Search results for: internet usage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3413

Search results for: internet usage

1703 A Two Level Load Balancing Approach for Cloud Environment

Authors: Anurag Jain, Rajneesh Kumar

Abstract:

Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling

Procedia PDF Downloads 431
1702 A Review on Cyberchondria Based on Bibliometric Analysis

Authors: Xiaoqing Peng, Aijing Luo, Yang Chen

Abstract:

Background: Cyberchondria, as an "emerging risk" accompanied by the information era, is a new abnormal pattern characterized by excessive or repeated online searches for health-related information and escalating health anxiety, which endangers people's physical and mental health and poses a huge threat to public health. Objective: To explore and discuss the research status, hotspots and trends of Cyberchondria. Methods: Based on a total of 77 articles regarding "Cyberchondria" extracted from Web of Science from the beginning till October 2019, the literature trends, countries, institutions, hotspots are analyzed by bibliometric analysis, the concept definition of Cyberchondria, instruments, relevant factors, treatment and intervention are discussed as well. Results: Since "Cyberchondria" was put forward for the first time in 2001, the last two decades witnessed a noticeable increase in the amount of literature, especially during 2014-2019, it quadrupled dramatically at 62 compared with that before 2014 only at 15, which shows that Cyberchondria has become a new theme and hot topic in recent years. The United States was the most active contributor with the largest publication (23), followed by England (11) and Australia (11), while the leading institutions were Baylor University(7) and University of Sydney(7), followed by Florida State University(4) and University of Manchester(4). The WoS categories "Psychiatry/Psychology " and "Computer/ Information Science "were the areas of greatest influence. The concept definition of Cyberchondria is not completely unified in the world, but it is generally considered as an abnormal behavioral pattern and emotional state and has been invoked to refer to the anxiety-amplifying effects of online health-related searches. The first and the most frequently cited scale for measuring the severity of Cyberchondria called “The Cyberchondria Severity Scale (CSS) ”was developed in 2014, which conceptualized Cyberchondria as a multidimensional construct consisting of compulsion, distress, excessiveness, reassurance, and mistrust of medical professionals which was proved to be not necessary for this construct later. Since then, the Brazilian, German, Turkish, Polish and Chinese versions were subsequently developed, improved and culturally adjusted, while CSS was optimized to a simplified version (CSS-12) in 2019, all of which should be worthy of further verification. The hotspots of Cyberchondria mainly focuses on relevant factors as follows: intolerance of uncertainty, anxiety sensitivity, obsessive-compulsive disorder, internet addition, abnormal illness behavior, Whiteley index, problematic internet use, trying to make clear the role played by “associated factors” and “anxiety-amplifying factors” in the development of Cyberchondria, to better understand the aetiological links and pathways in the relationships between hypochondriasis, health anxiety and online health-related searches. Although the treatment and intervention of Cyberchondria are still in the initial stage of exploration, there are kinds of meaningful attempts to seek effective strategies from different aspects such as online psychological treatment, network technology management, health information literacy improvement and public health service. Conclusion: Research on Cyberchondria is in its infancy but should be deserved more attention. A conceptual consensus on Cyberchondria, a refined assessment tool, prospective studies conducted in various populations, targeted treatments for it would be the main research direction in the near future.

Keywords: cyberchondria, hypochondriasis, health anxiety, online health-related searches

Procedia PDF Downloads 122
1701 On the Translation of Thai Culture-Specific Terms of Address into English

Authors: Supannee Pinmanee

Abstract:

This article focuses on the strategies in the translation of terms of address for both referential and vocative functions from Thai to English from a cultural perspective. The discussion concerns the culture-specific ways in which Thai people use address terms that depend largely on social and conventional contexts, including pragmatic factors, for example, relationships between people, levels of formality, and attitudes. Examples used to illustrate the problems and proposed solutions were drawn from the media, the internet, the novels and the language used by Thai native speakers in expressing Thai address terms. The terms used in this area show very well not only the differences in language but also the different cultures and world views of the speakers of Thai and those of English. Thai has developed its own set of address terms, particularly kinship terms for non-relatives and the Thai royal terms. Some of Newmark’s procedures (1995) are used in the article to illustrate the task of translating Thai terms into English, a language that embodies a very different culture with its own set of address terms. However, no one strategy can be applied to serve all purposes and to translate all the intended senses. One particular term can be translated by several strategies, and which strategy to choose depends largely on one’s purposes and what requirement one needs to fulfill.

