Search results for: Lightning Protection Systems (LPS)
9671 IoT Based Information Processing and Computing
Authors: Mannan Ahmad Rasheed, Sawera Kanwal, Mansoor Ahmad Rasheed
Abstract:
The Internet of Things (IoT) has revolutionized the way we collect and process information, making it possible to gather data from a wide range of connected devices and sensors. This has led to the development of IoT-based information processing and computing systems that are capable of handling large amounts of data in real time. This paper provides a comprehensive overview of the current state of IoT-based information processing and computing, as well as the key challenges and gaps that need to be addressed. This paper discusses the potential benefits of IoT-based information processing and computing, such as improved efficiency, enhanced decision-making, and cost savings. Despite the numerous benefits of IoT-based information processing and computing, several challenges need to be addressed to realize the full potential of these systems. These challenges include security and privacy concerns, interoperability issues, scalability and reliability of IoT devices, and the need for standardization and regulation of IoT technologies. Moreover, this paper identifies several gaps in the current research related to IoT-based information processing and computing. One major gap is the lack of a comprehensive framework for designing and implementing IoT-based information processing and computing systems.Keywords: IoT, computing, information processing, Iot computing
Procedia PDF Downloads 1889670 Cogeneration Unit for Small Stove
Authors: Michal Spilacek, Marian Brazdil, Otakar Stelcl, Jiri Pospisil
Abstract:
This paper shows an experimental testing of a small unit for combustion of solid fuels, such as charcoal and wood logs, that can provide electricity. One of the concepts is that the unit does not require a qualified personnel for its operation. The unit itself is composed of two main parts. The design requires a heat producing stove and an electricity producing thermoelectric generator. After the construction the unit was tested and the results shows that the emission release is within the legislative requirements for emission production and environmental protection. That qualifies such unit for indoor application.Keywords: micro-cogeneration, thermoelectric generator, biomass combustion, wood stove
Procedia PDF Downloads 6179669 Is Maternity Discrimination Pushing Women out of Work? A Case Study of Maternity Experiences of Working Women in Malaysia
Authors: Nor Hafizah Selamat, Intan Hashima Mohd Hashim, Noraida Endut, Shariffah Suraya Syed Jamaludin, Sharifah Zahhura Syed Abdullah, Suziana Mat Yasin, Nurul Jannah Ambak
Abstract:
In Malaysia, report on discrimination against pregnant women at work does exist, and this issue should be taken seriously as large proportion of women in the workforce in Malaysia are of reproductive age. It has been well established that women tend to leave the workforce because of their responsibility in raising the family, to care for family members and, also due to lack of work-life balance. In this case, women find themselves disadvantaged in career and job advancements due to gender roles and expectations connected with maternity. This maternity discrimination have pushed women out of work although The Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW), to which Malaysia is a party, considers discrimination on the ground of maternity is a form of gender discrimination because it hinders women of their effective right to work and requires that special protection be provided for women during maternity to ensure their ability to enjoy the right to work (Article 11(2). What factors prevent women from returning to work and at the same time performing their gender roles expectations? Using semi-structured in-depth interviews this paper explores the experiences of maternity discrimination and their perspectives towards their work employment. 15 women employees who were pregnant or had given birth during her employment period in public and private organizations in Malaysia were participated in this study. While data were analyzed using narrative analysis, respondents were asked on issues related to managing pregnancy, maternity leave and returning to work. The findings revealed that several respondents from private companies stated that they were either dismissed or forced to take unpaid leave due to the company policies. In some cases, respondents also shared how they were treated poorly that they felt that they had to leave their jobs. However, in public organization, the maternity policy implemented showed the support that the employees received from their employer. Study shows that supportive family and employers will encourage employees to return to work. Reasonable adjustments in terms of maternity policies at workplace such as allowing sufficient time in postnatal appointments, offering clear explanation on maternity issues at workplace are something that employees expected from their employers.Keywords: maternity discrimination, women and work, gender, maternity protection, Malaysia
Procedia PDF Downloads 1189668 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 1839667 Need for Policy and Legal Framework for Caste Based Atrocities as Violation of International Human Rights in View of Indian Diaspora
Authors: Vijayalaxmi Khopade
Abstract:
The Prima facie caste system is intrinsic to Indian society. It is an ancient system of intense social stratification based upon birth and enjoying religious sanction. The uppermost strata and privileges are ascribed and enjoyed by brahmins (priestly class), while the lowest strata are occupied by Dalits who are not ascribed with any privileges. The caste system is inherently hierarchical, patriarchal, and systematic and thrives solely on exploitation justified through means of the Brahminical system of hegemony based singularly on birth. The caste system has extended its tentacles to other religions like Christianity, Buddhism, Jainism, and Islam in South Asia. Term Dalit is colloquially used to categorize persons belonging to lower strata in the caste hierarchy. However, this category is heterogenous and highly stratified, following practices like untouchability and exclusion amongst themselves. The modern Indian legal system acknowledges the existence of Caste and its perils. Therefore, by virtue of the Indian Constitution, provisions for affirmative action for the protection and development of Dalits are made. Courts in India have liberally interpreted laws to benefit Dalits. However, the modern system of governance is not immune from Caste based biases. These biases are reflected in the implementation of governance, including the dispensation of justice. The economic reforms of the 1990s gave a huge boost to the Indian diaspora. Persons of Indian origin are now seen making great strides in almost every sector and enjoying positions of power globally. As one peels off the layer of ethnic Indian origin, a deep seated layer of Caste and Caste based patriarchy is clearly visible. Indian diaspora enjoying positions of power essentially belongs to upper castes and carry Caste based biases