-Ngezi, Zimbabwe

Authors: A. T. Muruviwa

Abstract:

To-date, the discourse on corporate social responsibility (CSR) has primarily centred on the actions and inactions of corporations; hence, the dominant focus on CSR has been on impacts and outcomes. The obscuring effect of this approach has, arguably, resulted in the emergence of what may be termed a ‘Northern’ agenda on CSR theory and practice, in contrast to an emergency ‘Southern’ discourse, which appears to highlight the crucial issues of poverty reduction, infrastructure development and the broader questions of social provisioning and community empowerment. Some scholars have explicitly called for a CSR research agenda that focuses on the 'reciprocal duties' of the stakeholders in the CSR process rather than fixate on the actions and inactions of business. It is against the backdrop of these contestations that this study assesses the reciprocal relationships amongst CSR stakeholders in a Zimbabwean platinum mining town, with a view to demonstrating how such relationships – and the expectations and obligations embedded in them – impact on the success or failure of CSR initiatives. The existence of mutual relations between the corporation and its stakeholders signifies the successes of CSR processes and hence the outcomes. The company is Zimplats Mining Company; the community is Mhondoro-Ngezi, and the stakeholders are clearly identified in the study. The study utilised a triangulated design, with data collected using a mini survey, focus groups, in-depth interview and observation. The key findings are that the CSR process in the study community is dominated by the mining company. Despite the existence of a CSR framework that recognises government, local leaders and community members as legitimate stakeholders, there is little evidence of concrete contributions made by these stakeholders towards the realisation of CSR objectives. As a result, the community development process – in so far as CSR is concerned – fails to address the developmental concerns of the various stakeholders. On the basis of these findings, the study concludes that there is a crisis of reciprocity in the CSR process in Mhondoro-Ngezi, and that a situation where the conceptualisation of local development needs and the deployment of specific development tools seems to be driven by one stakeholder almost to the exclusion of all others, can only present contradictory development outcomes. The significance of this study is that it allows for the development of a more nuanced and robust CSR discourse. Rather than focusing on the corporate and stakeholder perspectives and outcomes of CSR initiatives, this study examines the CSR- development nexus by interrogating the idea of reciprocal responsibility as a sin qua non to CSR success. This analytical strategy and focus allow the researcher to gain a clear understanding of how stakeholder relationships and duties influence CSR processes and also the overall outcome. At a more practical level, the findings of the study should help to shape the policy on corporate community relationships with a view to enhancing the role of mining in development.

Keywords: community development, processes, reciprocity, stakeholders

Procedia PDF Downloads 323
311 The Instrumentalization of Digital Media in the Context of Sexualized Violence

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected.

Keywords: sexualized violence, children and youth, grooming, offender strategies, digital media

Procedia PDF Downloads 163
310 Antimicrobial and Antibiofilm Properties of Fatty Acids Against Streptococcus Mutans

Authors: A. Mulry, C. Kealey, D. B. Brady

Abstract:

Planktonic bacteria can form biofilms which are microbial aggregates embedded within a matrix of extracellular polymeric substances (EPS). They can be found attached to abiotic or biotic surfaces. Biofilms are responsible for oral diseases such as dental caries, gingivitis and the progression of periodontal disease. Biofilms can resist 500 to 1000 times the concentration of biocides and antibiotics used to kill planktonic bacteria. Biofilm development on oral surfaces involves four stages, initial attachment, early development, maturation and dispersal of planktonic cells. The Minimum Inhibitory Concentration (MIC) was determined using a range of saturated and unsaturated fatty acids using the resazurin assay, followed by serial dilution and spot plating on BHI agar plates to establish the Minimum Bactericidal Concentration (MBC). Log reduction of bacteria was also evaluated for each fatty acid. The Minimum Biofilm Inhibition Concentration (MBIC) was determined using crystal violet assay in 96 well plates on forming and pre-formed S. mutans biofilms using BHI supplemented with 1% sucrose. Saturated medium-chain fatty acids Octanoic (C8.0), Decanoic (C10.0) and Undecanoic acid (C11.0) do not display strong antibiofilm properties; however, Lauric (C12.0) and Myristic (C14.0) display moderate antibiofilm properties with 97.83% and 97.5% biofilm inhibition with 1000 µM respectively. Monounsaturated, Oleic acid (C18.1) and polyunsaturated large chain fatty acids, Linoleic acid (C18.2) display potent antibiofilm properties with biofilm inhibition of 99.73% at 125 µM and 100% at 65.5 µM, respectively. Long-chain polyunsaturated Omega-3 fatty acids α-Linoleic (C18.3), Eicosapentaenoic Acid (EPA) (C20.5), Docosahexaenoic Acid (DHA) (C22.6) have displayed strong antibiofilm efficacy from concentrations ranging from 31.25-250µg/ml. DHA is the most promising antibiofilm agent with an MBIC of 99.73% with 15.625µg/ml. This may be due to the presence of six double bonds and the structural orientation of the fatty acid. To conclude, fatty acids displaying the most antimicrobial activity appear to be medium or long-chain unsaturated fatty acids containing one or more double bonds. Most promising agents include Omega-3-fatty acids Linoleic, α-Linoleic, EPA and DHA, as well as Omega-9 fatty acid Oleic acid. These results indicate that fatty acids have the potential to be used as antimicrobials and antibiofilm agents against S. mutans. Future work involves further screening of the most potent fatty acids against a range of bacteria, including Gram-positive and Gram-negative oral pathogens. Future work will involve incorporating the most effective fatty acids onto dental implant devices to prevent biofilm formation.