Keywords: translation, terms of address, Thai-English translation, Thai culture-specific terms of address, translation strategies

Procedia PDF Downloads 202
1700 A Deep Learning-Based Pedestrian Trajectory Prediction Algorithm

Authors: Haozhe Xiang

Abstract:

With the rise of the Internet of Things era, intelligent products are gradually integrating into people's lives. Pedestrian trajectory prediction has become a key issue, which is crucial for the motion path planning of intelligent agents such as autonomous vehicles, robots, and drones. In the current technological context, deep learning technology is becoming increasingly sophisticated and gradually replacing traditional models. The pedestrian trajectory prediction algorithm combining neural networks and attention mechanisms has significantly improved prediction accuracy. Based on in-depth research on deep learning and pedestrian trajectory prediction algorithms, this article focuses on physical environment modeling and learning of historical trajectory time dependence. At the same time, social interaction between pedestrians and scene interaction between pedestrians and the environment were handled. An improved pedestrian trajectory prediction algorithm is proposed by analyzing the existing model architecture. With the help of these improvements, acceptable predicted trajectories were successfully obtained. Experiments on public datasets have demonstrated the algorithm's effectiveness and achieved acceptable results.

Keywords: deep learning, graph convolutional network, attention mechanism, LSTM

Procedia PDF Downloads 71
1699 EduEasy: Smart Learning Assistant System

Authors: A. Karunasena, P. Bandara, J. A. T. P. Jayasuriya, P. D. Gallage, J. M. S. D. Jayasundara, L. A. P. Y. P. Nuwanjaya

Abstract:

Usage of smart learning concepts has increased rapidly all over the world recently as better teaching and learning methods. Most educational institutes such as universities are experimenting those concepts with their students. Smart learning concepts are especially useful for students to learn better in large classes. In large classes, the lecture method is the most popular method of teaching. In the lecture method, the lecturer presents the content mostly using lecture slides, and the students make their own notes based on the content presented. However, some students may find difficulties with the above method due to various issues such as speed in delivery. The purpose of this research is to assist students in large classes in the following content. The research proposes a solution with four components, namely note-taker, slide matcher, reference finder, and question presenter, which are helpful for the students to obtain a summarized version of the lecture note, easily navigate to the content and find resources, and revise content using questions.

Keywords: automatic summarization, extractive text summarization, speech recognition library, sentence extraction, automatic web search, automatic question generator, sentence scoring, the term weight

Procedia PDF Downloads 149
1698 An Efficient Resource Management Algorithm for Mobility Management in Wireless Mesh Networks

Authors: Mallikarjuna Rao Yamarthy, Subramanyam Makam Venkata, Satya Prasad Kodati

Abstract:

The main objective of the proposed work is to reduce the overall network traffic incurred by mobility management, packet delivery cost and to increase the resource utilization. The proposed algorithm, An Efficient Resource Management Algorithm (ERMA) for mobility management in wireless mesh networks, relies on pointer based mobility management scheme. Whenever a mesh client moves from one mesh router to another, the pointer is set up dynamically between the previous mesh router and current mesh router based on the distance constraints. The algorithm evaluated for signaling cost, data delivery cost and total communication cost performance metrics. The proposed algorithm is demonstrated for both internet sessions and intranet sessions. The proposed algorithm yields significantly better performance in terms of signaling cost, data delivery cost, and total communication cost.

Keywords: data delivery cost, mobility management, pointer forwarding, resource management, wireless mesh networks

Procedia PDF Downloads 367
1697 The Effects of Information Technology in Urban Health

Authors: Safdari Reza, Zahmatkeshan Maryam, Goli Arji

Abstract:

Background and Aim: Urban health is one of the challenges of the 21st century. Rapid growth and expanding urbanization have implications for health. In this regard, information technology can remove a large number of modern cities’ problems. Therefore, the present article aims to study modern information technologies in the development of urban health. Materials and Methods:. This is a review article based on library research and Internet searches on valid websites such as Science Direct, Magiran, Springer and advanced searches in Google. Some 164 domestic and foreign texts were studied on such topics as the application of ICT tools including cell phones and wireless tools, GIS, and RFID in the field of urban health in 2011. Finally, 30 sources were used. Conclusion: Information and communication technologies play an important role in improving people's health and enhancing the quality of their lives. Effective utilization of information and communication technologies requires the identification of opportunities and constraints, and the formulation of appropriate planning principles with regard to social and economic factors together with preparing the technological, communication and telecommunications, legal and administrative infrastructures.