with them. These castes have long enjoyed the benefits of education; therefore, they were the first ones to benefit from LPG (Liberalization, Privatization, Globalization) model adopted in the 1990s. Dalits, however, had little formal education until recently. The western legal system, to the best of our knowledge, does not recognize Caste and, therefore, cannot afford protection for Dalits, wherein discrimination and exploitation take place solely on the basis of Caste. Therefore, Dalits are left with no legal remedy outside domestic jurisdiction. Countries like the UK have made an attempt to include Caste in their Equality Bill 2010. This has met with tough resistance from Upper caste Hindus who shy away from recognizing their caste privileges and, therefore, the existence of Caste. In this paper, an attempt for comparative analysis is made between various legal protections accorded to Dalits in India vis-à-vis international human rights as protected by the United Nations under its declaration of Universal Human rights. An attempt has been made to mark a distinction between race and Caste and to establish a position of women in Caste based hierarchy. The paper also makes an argument for the inclusion of atrocities committed against Dalits as a violation of international human rights, their protection by the United Nations, and the trial of their violations by International Courts. The paper puts into perspective the need for an external agency like the United Nations and International courts to interfere in rights guaranteed by the Indian Constitution, even with the existence of a modern legal system in a sovereign democratic country.Keywords: atrocity, caste, diaspora, legal framework
Procedia PDF Downloads 2159666 Multi-Agent System Based Solution for Operating Agile and Customizable Micro Manufacturing Systems
Authors: Dylan Santos De Pinho, Arnaud Gay De Combes, Matthieu Steuhlet, Claude Jeannerat, Nabil Ouerhani
Abstract:
The Industry 4.0 initiative has been launched to address huge challenges related to ever-smaller batch sizes. The end-user need for highly customized products requires highly adaptive production systems in order to keep the same efficiency of shop floors. Most of the classical Software solutions that operate the manufacturing processes in a shop floor are based on rigid Manufacturing Execution Systems (MES), which are not capable to adapt the production order on the fly depending on changing demands and or conditions. In this paper, we present a highly modular and flexible solution to orchestrate a set of production systems composed of a micro-milling machine-tool, a polishing station, a cleaning station, a part inspection station, and a rough material store. The different stations are installed according to a novel matrix configuration of a 3x3 vertical shelf. The different cells of the shelf are connected through horizontal and vertical rails on which a set of shuttles circulate to transport the machined parts from a station to another. Our software solution for orchestrating the tasks of each station is based on a Multi-Agent System. Each station and each shuttle is operated by an autonomous agent. All agents communicate with a central agent that holds all the information about the manufacturing order. The core innovation of this paper lies in the path planning of the different shuttles with two major objectives: 1) reduce the waiting time of stations and thus reduce the cycle time of the entire part, and 2) reduce the disturbances like vibration generated by the shuttles, which highly impacts the manufacturing process and thus the quality of the final part. Simulation results show that the cycle time of the parts is reduced by up to 50% compared with MES operated linear production lines while the disturbance is systematically avoided for the critical stations like the milling machine-tool.Keywords: multi-agent systems, micro-manufacturing, flexible manufacturing, transfer systems
Procedia PDF Downloads 1309665 Simplifying the Migration of Architectures in Embedded Applications Introducing a Pattern Language to Support the Workforce
Authors: Farha Lakhani, Michael J. Pont
Abstract:
There are two main architectures used to develop software for modern embedded systems: these can be labelled as “event-triggered” (ET) and “time-triggered” (TT). The research presented in this paper is concerned with the issues involved in migration between these two architectures. Although TT architectures are widely used in safety-critical applications they are less familiar to developers of mainstream embedded systems. The research presented in this paper began from the premise that–for a broad class of systems that have been implemented using an ET architecture–migration to a TT architecture would improve reliability. It may be tempting to assume that conversion between ET and TT designs will simply involve converting all event-handling software routines into periodic activities. However, the required changes to the software architecture are, in many cases rather more profound. The main contribution of the work presented in this paper is to identify ways in which the significant effort involved in migrating between existing ET architectures and “equivalent” (and effective) TT architectures could be reduced. The research described in this paper has taken an innovative step in this regard by introducing the use of ‘Design patterns’ for this purpose for the first time.Keywords: embedded applications, software architectures, reliability, pattern
Procedia PDF Downloads 3299664 Improve Heat Pipes Thermal Performance In H-VAC Systems Using CFD Modeling
Authors: A. Ghanami, M.Heydari
Abstract:
Heat pipe is simple heat transfer device which combines the conduction and phase change phenomena to control the heat transfer without any need for external power source. At hot surface of heat pipe, the liquid phase absorbs heat and changes to vapor phase. The vapor phase flows to condenser region and with the loss of heat changes to liquid phase. Due to gravitational force the liquid phase flows to evaporator section. In HVAC systems the working fluid is chosen based on the operating temperature. The heat pipe has significant capability to reduce the humidity in HVAC systems. Each HVAC system which uses heater, humidifier or dryer is a suitable nominate for the utilization of heat pipes. Generally heat pipes have three main sections: condenser, adiabatic region and evaporator. Performance investigation and optimization of heat pipes operation in order to increase their efficiency is crucial. In present article, a parametric study is performed to improve the heat pipe performance. Therefore, the heat capacity of heat pipe with respect to geometrical and confining parameters is investigated. For the better observation of heat pipe operation in HVAC systems, a CFD simulation in Eulerian- Eulerian multiphase approach is also performed. The results show that heat pipe heat transfer capacity is higher for water as working fluid with the operating temperature of 340 K. It is also showed that the vertical orientation of heat pipe enhances it’s heat transfer capacity.used in the abstract.Keywords: Heat pipe, HVAC system, Grooved Heat pipe, Heat pipe limits.