Keywords: antibiofilm, biofilm, fatty acids, S. mutans

Procedia PDF Downloads 125
309 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 176
308 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 347
307 The Role of the Board of Directors and Chief Executive Officers in Leading and Embedding Corporate Social Responsibility within Corporate Governance Regulations

Authors: Khalid Alshaikh

Abstract:

In recent years, leadership, Corporate Governance (CG) and Corporate Social Responsibility (CSR) have been under scrutiny in the Libyan society. Scholars and institutions have commenced investigating the possible resolutions they can arrange to alleviate the economic, social and environmental problems the war has produced. Thus far, these constructs requisite an in-depth reinvestigation, reconceptualization, and analysis to clearly reconstruct their rules and regulations. With the demise of Qaddafi’s regime, levels, degrees, and efforts to apply CG regulations have varied in public and private commercial banks. CSR is a new organizational culture that still designs its route within these financial institutions. Detaching itself from any notion of dictatorship and autocratic traits, leadership counts on transformational and transactional styles. Therefore, this paper investigates the extent to which the Board of Directors and Chief Executive Officers (CEOs) redefine these concepts and how they entrench CSR within the framework of CG. The research methodology used both public and private banks as a case study and qualitative research to interview ten Board of Directors (BoDs) and eleven Chief executive managers to explore how leadership, CG, and CSR are defined and how leadership integrates CSR into CG structures. The findings suggest that the CG framework in Libya still requires great efforts to be developed. Full CG code implementation appears daunting. Also, the CSR is still influenced by the power of religion. Nevertheless, the Islamic perspective is more consistent with the social contract concept of the CSR. The Libyan commercial banks do not solely focus on the economic side of maximizing profits, but also concentrate on its morality. The issue is that CSR activities are not enough to achieve good charity publicly and needs strategies to address major social issues. Moreover, leadership is more transformational and transactional and endeavors to make economic, social and environmental changes, but these changes are curtailed by tradition and traditional values dominating the Libyan social life where religious and tribal practices establish the relationship between leaders and their subordinates. Finally, the findings reveal that transformational and transactional leadership styles encourage the incorporation of CSR into the CG regulations. The boardroom and executive management have such a particular role in flagging up how embedded corporate Social responsibility is in organizational culture across the commercial banks, yet it is still important that the BoDs and CEOs need to do much more to embed corporate social responsibility through their core functions. They need to boost their standing to be more influential and make sure that the right discussions about CSR happen with the right stakeholders involved.

Keywords: board of directors, chief executive officers, corporate governance, corporate social responsibility

Procedia PDF Downloads 144
306 Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: e-government, m-government, system dependability, system security, trust

Procedia PDF Downloads 360
305 Experimental and Modal Determination of the State-Space Model Parameters of a Uni-Axial Shaker System for Virtual Vibration Testing

Authors: Jonathan Martino, Kristof Harri

Abstract:

In some cases, the increase in computing resources makes simulation methods more affordable. The increase in processing speed also allows real time analysis or even more rapid tests analysis offering a real tool for test prediction and design process optimization. Vibration tests are no exception to this trend. The so called ‘Virtual Vibration Testing’ offers solution among others to study the influence of specific loads, to better anticipate the boundary conditions between the exciter and the structure under test, to study the influence of small changes in the structure under test, etc. This article will first present a virtual vibration test modeling with a main focus on the shaker model and will afterwards present the experimental parameters determination. The classical way of modeling a shaker is to consider the shaker as a simple mechanical structure augmented by an electrical circuit that makes the shaker move. The shaker is modeled as a two or three degrees of freedom lumped parameters model while the electrical circuit takes the coil impedance and the dynamic back-electromagnetic force into account. The establishment of the equations of this model, describing the dynamics of the shaker, is presented in this article and is strongly related to the internal physical quantities of the shaker. Those quantities will be reduced into global parameters which will be estimated through experiments. Different experiments will be carried out in order to design an easy and practical method for the identification of the shaker parameters leading to a fully functional shaker model. An experimental modal analysis will also be carried out to extract the modal parameters of the shaker and to combine them with the electrical measurements. Finally, this article will conclude with an experimental validation of the model.

Keywords: lumped parameters model, shaker modeling, shaker parameters, state-space, virtual vibration

Procedia PDF Downloads 249
304 Stoa: Urban Community-Building Social Experiment through Mixed Reality Game Environment

Authors: Radek Richtr, Petr Pauš

Abstract:

Social media nowadays connects people more tightly and intensively than ever, but simultaneously, some sort of social distance, incomprehension, lost of social integrity appears. People can be strongly connected to the person on the other side of the world but unaware of neighbours in the same district or street. The Stoa is a type of application from the ”serious games” genre- it is research augmented reality experiment masked as a gaming environment. In the Stoa environment, the player can plant and grow virtual (organic) structure, a Pillar, that represent the whole suburb. Everybody has their own idea of what is an acceptable, admirable or harmful visual intervention in the area they live in; the purpose of this research experiment is to find and/or define residents shared subconscious spirit, genius loci of the Pillars vicinity, where residents live in. The appearance and evolution of Stoa’s Pillars reflect the real world as perceived by not only the creator but also by other residents/players, who, with their actions, refine the environment. Squares, parks, patios and streets get their living avatar depictions; investors and urban planners obtain information on the occurrence and level of motivation for reshaping the public space. As the project is in product conceptual design phase, the function is one of its most important factors. Function-based modelling makes design problem modular and structured and thus decompose it into sub-functions or function-cells. Paper discuss the current conceptual model for Stoa project, the using of different organic structure textures and models, user interface design, UX study and project’s developing to the final state.

Keywords: augmented reality, urban computing, interaction design, mixed reality, social engineering

Procedia PDF Downloads 192
303 Graduates Perceptions Towards the Image of Suan Sunandha Rajabhat University on the Graduation Rehearsal Day

Authors: Suangsuda Subjaroen, Chutikarn Sriviboon, Rosjana Chandhasa

Abstract:

This research aims to examine the graduates' overall satisfaction and influential factors that affect the image of Suan Sunandha Rajabhat University, according to the graduates' viewpoints on the graduation rehearsal day. In accordance with the graduates' perceptions, the study is related to the levels of graduates' satisfaction, their perceived quality, perceived value, and the image of Suan Sunandha Rajabhat University. The sample group in this study involved 1,129 graduates of Suan Sunandha Rajabhat University who attended on 2019 graduation rehearsal day. A questionnaire was used as an instrument in order to collect data. By the use of computing software, the statistics used for data analysis were various, ranging from frequencies, percentage, mean, and standard deviation, One-Way ANOVA, and Multiple Regression Analysis. The majority of participants were graduates with a bachelor's degree, followed by masters graduates and PhD graduates, respectively. Among the participants, most of them graduated from the Faculty of Management Sciences, followed by the Faculty of Humanities and Social Sciences and Faculty of Education, respectively. Overall, the graduates were satisfied with the graduation rehearsal day, and each aspect was rated at a satisfactory level. Formality, steps, and procedures were the aspects that graduates were most satisfied with, followed by graduation rehearsal personnel and staff, venue, and facilities. Referring to graduates' perceptions, the perceived quality was rated at a very good level, the perceived value was at a good level, whereas the image of Suan Sunandha Rajabhat University was perceived at a good level, respectively. There were differences in satisfaction levels among graduates with a bachelor's degree, graduates with a master's degree and a doctoral degree with statistical significance at the level of 0.05. There was a statistical significance at the level of 0.05 in perceived quality and perceived value affecting the image of Suan Sunandha Rajabhat University. The image of Suan Sunandha Rajabhat University influenced graduates' satisfaction level with statistical significance at the level of 0.01.