Keywords: Urban Health, Information Technology, Information & Communication, Technology

Procedia PDF Downloads 463
1696 Study on Beta-Ray Detection System in Water Using a MCNP Simulation

Authors: Ki Hyun Park, Hye Min Park, Jeong Ho Kim, Chan Jong Park, Koan Sik Joo

Abstract:

In the modern days, the use of radioactive substances is on the rise in the areas like chemical weaponry, industrial usage, and power plants. Although there are various technologies available to detect and monitor radioactive substances in the air, the technologies to detect underwater radioactive substances are scarce. In this study, computer simulation of the underwater detection system measuring beta-ray, a radioactive substance, has been done through MCNP. CaF₂, YAP(Ce) and YAG(Ce) have been used in the computer simulation to detect beta-ray as scintillator. Also, the source used in the computer simulation is Sr-90 and Y-90, both of them emitting only pure beta-ray. The distance between the source and the detector was shifted from 1mm to 10mm by 1 mm in the computer simulation. The result indicated that Sr-90 was impossible to measure below 1 mm since its emission energy is low while Y-90 was able to be measured up to 10mm underwater. In addition, the detector designed with CaF₂ had the highest efficiency among 3 scintillators used in the computer simulation. Since it was possible to verify the detectable range and the detection efficiency according to modeling through MCNP simulation, it is expected that such result will reduce the time and cost in building the actual beta-ray detector and evaluating its performances, thereby contributing the research and development.

Keywords: Beta-ray, CaF₂, detector, MCNP simulation, scintillator

Procedia PDF Downloads 510
1695 Chinese Language Teaching as a Second Language: Immersion Teaching

Authors: Lee Bih Ni, Kiu Su Na

Abstract:

This paper discusses the Chinese Language Teaching as a Second Language by focusing on Immersion Teaching. Researchers used narrative literature review to describe the current states of both art and science in focused areas of inquiry. Immersion teaching comes with a standard that teachers must reliably meet. Chinese language-immersion instruction consists of language and content lessons, including functional usage of the language, academic language, authentic language, and correct Chinese sociocultural language. Researchers used narrative literature reviews to build a scientific knowledge base. Researchers collected all the important points of discussion, and put them here with reference to the specific field where this paper is originally based on. The findings show that Chinese Language in immersion teaching is not like standard foreign language classroom; immersion setting provides more opportunities to teach students colloquial language than academic. Immersion techniques also introduce a language’s cultural and social contexts in a meaningful and memorable way. It is particularly important that immersion teachers connect classwork with real-life experiences. Immersion also includes more elements of discovery and inquiry based learning than do other kinds of instructional practices. Students are always and consistently interpreted the conclusions and context clues.

Keywords: a second language, Chinese language teaching, immersion teaching, instructional strategies

Procedia PDF Downloads 452
1694 Role of Social Support in Drug Cessation among Male Addicts in the West of Iran

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh, Fazel Zinat Motlagh

Abstract:

Social support is an important benchmark of health for people in avoidance conditions. The main goal of this study was to determine the three kinds of social support (family, friend and other significant) to drug cessation among male addicts, in Kermanshah, the west of Iran. This cross-sectional study was conducted among 132 addicts, randomly selected to participate voluntarily in the study. Data were collected from conduct interviews based on standard questionnaire and analyzed by using SPSS-18 at 95% significance level. The majority of addicts were young (Mean: 30.4 years), and with little education. Opium (36.4%), Crack (21.2%), and Methamphetamine (12.9%) were the predominant drugs. Inabilities to reject the offer and having addict friends are the most often reasons for drug usage. Almost, 18.9% reported history of drug injection. 43.2% of the participants already did drug cessation at least once. Logistic regression showed the family support (OR = 1.110), age (OR = 1.106) and drug use initiation age (OR = 0.918) was predicting drug cessation. Our result showed; family support is a more important effect among types of social support in drug cessation. It seems that providing educational program to addict’s families for more support of patients at drug cessation can be beneficial.