Procedia PDF Downloads 4829663 Online Bakery Management System Proposal
Authors: Alexander Musyoki, Collins Odour
Abstract:
Over the past few years, the bakery industry in Kenya has experienced significant growth largely in part to the increased adoption of technology and automation in their processes; more specifically due to the adoption of bakery management systems to help in running bakeries. While they have been largely responsible for the improved productivity and efficiency in bakeries, most of them are now outdated and pose more challenges than benefits. The proposed online bakery management system mentioned in this paper aims to address this by allowing bakery owners to track inventory, budget, job progress, and data analytics on each job and in doing so, promote the Sustainable Development Goals 3 and 12, which aim to ensure healthy lives and promote sustainable economic growth as the proposed benefits of these features include scalability, easy accessibility, reduced acquisition costs, better reliability, and improved functionality that will allow bakeries to become more competitive, reduce waste and track inventory more efficiently. To better understand the challenges, a comprehensive study has been performed to assess these traditional systems and try to understand if an online bakery management system can prove to be advantageous to bakery owners. The study conducted gathered feedback from bakery owners and employees in Nairobi County, Kenya using an online survey with a response rate of about 86% from the target population. The responses cited complex and hard to use bakery management systems (59.7%), lack of portability from one device to the other (58.1%) and high acquisition costs (51.6%) as the top challenges of traditional bakery management systems. On the other hand, some of the top benefits that most of the respondents would realize from the online bakery management system was better reliability (58.1%) and reduced acquisition costs (58.1%). Overall, the findings suggest that an online bakery management system has a lot of advantages over traditional systems and is likely to be well-received in the market. In conclusion, the proposed online bakery management system has the potential to improve the efficiency and competitiveness of small-sized bakeries in Nairobi County. Further research is recommended to expand the sample size and diversity of respondents and to conduct more in-depth analyses of the data collected.Keywords: ICT, technology and automation, bakery management systems, food innovation
Procedia PDF Downloads 789662 Towards a Simulation Model to Ensure the Availability of Machines in Maintenance Activities
Authors: Maryam Gallab, Hafida Bouloiz, Youness Chater, Mohamed Tkiouat
Abstract:
The aim of this paper is to present a model based on multi-agent systems in order to manage the maintenance activities and to ensure the reliability and availability of machines just with the required resources (operators, tools). The interest of the simulation is to solve the complexity of the system and to find results without cost or wasting time. An implementation of the model is carried out on the AnyLogic platform to display the defined performance indicators.Keywords: maintenance, complexity, simulation, multi-agent systems, AnyLogic platform
Procedia PDF Downloads 3059661 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints
Authors: Zongjie Wang, Zhizhong Guo
Abstract:
While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.Keywords: optimal power flow, time period, security, economy
Procedia PDF Downloads 4519660 Probabilistic Study of Impact Threat to Civil Aircraft and Realistic Impact Energy
Authors: Ye Zhang, Chuanjun Liu
Abstract:
In-service aircraft is exposed to different types of threaten, e.g. bird strike, ground vehicle impact, and run-way debris, or even lightning strike, etc. To satisfy the aircraft damage tolerance design requirements, the designer has to understand the threatening level for different types of the aircraft structures, either metallic or composite. Exposing to low-velocity impacts may produce very serious internal damages such as delaminations and matrix cracks without leaving visible mark onto the impacted surfaces for composite structures. This internal damage can cause significant reduction in the load carrying capacity of structures. The semi-probabilistic method provides a practical and proper approximation to establish the impact-threat based energy cut-off level for the damage tolerance evaluation of the aircraft components. Thus, the probabilistic distribution of impact threat and the realistic impact energy level cut-offs are the essential establishments required for the certification of aircraft composite structures. A new survey of impact threat to civil aircraft in-service has recently been carried out based on field records concerning around 500 civil aircrafts (mainly single aisles) and more than 4.8 million flight hours. In total 1,006 damages caused by low-velocity impact events had been screened out from more than 8,000 records including impact dents, scratches, corrosions, delaminations, cracks etc. The impact threat dependency on the location of the aircraft structures and structural configuration was analyzed. Although the survey was mainly focusing on the metallic structures, the resulting low-energy impact data are believed likely representative to general civil aircraft, since the service environments and the maintenance operations are independent of the materials of the structures. The probability of impact damage occurrence (Po) and impact energy exceedance (Pe) are the two key parameters for describing the statistic distribution of impact threat. With the impact damage events from the survey, Po can be estimated as 2.1x10-4 per flight hour. Concerning the calculation of Pe, a numerical model was developed using the commercial FEA software ABAQUS to backward estimate the impact energy based on the visible damage characteristics. The relationship between the visible dent depth and impact energy was established and validated by drop-weight impact experiments. Based on survey results, Pe was calculated