Keywords: university image, perceived quality, perceived value, intention to study higher education, intention to recommend the university to others

Procedia PDF Downloads 90
302 The Image of Suan Sunandha Rajabhat University in Accordance with Graduates' Perceptions on the Graduation Ceremony Day

Authors: Waraphorn Sribuakaew, Chutikarn Sriviboon, Rosjana Chandhasa

Abstract:

The purpose of this research is to study the satisfaction level of graduates and factors that affect the image of Suan Sunandha Rajabhat University based on the perceptions of graduates on the graduation ceremony day. By studying the satisfaction of graduates, the image of Suan Sunandha Rajabhat University according to the graduates' perceptions and the loyalty to the university (in the aspects of intention to continue studying at a higher level, intention to recommend the university to a friend), the sample group used in this study was 1,000 graduates of Suan Sunandha Rajabhat University who participated on the 2019 graduation ceremony day. A questionnaire was utilized as a tool for data collection. By the use of computing software, the statistics used for data analysis were frequencies, percentage, mean, and standard deviation, One-Way ANOVA, and multiple regression analysis. Most of the respondents were graduates with a bachelor's degree, followed by graduates with a master's degree and PhD graduates, respectively. Major participants graduated from the Faculty of Management Sciences, followed by the Faculty of Humanities and Social Sciences and Faculty of Education, respectively. The graduates were satisfied on the ceremony day as a whole and rated each aspect at a satisfactory level. Formality, steps, and procedures were the aspects that graduates were most satisfied with, followed by graduation ceremony personnel and staff, venue, and facilities. On the perception of the graduates, the image of Suan Sunandha Rajabhat University was at a good level, while loyalty to the university was at a very high level. The intention of recommendation to others was at the highest level, followed by the intention to pursue further education at a very high level. The graduates graduating from different faculties have different levels of satisfaction on the graduation day with statistical significance at the level of 0.05. The image of Suan Sunandha Rajabhat University affected the satisfaction of graduates with statistical significance at the level of 0.01. The satisfactory level of graduates on the graduation ceremony day influenced the level of loyalty to the university with statistical significance at the level of 0.05.

Keywords: university image, loyalty to the university, intention to study higher education, intention to recommend the university to others, graduates' satisfaction

Procedia PDF Downloads 105
301 Critical Discourse Analysis Approach to the Post-Feminist Representations in Ecommerce Livestreamings of Lipsticks

Authors: Haiyan Huang, Jan Blommaert, Ellen Van Praet

Abstract:

The embrace of neoliberal economic system in China has engendered the entry of global commodity capitalism into domestic Chinese market and ushered in the post-feminism that is closely associated with consumerism from western culture. Chinese women are instilled and thus hold the belief of empowering themselves and expressing their individualism through consumption. To unravel the consumerist ideologies embedded in Li’s discursive practices, we rely on critical discourse analysis (CDA) as our research framework. The data analyses suggest that cosmopolitanism and class are two repeating themes when Li engages in persuading consumerist behaviors from the female audience. Through hints and cues such as “going on business trips”, “traveling abroad”, “international brands” and among others, Li provides the access to and possibility of imagining cosmopolitan and middle class identity for his audience. Such yearning for western culture and global citizen identity also implicates the aspiration for a well-off socioeconomic status, proving that post-feminism in China not only embodies western consumerism but also implicates the struggle of class movement. These defining elements of choice and freedom are well-situated in contemporary Chinese society where women are enjoying more educational and economic independence than before. However a closer examination reveals conflicts between hegemonic discourse of post-feminism and the status quo. First, propagating women’s power through consumption obscure the entrenched gender inequality in China. Philosophies such as employment discrimination, equal payment, education right, etc., the cornerstones of feminism did not exist in China, leading to historical gender issues unsolved. Second, the lengthy broadcastings (which normally last more than 2 hours) featured with big discounts on products beg the question who are the real audience of ecommerce livestreaming. Seemingly addressing to young well-off Chinese females, Li’s discursive practice can be targeting at young but not wealthy girls who aspire to mimic the lifestyle of middle class women. By selling the idea of empowering and constructing identity through consuming beauty products (e.g., lipsticks), capitalists are endeavoring to create the post-feminism illusion and cause anxieties among Chinese females. Through in-depth analyses of hegemonic discourse on ecommerce livestreaming of lipsticks, the paper contributes to a better understanding of post-feminism in contemporary China and meanwhile illustrates the problems Chinese women face in securing power and equality.