Keywords: drug cessation, family support, drug use, initiation age

Procedia PDF Downloads 551
1693 Evaluation of Energy Supply and Demand Side Management for Residential Buildings in Ekiti State, Nigeria

Authors: Oluwatosin Samuel Adeoye

Abstract:

Ekiti State is an agrarian state located in south western part of Nigeria. The injected power to the Ado-Ekiti and the entire state are 25MW and 37.6 MW respectively. The estimated power demand for Ado Ekiti and Ekiti state were 29.01MW and 224.116MW respectively. The distributed power to the consumers is characterized with shortcomings which include: in-adequate supply, poor voltage regulation, improper usage, illiteracy and wastage. The power generation in Nigeria is presently 1680.60MW which does not match the estimated power demand of 15,000MW with a population of over 170 million citizens. This paper evaluates the energy utilization in Ado Ekiti metropolis, the wastage and its economic implication as well as effective means of its management. The use of direct interviews, administration of questionnaires, measurements of current and voltage with clamp multimeter, and simple mathematical approach were used for the purpose of evaluation. Recommendations were made with the view of reducing energy waste from mean value of 10.84% to 2% in order to reduce the cost implication such that the huge financial waste can be injected to other parts of the economy as well as the management of energy in Ekiti state.

Keywords: consumers, demand, energy, management, power supply, waste

Procedia PDF Downloads 340
1692 Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions

Authors: Abdulrahman Yarali, Machica McClain

Abstract:

In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era.

Keywords: CPS, IAM, IoT, AI, ML, authentication, models, policies, healthcare

Procedia PDF Downloads 22
1691 E-Book: An Essential Tool for Promoting Reading and Learning Amongst Students of Niger State College of Education, Minna

Authors: Abdulkadir Mustapha Gana, Musa Baba Adamu, Edimeh Augustine Jr

Abstract:

There are growing concerns over the astronomical decline inquality of teaching and learning amongst youths especially in developing countries, and handful research have been conducted in this regard. However, results from many of these studies revealed similar findings which all pointed to the steady decline in quality of teaching and learning across the globe. One common factor attributed for this drawback was the new media due to the evolution and advancement of technology as studies have revealed. In the beginning, what was then the new media (broadcast media of radio and television) was singled out as being responsible for diverting people’s attention from reading; particularly television. At present times, it was revealed that the social media and internet connectivity were responsible for diverting the attention of many, thus distracting attentions from reading. However, it is pertinent to note that the devastating effects, social media platforms have a couple of tools that could improve reading by extension teaching and learning amongst students. Therefore, this study reviewed the literature on the advantageous aspect of social media to reading and learning; whilst laying emphasis on how youths can utilize social media to improve their reading habits.

Keywords: ebook, reading, learning, students

Procedia PDF Downloads 78
1690 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain

Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas

Abstract:

Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.

Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency

Procedia PDF Downloads 153
1689 Stress Recovery and Durability Prediction of a Vehicular Structure with Random Road Dynamic Simulation

Authors: Jia-Shiun Chen, Quoc-Viet Huynh

Abstract:

This work develops a flexible-body dynamic model of an all-terrain vehicle (ATV), capable of recovering dynamic stresses while the ATV travels on random bumpy roads. The fatigue life of components is forecasted as well. While considering the interaction between dynamic forces and structure deformation, the proposed model achieves a highly accurate structure stress prediction and fatigue life prediction. During the simulation, stress time history of the ATV structure is retrieved for life prediction. Finally, the hot sports of the ATV frame are located, and the frame life for combined road conditions is forecasted, i.e. 25833.6 hr. If the usage of vehicle is eight hours daily, the total vehicle frame life is 8.847 years. Moreover, the reaction force and deformation due to the dynamic motion can be described more accurately by using flexible body dynamics than by using rigid-body dynamics. Based on recommendations made in the product design stage before mass production, the proposed model can significantly lower development and testing costs.

Keywords: flexible-body dynamics, veicle, dynamics, fatigue, durability

Procedia PDF Downloads 394
1688 The Access to the City in the Medellín Urban Experience

Authors: Mansilla, Juan Camilo

Abstract:

According to many studies, public space in the cities of Global South is constantly morcellated and captured by a multiplicity of actors in a permanent struggle for power. This imposed public space restricts the access to services and political actions to many inhabitants. The author has conducted several focus group sessions using video in a reflective mode with low-income communities in Medellín, Colombia in order to study how people in this city are shift from a physical public space to a hybrid public space shaped by internet. Beyond the fragmented city and the violent urban context manifested by participants, these activities have highlighted how the access to the city is currently going through a dialectic movement between the physical and the digital space. The purpose of this article is to make explicit the link between this hybrid public space and the boundaries of exclusion in the city. Urban marginality is closely related with the idea of access and space. Low-income communities in Medellín assume the digital realm like a “not controlled space” of resistance, where alternative ways of expression like hip hop movement, graffiti, dance, video and virtual communities produce effective changes in the physical realm.