and assumed having a log-linear relationship versus the impact energy. As the product of two aforementioned probabilities, Po and Pe, it is reasonable and conservative to assume Pa=PoxPe=10-5, which indicates that the low-velocity impact events are similarly likely as the Limit Load events. Combing Pa with two probabilities Po and Pe obtained based on the field survey, the cutoff level of realistic impact energy was estimated and valued as 34 J. In summary, a new survey was recently done on field records of civil aircraft to investigate the probabilistic distribution of impact threat. Based on the data, two probabilities, Po and Pe, were obtained. Considering a conservative assumption of Pa, the cutoff energy level for the realistic impact energy has been determined, which provides potential applicability in damage tolerance certification of future civil aircraft.Keywords: composite structure, damage tolerance, impact threat, probabilistic
Procedia PDF Downloads 3089659 Fostering Social Challenges Within Entrepreneur University Systems: The Case of UPV
Authors: Cristobal Miralles Insa
Abstract:
The network of chairs of the "Valencian Public System of Social Services" (VPSSS) is sponsored by the Valencian Institute of Training, Research, and Quality in Social Services and aims to promote research, dissemination, and evaluation of the needs that arise in the field of the public system of social services. It also seeks to transfer knowledge to foster the development of public policies in this field. Given that it is an Interuniversity Chair among the five public universities in Valencia, there is coordination of complementary themes and roles for this objective, with Universitat Politènica de València focusing primarily on promoting innovation and social entrepreneurship to address multiple social challenges through its platform INSSPIRA. This approach is aimed at the entire university community and its various interest groups, carrying out research, teaching, and dissemination activities that promote social inclusion, personal development, and autonomy for groups in situations of vulnerability, lack of protection, dependence, or social urgency. Although it focuses on the Valencian context, both the issues in this context and the tools in process to address them, often have a universal and scalable character and has been inspiring for the innovation system of UPV. This entrepreneurial incubator goes along from early stages of students on the campus until the so-called “StartUPV” system, where students are challenged with social problems that require creative solutions. Therefore, the Chair is conceived with a holistic spirit and an inspiring vocation that engages the whole university community. In this communication, it is described the entities and individuals participating in this UPV Chair of VPSSS, followed by the presentation of different work lines and objectives for the chair. Subsequently, a description of various activities undertaken to promote innovation in social services are described, where support to teaching and extracurricular activities in this field are exposed. It must be noted that some awareness and dissemination of activities are carried out in a transversal mode as they contribute to different objectives simultaneously; with special focus on Learning-Service approaches that achieved very good results which are also summarized.Keywords: social innovation, entrepeneurship, university, vulnerable sectors
Procedia PDF Downloads 569658 The Modern Significance of Chinese Traditional Gardens for the Development of Modern Eco-Garden Cities
Authors: Liang Zhang
Abstract:
Chinese traditional gardens are the historical and cultural treasures of the whole mankind, among which the excellent parts still have important guiding significance for modern urban design. Based on the background of eco-garden city and reality, through the analysis of various design elements of classical gardens, combined with the needs of today's urban development, starting from the three needs of landscape, energy saving and environmental protection. To explore how Chinese traditional gardens can be revitalized in modern urban planning.Keywords: Chinese traditional gardens, eco-garden city, modern urban planning, urban development
Procedia PDF Downloads 1779657 Integrating Insulated Concrete Form (ICF) with Solar-Driven Reverse Osmosis Desalination for Building Integrated Energy Storage in Cold Climates
Authors: Amirhossein Eisapour, Mohammad Emamjome Kashan, Alan S. Fung
Abstract:
This research addresses the pressing global challenges of clean energy and water supplies, emphasizing the need for sustainable solutions for the building sector. The research centers on integrating Reverse Osmosis (RO) systems with building energy systems, incorporating Solar Thermal Collectors (STC)/Photovoltaic Thermal (PVT), water-to-water heat pumps, and an Insulated Concrete Form (ICF) based building foundation wall thermal energy storage. The study explores an innovative configuration’s effectiveness in addressing water and heating demands through clean energy sources while addressing ICF-based thermal storage challenges, which could overheat in the cooling season. Analyzing four configurations—STC-ICF, STC-ICF-RO, PVT-ICF, and PVT-ICF-RO, the study conducts a sensitivity analysis on collector area (25% and 50% increase) and weather data (evaluating five Canadian cities, Winnipeg, Toronto, Edmonton, Halifax and Vancouver). Key outcomes highlight the benefits of integrated RO scenarios, showcasing reduced ICF wall temperature, diminished unwanted heat in the cooling season, reduced RO pump consumption and enhanced solar energy production. The STC-ICF-RO and PVT-ICF-RO systems achieved energy savings of 653 kWh and 131 kWh, respectively, in comparison to their non-integrated RO counterparts. Additionally, both systems successfully contributed to lowering the CO2 production level of the energy system. The calculated payback period of STC-ICF-RO (2 years) affirms the proposed systems’ economic viability. Compared to the base system, which does not benefit from the ICF and RO integration with the building energy system, the STC-ICF-RO and PVT-ICF-RO demonstrate a dramatic energy consumption reduction of 20% and 32%, respectively. The sensitivity analysis suggests potential system improvements under specific conditions, especially when implementing the introduced energy system in communities of buildings.Keywords: insulated concrete form, thermal energy storage, reverse osmosis, building energy systems, solar thermal collector, photovoltaic thermal, heat pump