Keywords: Chinese women, critical discourse analysis, ecommerce livestreaming, post-feminism

Procedia PDF Downloads 110
300 Classifying Affective States in Virtual Reality Environments Using Physiological Signals

Authors: Apostolos Kalatzis, Ashish Teotia, Vishnunarayan Girishan Prabhu, Laura Stanley

Abstract:

Emotions are functional behaviors influenced by thoughts, stimuli, and other factors that induce neurophysiological changes in the human body. Understanding and classifying emotions are challenging as individuals have varying perceptions of their environments. Therefore, it is crucial that there are publicly available databases and virtual reality (VR) based environments that have been scientifically validated for assessing emotional classification. This study utilized two commercially available VR applications (Guided Meditation VR™ and Richie’s Plank Experience™) to induce acute stress and calm state among participants. Subjective and objective measures were collected to create a validated multimodal dataset and classification scheme for affective state classification. Participants’ subjective measures included the use of the Self-Assessment Manikin, emotional cards and 9 point Visual Analogue Scale for perceived stress, collected using a Virtual Reality Assessment Tool developed by our team. Participants’ objective measures included Electrocardiogram and Respiration data that were collected from 25 participants (15 M, 10 F, Mean = 22.28  4.92). The features extracted from these data included heart rate variability components and respiration rate, both of which were used to train two machine learning models. Subjective responses validated the efficacy of the VR applications in eliciting the two desired affective states; for classifying the affective states, a logistic regression (LR) and a support vector machine (SVM) with a linear kernel algorithm were developed. The LR outperformed the SVM and achieved 93.8%, 96.2%, 93.8% leave one subject out cross-validation accuracy, precision and recall, respectively. The VR assessment tool and data collected in this study are publicly available for other researchers.

Keywords: affective computing, biosignals, machine learning, stress database

Procedia PDF Downloads 112
299 Finite Element Analysis of a Glass Facades Supported by Pre-Tensioned Cable Trusses

Authors: Khair Al-Deen Bsisu, Osama Mahmoud Abuzeid

Abstract:

Significant technological advances have been achieved in the design and building construction of steel and glass in the last two decades. The metal glass support frame has been replaced by further sophisticated technological solutions, for example, the point fixed glazing systems. The minimization of the visual mass has reached extensive possibilities through the evolution of technology in glass production and the better understanding of the structural potential of glass itself, the technological development of bolted fixings, the introduction of the glazing support attachments of the glass suspension systems and the use for structural stabilization of cables that reduce to a minimum the amount of metal used. The variability of solutions of tension structures, allied to the difficulties related to geometric and material non-linear behavior, usually overrules the use of analytical solutions, letting numerical analysis as the only general approach to the design and analysis of tension structures. With the characteristics of low stiffness, lightweight, and small damping, tension structures are obviously geometrically nonlinear. In fact, analysis of cable truss is not only one of the most difficult nonlinear analyses because the analysis path may have rigid-body modes, but also a time consuming procedure. Non-linear theory allowing for large deflections is used. The flexibility of supporting members was observed to influence the stresses in the pane considerably in some cases. No other class of architectural structural systems is as dependent upon the use of digital computers as are tensile structures. Besides complexity, the process of design and analysis of tension structures presents a series of specificities, which usually lead to the use of special purpose programs, instead of general purpose programs (GPPs), such as ANSYS. In a special purpose program, part of the design know how is embedded in program routines. It is very probable that this type of program will be the option of the final user, in design offices. GPPs offer a range of types of analyses and modeling options. Besides, traditional GPPs are constantly being tested by a large number of users, and are updated according to their actual demands. This work discusses the use of ANSYS for the analysis and design of tension structures, such as cable truss structures under wind and gravity loadings. A model to describe the glass panels working in coordination with the cable truss was proposed. Under the proposed model, a FEM model of the glass panels working in coordination with the cable truss was established.