Keywords: access to the city, hybrid public space, low-income communities, Medellín, urban marginality

Procedia PDF Downloads 494
1687 Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)

Authors: Bassem Boshra Thabet, Mohammed Ibrahim Elsabagh, Mohammad Adly Talaat

Abstract:

The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making.

Keywords: mobile performance monitoring, crowd-sourced applications, mobile broadband performance, cellular networks monitoring

Procedia PDF Downloads 396
1686 Corrosion Properties of Friction Welded Dissimilar Aluminum Alloys; Duralumin and AA6063

Authors: Sori Won, Bosung Seo, Kwangsuk Park, Seok Hong Min, Tae Kwon Ha

Abstract:

With the increased needs for lightweight materials in automobile industry, the usage of aluminum alloys becomes prevailed as components and car bodies due to their comparative specific strength. These parts composed of different aluminum alloys should be connected each other, where welding technologies are commonly applied. Among various welding methods, friction welding method as a solid state welding gets to be popular in joining aluminum alloys as it does not produce a defect such as blowhole that is often formed during typical welding processes. Once two metals are joined, corrosion would become an issue due to different electrochemical potentials. In this study, we investigated variations of corrosion properties when Duralumin and AA6063 were joined by friction welding. From the polarization test, it was found that the potential of the welded was placed between those of two original metals, which could be explained by a concept of mixed potential. Pitting is a common form as a result of the corrosion of aluminum alloys when they are exposed to 3.5 wt% NaCl solution. However, when two different aluminum alloys (Duralumin and AA6063) were joined, pitting corrosion occurred severely and uniformly in Duralumin while there were a few pits around precipitates in AA6063, indicating that AA6063 was cathodically protected.

Keywords: corrosion properties, friction welding, dissimilar Al alloys, polarization test

Procedia PDF Downloads 426
1685 Evaluating the Factors Influencing the Efficiency and Usage of Public Sports Services in a Chinese Province

Authors: Zhankun Wang, Timothy Makubuya

Abstract:

The efficiency of public sports service of prefecture-level cities in Zhejiang from 2008 to 2012 was evaluated by applying the DEA method, then its influencing factors were also analyzed through Tobit model. Upon analysis, the results revealed the following; (i) the change in average efficiency of public sports service in Zhejiang present a smooth uptrend and at a relatively high level from 2008 to 2012 (ii) generally, the productivity of public sports service in Zhejiang improved from 2008 to 2012, the productivity efficiency varied greatly in different years, and the regional difference of production efficiency increased. (iii) The correlations for urbanization rate, aging rate, per capita GDP and the population density were significantly positive with the public sports service efficiency in Zhejiang, of which the most significant was the aging rate. However, the population density and per capita GDP had less impact on the efficiency of public sports service in Zhejiang. In addition, whether the efficiency of public sports services in different areas in Zhejiang reciprocates to overall benefits in public wellbeing in both rural and urban settings is still arguable.

Keywords: DEA model, public sports service, efficiency, Tobit model, Malmquist productivity index, Zhejiang

Procedia PDF Downloads 290
1684 A Study on Manufacturing of Head-Part of Pipes Using a Rotating Manufacturing Process

Authors: J. H. Park, S. K. Lee, Y. W. Kim, D. C. Ko

Abstract:

A large variety of pipe flange is required in marine and construction industry.Pipe flanges are usually welded or screwed to the pipe end and are connected with bolts.This approach is very simple and widely used for a long time, however, it results in high development cost and low productivity, and the productions made by this approach usually have safety problem at the welding area.In this research, a new approach of forming pipe flange based on cold forging and floating die concept is presented.This innovative approach increases the effectiveness of the material usage and save the time cost compared with conventional welding method. To ensure the dimensional accuracy of the final product, the finite element analysis (FEA) was carried out to simulate the process of cold forging, and the orthogonal experiment methods were used to investigate the influence of four manufacturing factors (pin die angle, pipe flange angle, rpm, pin die distance from clamp jig) and predicted the best combination of them. The manufacturing factors were obtained by numerical and experimental studies and it shows that the approach is very useful and effective for the forming of pipe flange, and can be widely used later.