Procedia PDF Downloads 549656 Proposals to Increase the Durability of Concrete Affected by Acid Mine Waters
Authors: Cristian Rodriguez, Jose M. Davila, Aguasanta M. Sarmiento, María L. de la Torre
Abstract:
There are many acidic environments that degrade structural concrete, such as those found in water treatment plants, sports facilities, and more, but one of the most aggressive is undoubtedly the water from acid mine drainage. This phenomenon occurs in all pyrite mining facilities and, to a lesser extent, in coal mines and is characterised by very low pH values and high sulphate, metal, and metalloid contents. This phenomenon causes significant damage to the concrete, mainly attacking the binder. In addition, the process is accentuated by the action of acidophilic bacteria, which accelerate the cracking of the concrete. Due to the damage that concrete experiences in acidic environments, the authors of this study aimed to enhance its performance in various aspects. Thus, two solutions have been proposed to improve the concrete durability, acting both on the mass of the material itself with the incorporation of fibres, and on its surface, proposing treatments with two different paints. The incorporation of polypropylene fibres in the concrete mass aims to improve the tensile strength of concrete, being this parameter the most affected in this type of degradation. The protection of the concrete with surface paint is intended to improve the performance against abrasion while reducing the access of water to the interior of the mass of the material. Sulpho-resistant cement has been used in all the mass concrete mixtures that have been prepared, in addition to complying with the requirements of the current Spanish standard, equivalent to the Eurocodes. For the polypropylene fibres, two alternatives have been used, with 1.7 and 3.4 kg/m³, while as surface treatment, the use of two paints has been analysed, one based on polyurethane and the other on asphalt-type paint. The proposed treatments have been analysed by means of indirect tensile tests and pressure sandblasting, thus analysing the effects of abrasion. The results obtained have confirmed a slight increase in the tensile strength of mass concrete by incorporating polypropylene fibres, being slightly higher for a ratio of 3.4 kg/m³, with an improvement of slightly more than 5% in the tensile strength of concrete. However, the use of fibres in concrete greatly reduces the loss of concrete mass due to abrasion. This improvement against abrasion is even more significant when paint is used as an external protection measure, with a much lower loss of mass with both paints. Acknowledgments: This work has been supported by MICIU/AEI/10.13039/501100011033/FEDER, UE, throughout the project PID2021-123130OB-I00.Keywords: degradation, concrete, tensile strength, abrasion
Procedia PDF Downloads 169655 Study of Properties of Concretes Made of Local Building Materials and Containing Admixtures, and Their Further Introduction in Construction Operations and Road Building
Authors: Iuri Salukvadze
Abstract:
Development of Georgian Economy largely depends on its effective use of its transit country potential. The value of Georgia as the part of Europe-Asia corridor has increased; this increases the interest of western and eastern countries to Georgia as to the country that laid on the transit axes that implies transit infrastructure creation and development in Georgia. It is important to use compacted concrete with the additive in modern road construction industry. Even in the 21-century, concrete remains as the main vital constructive building material, therefore innovative, economic and environmentally protected technologies are needed. Georgian construction market requires the use of concrete of new generation, adaptation of nanotechnologies to the local realities that will give the ability to create multifunctional, nano-technological high effective materials. It is highly important to research their physical and mechanical states. The study of compacted concrete with the additives is necessary to use in the road construction in the future and to increase hardness of roads in Georgia. The aim of the research is to study the physical-mechanical properties of the compacted concrete with the additives based on the local materials. Any experimental study needs large number of experiments from one side in order to achieve high accuracy and optimal number of the experiments with minimal charges and in the shortest period of time from the other side. To solve this problem in practice, it is possible to use experiments planning static and mathematical methods. For the materials properties research we will use distribution hypothesis, measurements results by normal law according to which divergence of the obtained results is caused by the error of method and inhomogeneity of the object. As the result of the study, we will get resistible compacted concrete with additives for the motor roads that will improve roads infrastructure and give us saving rate while construction of the roads and their exploitation.Keywords: construction, seismic protection systems, soil, motor roads, concrete
Procedia PDF Downloads 2449654 Model Order Reduction of Continuous LTI Large Descriptor System Using LRCF-ADI and Square Root Balanced Truncation
Authors: Mohammad Sahadet Hossain, Shamsil Arifeen, Mehrab Hossian Likhon
Abstract:
In this paper, we analyze a linear time invariant (LTI) descriptor system of large dimension. Since these systems are difficult to simulate, compute and store, we attempt to reduce this large system using Low Rank Cholesky Factorized Alternating Directions Implicit (LRCF-ADI) iteration followed by Square Root Balanced Truncation. LRCF-ADI solves the dual Lyapunov equations of the large system and gives low-rank Cholesky factors of the gramians as the solution. Using these cholesky factors, we compute the Hankel singular values via singular value decomposition. Later, implementing square root balanced truncation, the reduced system is obtained. The bode plots of original and lower order systems are used to show that the magnitude and phase responses are same for both the systems.Keywords: low-rank cholesky factor alternating directions implicit iteration, LTI Descriptor system, Lyapunov equations, Square-root balanced truncation
Procedia PDF Downloads 4189653 Global Stability Of Nonlinear Itô Equations And N. V. Azbelev's W-method
Authors: Arcady Ponosov., Ramazan Kadiev
Abstract:
The work studies the global moment stability of solutions of systems of nonlinear differential Itô equations with delays. A modified regularization method (W-method) for the analysis of various types of stability of such systems, based on the choice of the auxiliaryequations and applications of the theory of positive invertible matrices, is proposed and justified. Development of this method for deterministic functional differential equations is due to N.V. Azbelev and his students. Sufficient conditions for the moment stability of solutions in terms of the coefficients for sufficiently general as well as specific classes of Itô equations are given.Keywords: asymptotic stability, delay equations, operator methods, stochastic noise
Procedia PDF Downloads 2249652 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 3549651 Introduction of an Approach of Complex Virtual Devices to Achieve Device Interoperability in Smart Building Systems
Authors: Thomas Meier
Abstract:
One of the major challenges for sustainable smart building systems is to support device interoperability, i.e. connecting sensor or actuator devices from different vendors, and present their functionality to the external applications. Furthermore, smart building systems are supposed to connect with devices that are not available yet, i.e. devices that become available on the market sometime later. It is of vital importance that a sustainable smart building platform provides an appropriate external interface that can be leveraged by external applications and smart services. An external platform interface must be stable and independent of specific devices and should support flexible and scalable usage scenarios. A typical approach applied in smart home systems is based on a generic device interface used within the smart building platform. Device functions, even of rather complex devices, are mapped to that generic base type interface by means of specific device drivers. Our new approach, presented in this work, extends that approach by using the smart building system’s rule engine to create complex virtual devices that can represent the most diverse properties of real devices. We examined and evaluated both approaches by means of a practical case study using a smart building system that we have developed. We show that the solution we present allows the highest degree of flexibility without affecting external application interface stability and scalability. In contrast to other systems our approach supports complex virtual device configuration on application layer (e.g. by administration users) instead of device configuration at platform layer (e.g. platform operators). Based on our work, we can show that our approach supports almost arbitrarily flexible use case scenarios without affecting the external application interface stability. However, the cost of this approach is additional appropriate configuration overhead and additional resource consumption at the IoT platform level that must be considered by platform operators. We conclude that the concept of complex virtual devices presented in this work can be applied to improve the usability and device interoperability of sustainable intelligent building systems significantly.Keywords: Internet of Things, smart building, device interoperability, device integration, smart home
Procedia PDF Downloads 2719650 Implementation of Invisible Digital Watermarking
Authors: V. Monisha, D. Sindhuja, M. Sowmiya
Abstract:
Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.Keywords: digital watermarking, DWT, robustness, FPGA
Procedia PDF Downloads 4139649 Diversification of Rice-Based Cropping Systems under Irrigated Condition
Authors: A. H. Nanher, N. P. Singh
Abstract:
In India, Agriculture is largely in rice- based cropping system. It has indicated decline in factor productivity along with emergence of multi - nutrient deficiency, buildup of soil pathogen and weed flora because it operates and removes nutrients from the same rooting depth. In designing alternative cropping systems, the common approaches are crop intensification, crop diversification and cultivar options. The intensification leads to the diversification of the cropping system. Intensification is achieved by introducing an additional component crop in a pre-dominant sequential system by desirable adjustments in cultivars of one or all the component crops. Invariably, this results in higher land use efficiency and productivity per unit time Crop Diversification through such crop and inclusion of fodder crops help to improve the economic situation of small and marginal farmers because of higher income. Inclusion of crops in sequential and intercropping systems reduces some obnoxious weeds through formation of canopies due to competitive planting pattern and thus provides an opportunity to utilize cropping systems as a tool of weed management with non-chemical means. Use of organic source not only acts as supplement for fertilizer (nitrogen) but also improve the physico-chemical properties of soils. Production and use of nitrogen rich biomass offer better prospect for supplementing chemical fertilizers on regular basis. Such biological diversity brings yield and economic stability because of its potential for compensation among components of the system. In a particular agro-climatic and resource condition, the identification of most suitable crop sequence is based on its productivity, stability, land use efficiency as well as production efficiency and its performance is chiefly judged in terms of productivity and net return.Keywords: integrated farming systems, sustainable intensification, system of crop intensification, wheat