Keywords: Glass Construction material, Facades, Finite Element, Pre-Tensioned Cable Truss

Procedia PDF Downloads 252
298 Saving Energy through Scalable Architecture

Authors: John Lamb, Robert Epstein, Vasundhara L. Bhupathi, Sanjeev Kumar Marimekala

Abstract:

In this paper, we focus on the importance of scalable architecture for data centers and buildings in general to help an enterprise achieve environmental sustainability. The scalable architecture helps in many ways, such as adaptability to the business and user requirements, promotes high availability and disaster recovery solutions that are cost effective and low maintenance. The scalable architecture also plays a vital role in three core areas of sustainability: economy, environment, and social, which are also known as the 3 pillars of a sustainability model. If the architecture is scalable, it has many advantages. A few examples are that scalable architecture helps businesses and industries to adapt to changing technology, drive innovation, promote platform independence, and build resilience against natural disasters. Most importantly, having a scalable architecture helps industries bring in cost-effective measures for energy consumption, reduce wastage, increase productivity, and enable a robust environment. It also helps in the reduction of carbon emissions with advanced monitoring and metering capabilities. Scalable architectures help in reducing waste by optimizing the designs to utilize materials efficiently, minimize resources, decrease carbon footprints by using low-impact materials that are environmentally friendly. In this paper we also emphasize the importance of cultural shift towards the reuse and recycling of natural resources for a balanced ecosystem and maintain a circular economy. Also, since all of us are involved in the use of computers, much of the scalable architecture we have studied is related to data centers.

Keywords: scalable architectures, sustainability, application design, disruptive technology, machine learning and natural language processing, AI, social media platform, cloud computing, advanced networking and storage devices, advanced monitoring and metering infrastructure, climate change

Procedia PDF Downloads 59
297 The Historical Background of Physical Changing Towards Ancient Mosques in Aceh, Indonesia

Authors: Karima Adilla

Abstract:

Aceh province, into which Islam convinced to have entered Indonesia in the 12th Century before spreading throughout the archipelago and the rest of Southeast Asia, has several early Islamic mosques that still exist until today. However, due to some circumstances, the restoration and rehabilitation towards those mosques have been made in some periods, while the background was diverse. Concerning this, the research will examine the physical changing aspects of 3 prominent historical mosques in Aceh Besar and Banda Aceh; those are, Indrapuri Mosque, Baiturrahman Grand Mosque, and Baiturrahim Mosque built coincided with the beginning of Islam’s development in Aceh and regarded as eventful mosques. The existence of Indrapuri Mosque built on the remains of the Lamuri Kingdom’s temple is a historical trace that there was Hindu-Buddhist civilization in Aceh before Islam entered and became the majority religion about 98% from Aceh total population. Also, there was the Dutch who colonialized Aceh behind the existence of two famous mosques in Aceh, namely Baiturrahman Grand Mosque and Baiturrahim Mosque, as the colonizer also assisted to rebuild those 2 sacred Mosques to quell the anger of the Acehnese people because their mosque was burnt by the Dutch. Interestingly, despite underwent a long history successively since the rise of Islam after the Hindu-Buddhist kingdom had collapsed, colonialization, conflict, in Aceh, and even experienced the earthquake and tsunami disaster in 2004, those mosques still exist. Therefore, those mosques have been considered as historical silent witnesses. However, it was not merely those reasons that led the mosques underwent several physical changes, otherwise economic, political, social, cultural and religious factors were also highly influential. Instead of directly illustrating the physical changing of those three mosques, this research intends to identify under what condition the physical appearance continuously changing during the sultanate era, the colonial period until post-independent in terms of the architectural style, detail elements, design philosophy, and how the remnants buildings act as medium to bridge the history. A framework will use qualitative research methods by collecting actual data of the mosque's physical change figures through field studies, investigations, library studies and interviews. This research aims to define every trace of historical issues embedded in the physical changing of those mosques as they are intertwined in collecting historical proof. Thus, the result will reveal the characteristic interrelation between history, the mosque architectural style in a certain period, the physical changes background and its impact. Eventually, this research will also explicate a clear inference of each mosque’s role in representing history in Aceh Besar and Banda Aceh specifically, as well as Aceh generally through architectural design concepts.