Keywords: cold forging, FEA (finite element analysis), forge-3D, rotating forming, tubes

Procedia PDF Downloads 377
1683 Calculating the Carbon Footprint of Laser Cutting Machines from Cradle to Grave and Examination the Effect of the Use of the Machine on the Carbon Footprint

Authors: Melike Yaylacı, Tuğba Bilgin

Abstract:

Against the climate crisis, an increasing number of countries are working on green energy, carbon emission measurement, calculation and reduction. The work of industrial organizations with the highest carbon emissions on these issues is increasing. Aim of this paper is calculating carbon emissions of laser cutting machine with cradle-to-grave approach and discuss the potential affects of usage condisions, such as laser power, gas type, gas pressure, on carbon footprint. In particular, this study includes consumption of electricity used in production, laser cutting machine raw materials, and disposal of the machine. In the process of raw material supplying, machine procesing and shipping, all calculations were studied using the Tier1 approach. Laser cutting machines require a specified cutting parameter set for each different material in different thickneses, this parameters are a combination of laser power, gas type, cutting speed, gas pressure and focus point, The another purpose of this study is examine the potential affect of different cutting parameters for the same material in same thickness on carbon footprint.

Keywords: life cycle assessment, carbon emission, laser cutting machine, cutting parameters

Procedia PDF Downloads 99
1682 Web Search Engine Based Naming Procedure for Independent Topic

Authors: Takahiro Nishigaki, Takashi Onoda

Abstract:

In recent years, the number of document data has been increasing since the spread of the Internet. Many methods have been studied for extracting topics from large document data. We proposed Independent Topic Analysis (ITA) to extract topics independent of each other from large document data such as newspaper data. ITA is a method for extracting the independent topics from the document data by using the Independent Component Analysis. The topic represented by ITA is represented by a set of words. However, the set of words is quite different from the topics the user imagines. For example, the top five words with high independence of a topic are as follows. Topic1 = {"scor", "game", "lead", "quarter", "rebound"}. This Topic 1 is considered to represent the topic of "SPORTS". This topic name "SPORTS" has to be attached by the user. ITA cannot name topics. Therefore, in this research, we propose a method to obtain topics easy for people to understand by using the web search engine, topics given by the set of words given by independent topic analysis. In particular, we search a set of topical words, and the title of the homepage of the search result is taken as the topic name. And we also use the proposed method for some data and verify its effectiveness.

Keywords: independent topic analysis, topic extraction, topic naming, web search engine

Procedia PDF Downloads 119
1681 Being Chinese Online: Discursive (Re)Production of Internet-Mediated Chinese National Identity

Authors: Zhiwei Wang

Abstract:

Much emphasis has been placed on the political dimension of digitised Chinese national(ist) discourses and their embodied national identities, which neglects other important dimensions constitutive of their discursive nature. A further investigation into how Chinese national(ist) discourses are daily (re)shaped online by diverse socio-political actors (especially ordinary users) is crucial, which can contribute to not only deeper understandings of Chinese national sentiments on China’s Internet beyond the excessive focus on their passionate, political-charged facet but also richer insights into the socio-technical ecology of the contemporary Chinese digital (and physical) world. This research adopts an ethnographic methodology, by which ‘fieldsites’ are Sina Weibo and bilibili. The primary data collection method is virtual ethnographic observation on everyday national(ist) discussions on both platforms. If data obtained via observations do not suffice to answer research questions, in-depth online qualitative interviews with ‘key actors’ identified from those observations in discursively (re)producing Chinese national identity on each ‘fieldsite’ will be conducted, to complement data gathered through the first method. Critical discourse analysis is employed to analyse data. During the process of data coding, NVivo is utilised. From November 2021 to December 2022, 35 weeks’ digital ethnographic observations have been conducted, with 35 sets of fieldnotes obtained. The strategy adopted for the initial stage of observations was keyword searching, which means typing into the search box on Sina Weibo and bilibili any keywords related to China as a nation and then observing the search results. Throughout 35 weeks’ online ethnographic observations, six keywords have been employed on Sina Weibo and two keywords on bilibili. For 35 weeks’ observations, textual content created by ordinary users have been concentrated much upon. Based on the fieldnotes of the first week’s observations, multifarious national(ist) discourses on Sina Weibo and bilibili have been found, targeted both at national ‘Others’ and ‘Us’, both on the historical and real-world dimension, both aligning with and differing from or even conflicting with official discourses, both direct national(ist) expressions and articulations of sentiments in the name of presentation of national(ist) attachments but for other purposes. Second, Sina Weibo and bilibili users have agency in interpreting and deploying concrete national(ist) discourses despite the leading role played by the government and the two platforms in deciding on the basic framework of national expressions. Besides, there are also disputes and even quarrels between users in terms of explanations for concrete components of ‘nation-ness’ and (in)direct dissent to officially defined ‘mainstream’ discourses to some extent, though often expressed much more mundanely, discursively and playfully. Third, the (re)production process of national(ist) discourses on Sina Weibo and bilibili depends upon not only technical affordances and limitations of the two sites but also, to a larger degree, some established socio-political mechanisms and conventions in the offline China, e.g., the authorities’ acquiescence of citizens’ freedom in understanding and explaining concrete elements of national discourses while setting the basic framework of national narratives to the extent that citizens’ own national(ist) expressions do not reach political bottom lines and develop into mobilising power to shake social stability.