Procedia PDF Downloads 4249648 Harmonic Mitigation and Total Harmonic Distortion Reduction in Grid-Connected PV Systems: A Case Study Using Real-Time Data and Filtering Techniques
Authors: Atena Tazikeh Lemeski, Ismail Ozdamar
Abstract:
This study presents a detailed analysis of harmonic distortion in a grid-connected photovoltaic (PV) system using real-time data captured from a solar power plant. Harmonics introduced by inverters in PV systems can degrade power quality and lead to increased Total Harmonic Distortion (THD), which poses challenges such as transformer overheating, increased power losses, and potential grid instability. This research addresses these issues by applying Fast Fourier Transform (FFT) to identify significant harmonic components and employing notch filters to target specific frequencies, particularly the 3rd harmonic (150 Hz), which was identified as the largest contributor to THD. Initial analysis of the unfiltered voltage signal revealed a THD of 21.15%, with prominent harmonic peaks at 150 Hz, 250 Hz and 350 Hz, corresponding to the 3rd, 5th, and 7th harmonics, respectively. After implementing the notch filters, the THD was reduced to 5.72%, demonstrating the effectiveness of this approach in mitigating harmonic distortion without affecting the fundamental frequency. This paper provides practical insights into the application of real-time filtering techniques in PV systems and their role in improving overall grid stability and power quality. The results indicate that targeted harmonic mitigation is crucial for the sustainable integration of renewable energy sources into modern electrical grids.Keywords: grid-connected photovoltaic systems, fast Fourier transform, harmonic filtering, inverter-induced harmonics
Procedia PDF Downloads 349647 The Functional-Engineered Product-Service System Model: An Extensive Review towards a Unified Approach
Authors: Nicolas Haber
Abstract:
The study addresses the design process of integrated product-service offerings as a measure of answering environmental sustainability concerns by replacing stand-alone physical artefacts with comprehensive solutions relying on functional results rather than conventional product sales. However, views regarding this transformation are dissimilar and differentiated: The study discusses the importance and requirements of product-service systems before analysing the theoretical studies accomplished in the extent of their design and development processes. Based on this, a framework, built on a design science approach, is proposed, where the distinct approaches from the literature are merged towards a unified structure serving as a generic methodology to designing product-service systems. Each stage of this model is then developed to present a holistic design proposal called the Functional Engineered Product-Service System (FEPSS) model. Product-service systems are portrayed as customisable solutions tailored to specific settings and defined circumstances. Moreover, the approaches adopted to guide the design process are diversified. A thorough analysis of the design strategies and development processes however, allowed the extraction of a design backbone, valid to varied situations and contexts whether they are product-oriented, use-oriented or result-oriented. The goal is to guide manufacturers towards an eased adoption of these integrated offerings, given their inherited environmental benefits, by proposing a robust all-purpose design process.Keywords: functional product, integrated product-service offerings, product-service systems, sustainable design
Procedia PDF Downloads 2949646 System-Driven Design Process for Integrated Multifunctional Movable Concepts
Authors: Oliver Bertram, Leonel Akoto Chama
Abstract:
In today's civil transport aircraft, the design of flight control systems is based on the experience gained from previous aircraft configurations with a clear distinction between primary and secondary flight control functions for controlling the aircraft altitude and trajectory. Significant system improvements are now seen particularly in multifunctional moveable concepts where the flight control functions are no longer considered separate but integral. This allows new functions to be implemented in order to improve the overall aircraft performance. However, the classical design process of flight controls is sequential and insufficiently interdisciplinary. In particular, the systems discipline is involved only rudimentarily in the early phase. In many cases, the task of systems design is limited to meeting the requirements of the upstream disciplines, which may lead to integration problems later. For this reason, approaching design with an incremental development is required to reduce the risk of a complete redesign. Although the potential and the path to multifunctional moveable concepts are shown, the complete re-engineering of aircraft concepts with less classic moveable concepts is associated with a considerable risk for the design due to the lack of design methods. This represents an obstacle to major leaps in technology. This gap in state of the art is even further increased if, in the future, unconventional aircraft configurations shall be considered, where no reference data or architectures are available. This means that the use of the above-mentioned experience-based approach used for conventional configurations is limited and not applicable to the next generation of aircraft. In particular, there is a need for methods and tools for a rapid trade-off between new multifunctional flight control systems architectures. To close this gap in the state of the art, an integrated system-driven design process for multifunctional flight control systems of non-classical aircraft configurations will be presented. The overall goal of the design process is to find optimal solutions for single or combined target criteria in a fast