Keywords: Aceh ancient mosques, Aceh history, Islamic architecture, physical changing

Procedia PDF Downloads 110
296 Strategies for Incorporating Intercultural Intelligence into Higher Education

Authors: Hyoshin Kim

Abstract:

Most post-secondary educational institutions have offered a wide variety of professional development programs and resources in order to advance the quality of education. Such programs are designed to support faculty members by focusing on topics such as course design, behavioral learning objectives, class discussion, and evaluation methods. These are based on good intentions and might help both new and experienced educators. However, the fundamental flaw is that these ‘effective methods’ are assumed to work regardless of what we teach and whom we teach. This paper is focused on intercultural intelligence and its application to education. It presents a comprehensive literature review on context and cultural diversity in terms of beliefs, values and worldviews. What has worked well with a group of homogeneous local students may not work well with more diverse and international students. It is because students hold different notions of what is means to learn or know something. It is necessary for educators to move away from certain sets of generic teaching skills, which are based on a limited, particular view of teaching and learning. The main objective of the research is to expand our teaching strategies by incorporating what students bring to the course. There have been a growing number of resources and texts on teaching international students. Unfortunately, they tend to be based on the deficiency model, which treats diversity not as strengths, but as problems to be solved. This view is evidenced by the heavy emphasis on assimilationist approaches. For example, cultural difference is negatively evaluated, either implicitly or explicitly. Therefore the pressure is on culturally diverse students. The following questions reflect the underlying assumption of deficiencies: - How can we make them learn better? - How can we bring them into the mainstream academic culture?; and - How can they adapt to Western educational systems? Even though these questions may be well-intended, there seems to be something fundamentally wrong as the assumption of cultural superiority is embedded in this kind of thinking. This paper examines how educators can incorporate intercultural intelligence into the course design by utilizing a variety of tools such as pre-course activities, peer learning and reflective learning journals. The main goal is to explore ways to engage diverse learners in all aspects of learning. This can be achieved by activities designed to understand their prior knowledge, life experiences, and relevant cultural identities. It is crucial to link course material to students’ diverse interests thereby enhancing the relevance of course content and making learning more inclusive. Internationalization of higher education can be successful only when cultural differences are respected and celebrated as essential and positive aspects of teaching and learning.

Keywords: intercultural competence, intercultural intelligence, teaching and learning, post-secondary education

Procedia PDF Downloads 189
295 Material Use & Life cycle GHG Emissions of Different Electrification Options for Long-Haul Trucks

Authors: Nafisa Mahbub, Hajo Ribberink

Abstract:

Electrification of long-haul trucks has been in discussion as a potential strategy to decarbonization. These trucks will require large batteries because of their weight and long daily driving distances. Around 245 million battery electric vehicles are predicted to be on the road by the year 2035. This huge increase in the number of electric vehicles (EVs) will require intensive mining operations for metals and other materials to manufacture millions of batteries for the EVs. These operations will add significant environmental burdens and there is a significant risk that the mining sector will not be able to meet the demand for battery materials, leading to higher prices. Since the battery is the most expensive component in the EVs, technologies that can enable electrification with smaller batteries sizes have substantial potential to reduce the material usage and associated environmental and cost burdens. One of these technologies is an ‘electrified road’ (eroad), where vehicles receive power while they are driving, for instance through an overhead catenary (OC) wire (like trolleybuses and electric trains), through wireless (inductive) chargers embedded in the road, or by connecting to an electrified rail in or on the road surface. This study assessed the total material use and associated life cycle GHG emissions of two types of eroads (overhead catenary and in-road wireless charging) for long-haul trucks in Canada and compared them to electrification using stationary plug-in fast charging. As different electrification technologies require different amounts of materials for charging infrastructure and for the truck batteries, the study included the contributions of both for the total material use. The study developed a bottom-up approach model comparing the three different charging scenarios – plug in fast chargers, overhead catenary and in-road wireless charging. The investigated materials for charging technology and batteries were copper (Cu), steel (Fe), aluminium (Al), and lithium (Li). For the plug-in fast charging technology, different charging scenarios ranging from overnight charging (350 kW) to megawatt (MW) charging (2 MW) were investigated. A 500 km of highway (1 lane of in-road charging per direction) was considered to estimate the material use for the overhead catenary and inductive charging technologies. The study considered trucks needing an 800 kWh battery under the plug-in charger scenario but only a 200 kWh battery for the OC and inductive charging scenarios. Results showed that overall the inductive charging scenario has the lowest material use followed by OC and plug-in charger scenarios respectively. The materials use for the OC and plug-in charger scenarios were 50-70% higher than for the inductive charging scenarios for the overall system including the charging infrastructure and battery. The life cycle GHG emissions from the construction and installation of the charging technology material were also investigated.

Keywords: charging technology, eroad, GHG emissions, material use, overhead catenary, plug in charger

Procedia PDF Downloads 25
294 Fully Eulerian Finite Element Methodology for the Numerical Modeling of the Dynamics of Heart Valves

Authors: Aymen Laadhari

Abstract:

During the last decade, an increasing number of contributions have been made in the fields of scientific computing and numerical methodologies applied to the study of the hemodynamics in the heart. In contrast, the numerical aspects concerning the interaction of pulsatile blood flow with highly deformable thin leaflets have been much less explored. This coupled problem remains extremely challenging and numerical difficulties include e.g. the resolution of full Fluid-Structure Interaction problem with large deformations of extremely thin leaflets, substantial mesh deformations, high transvalvular pressure discontinuities, contact between leaflets. Although the Lagrangian description of the structural motion and strain measures is naturally used, many numerical complexities can arise when studying large deformations of thin structures. Eulerian approaches represent a promising alternative to readily model large deformations and handle contact issues. We present a fully Eulerian finite element methodology tailored for the simulation of pulsatile blood flow in the aorta and sinus of Valsalva interacting with highly deformable thin leaflets. Our method enables to use a fluid solver on a fixed mesh, whilst being able to easily model the mechanical properties of the valve. We introduce a semi-implicit time integration scheme based on a consistent NewtonRaphson linearization. A variant of the classical Newton method is introduced and guarantees a third-order convergence. High-fidelity computational geometries are built and simulations are performed under physiological conditions. We address in detail the main features of the proposed method, and we report several experiments with the aim of illustrating its accuracy and efficiency.

Keywords: eulerian, level set, newton, valve

Procedia PDF Downloads 251
293 Ultrasonic Studies of Polyurea Elastomer Composites with Inorganic Nanoparticles

Authors: V. Samulionis, J. Banys, A. Sánchez-Ferrer

Abstract:

Inorganic nanoparticles are used for fabrication of various composites based on polymer materials because they exhibit a good homogeneity and solubility of the composite material. Multifunctional materials based on composites of a polymer containing inorganic nanotubes are expected to have a great impact on industrial applications in the future. An emerging family of such composites are polyurea elastomers with inorganic MoS2 nanotubes or MoSI nanowires. Polyurea elastomers are a new kind of materials with higher performance than polyurethanes. The improvement of mechanical, chemical and thermal properties is due to the presence of hydrogen bonds between the urea motives which can be erased at high temperature softening the elastomeric network. Such materials are the combination of amorphous polymers above glass transition and crosslinkers which keep the chains into a single macromolecule. Polyurea exhibits a phase separated structure with rigid urea domains (hard domains) embedded in a matrix of flexible polymer chains (soft domains). The elastic properties of polyurea can be tuned over a broad range by varying the molecular weight of the components, the relative amount of hard and soft domains, and concentration of nanoparticles. Ultrasonic methods as non-destructive techniques can be used for elastomer composites characterization. In this manner, we have studied the temperature dependencies of the longitudinal ultrasonic velocity and ultrasonic attenuation of these new polyurea elastomers and composites with inorganic nanoparticles. It was shown that in these polyurea elastomers large ultrasonic attenuation peak and corresponding velocity dispersion exists at 10 MHz frequency below room temperature and this behaviour is related to glass transition Tg of the soft segments in the polymer matrix. The relaxation parameters and Tg depend on the segmental molecular weight of the polymer chains between crosslinking points, the nature of the crosslinkers in the network and content of MoS2 nanotubes or MoSI nanowires. The increase of ultrasonic velocity in composites modified by nanoparticles has been observed, showing the reinforcement of the elastomer. In semicrystalline polyurea elastomer matrices, above glass transition, the first order phase transition from quasi-crystalline to the amorphous state has been observed. In this case, the sharp ultrasonic velocity and attenuation anomalies were observed near the transition temperature TC. Ultrasonic attenuation maximum related to glass transition was reduced in quasicrystalline polyureas indicating less influence of soft domains below TC. The first order phase transition in semicrystalline polyurea elastomer samples has large temperature hysteresis (> 10 K). The impact of inorganic MoS2 nanotubes resulted in the decrease of the first order phase transition temperature in semicrystalline composites.

Keywords: inorganic nanotubes, polyurea elastomer composites, ultrasonic velocity, ultrasonic attenuation

Procedia PDF Downloads 281