process from the very large solution space for the flight control system. In contrast to the state of the art, all disciplines are involved for a holistic design in an integrated rather than a sequential process. To emphasize the systems discipline, this paper focuses on the methodology for designing moveable actuation systems in the context of this integrated design process of multifunctional moveables. The methodology includes different approaches for creating system architectures, component design methods as well as the necessary process outputs to evaluate the systems. An application example of a reference configuration is used to demonstrate the process and validate the results. For this, new unconventional hydraulic and electrical flight control system architectures are calculated which result from the higher requirements for multifunctional moveable concept. In addition to typical key performance indicators such as mass and required power requirements, the results regarding the feasibility and wing integration aspects of the system components are examined and discussed here. This is intended to show how the systems design can influence and drive the wing and overall aircraft design.Keywords: actuation systems, flight control surfaces, multi-functional movables, wing design process
Procedia PDF Downloads 1449645 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 3849644 Recommendation Systems for Cereal Cultivation using Advanced Casual Inference Modeling
Authors: Md Yeasin, Ranjit Kumar Paul
Abstract:
In recent years, recommendation systems have become indispensable tools for agricultural system. The accurate and timely recommendations can significantly impact crop yield and overall productivity. Causal inference modeling aims to establish cause-and-effect relationships by identifying the impact of variables or factors on outcomes, enabling more accurate and reliable recommendations. New advancements in causal inference models have been found in the literature. With the advent of the modern era, deep learning and machine learning models have emerged as efficient tools for modeling. This study proposed an innovative approach to enhance recommendation systems-based machine learning based casual inference model. By considering the causal effect and opportunity cost of covariates, the proposed system can provide more reliable and actionable recommendations for cereal farmers. To validate the effectiveness of the proposed approach, experiments are conducted using cereal cultivation data of eastern India. Comparative evaluations are performed against existing correlation-based recommendation systems, demonstrating the superiority of the advanced causal inference modeling approach in terms of recommendation accuracy and impact on crop yield. Overall, it empowers farmers with personalized recommendations tailored to their specific circumstances, leading to optimized decision-making and increased crop productivity.Keywords: agriculture, casual inference, machine learning, recommendation system
Procedia PDF Downloads 809643 Analysis of Threats in Interoperability of Medical Devices
Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar
Abstract:
Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.Keywords: interoperability, threats, attacks, medical devices
Procedia PDF Downloads 3339642 Understanding the Relationship between Community and the Preservation of Cultural Landscape - Focusing on Organically Evolved Landscapes
Authors: Adhithy Menon E., Biju C. A.
Abstract:
Heritage monuments were first introduced to the public in the 1960s when the concept of preserving them was introduced. As a result of the 1990s, the concept of cultural landscapes gained importance, emphasizing the importance of culture and heritage in the context of the landscape. It is important to note that this paper is primarily concerned with the second category of ecological landscapes, which is organically evolving landscapes, as they represent a complex network of tangible, intangible, and environment, and the connections they share with the communities in which they are situated. The United Nations Educational, Scientific, and Cultural Organization has identified 39 cultural sites as being in danger, including the Iranian city of Bam and the historic city of Zabid in Yemen. To ensure its protection in the future, it is necessary to conduct a detailed analysis of the factors contributing to this degradation. An analysis of selected cultural landscapes from around the world is conducted to determine which parameters cause their degradation. The paper follows the objectives of understanding cultural landscapes and their importance for development, followed by examining various criteria for identifying cultural landscapes, their various classifications, as well as agencies that focus on their protection. To identify and analyze the parameters contributing to the deterioration of cultural landscapes based on literature and case studies (cultural landscape of Sintra, Rio de Janeiro, and Varanasi). As a final step, strategies should be developed to enhance deteriorating cultural landscapes based on these parameters. The major findings of the study are the impact of community in the parameters derived - integrity (natural factors, natural disasters, demolition of structures, deterioration of materials), authenticity (living elements, sense of place, building techniques, religious context, artistic expression) public participation (revenue, dependence on locale), awareness (demolition of structures, resource management) disaster management, environmental impact, maintenance of cultural landscape (linkages with other sites, dependence on locale, revenue, resource management). The parameters of authenticity, public participation, awareness, and maintenance of the cultural landscape are directly related to the community in which the cultural landscape is located. Therefore, by focusing on the community and addressing the parameters identified, the deterioration curve of cultural landscapes can be altered.Keywords: community, cultural landscapes, heritage, organically evolved, public participation
Procedia PDF Downloads 87