Keywords: national identity, national(ist) discourse(s), everyday nationhood/nationalism, Chinese nationalism, digital nationalism

Procedia PDF Downloads 92
1680 Towards Expanding the Use of the Online Judge UnitJudge for Java Programming Exercises and Web Development Practices in Computer Science Education

Authors: Iván García-Magariño, Javier Bravo-Agapito, Marta López-Fernández

Abstract:

Online judges have proven their utility in partial auto-evaluation of programming short exercises in the last decades. UnitJudge online judge has the advantage of facilitating the evaluation of separate units to provide more segregate and meaningful feedback to students in complex exercises and practices. This paper discusses the use of UnitUdge in advanced Java object-oriented programming exercises and web development practices. This later usage has been proposed by means of the Selenium Java library and classes to provide the web address. Consequently, UnitJudge is an online judge system that can be applied in several subjects, and therefore, many other students would take advantage of self-testing their exercises. This paper presents the experiments with a Java programming exercise for learning Java object-oriented classes with a generic type. Considering 10 students who voluntarily used UnitJudge, 80% successfully learned this concept, passing the judge exercise with correct results.

Keywords: online judges, programming skills, computer science education, auto-evaluation

Procedia PDF Downloads 101
1679 Monitoring the Phenomenon of Black Sand in Hurghada’s Artificial Lakes from Sources of Groundwater and Removal Techniques

Authors: Ahmed M. Noureldin, Khaled M. Naguib

Abstract:

This experimental investigation tries to identify the root cause of the black sand issue in one of the man-made lakes in a well-known Hurghada resort. The lake is nourished by the underground wells' source, which continuously empties into the Red Sea. Chemical testing was done by looking at spots of stinky black sand beneath the sandy lake surface. The findings on samples taken from several locations (wells, lake bottom sand samples, and clean sand with exact specifications as bottom sand) indicated the existence of organic sulfur bacteria that are responsible for the phenomena of black sand. Approximately 39.139 mg/kg of sulfide in the form of hydrogen sulfide was present in the lake bottom sand, while 1.145 mg/kg, before usage, was in the bare sand. The study also involved modeling with the GPS-X program for cleaning bottom sand that uses hydro cyclones as a physical-mechanical treatment method. The modeling findings indicated a Total Organic Carbon (TOC) removal effectiveness of 0.65%. The research recommended using hydro cyclones to routinely mechanically clear the sand from lake bottoms.

Keywords: man-made lakes, organic sulfur bacteria, total organic carbon, hydro cyclone

Procedia PDF Downloads 73
1678 The Impact of Student-Led Entrepreneurship Education through Skill Acquisition in Federal Polytechnic, Bida, Niger State, Nigeria

Authors: Ibrahim Abubakar Mikugi

Abstract:

Nigerian graduates could only be self-employed and marketable if they acquire relevant skills and knowledge for successful establishment in various occupation and gainful employment. Research has shown that entrepreneurship education will be successful through developing individual entrepreneurial attitudes, raising awareness of career options by integrating and inculcating a positive attitude in the mind of students through skill acquisition. This paper examined the student- led entrepreneurship education through skill acquisition with specific emphasis on analysis of David Kolb experiential learning cycle. This Model allows individual to review their experience through reflection and converting ideas into action by doing. The methodology used was theoretical approach through journal, internet and Textbooks. Challenges to entrepreneurship education through skill acquisition were outlined. The paper concludes that entrepreneurship education is recognised by both policy makers and academics; entrepreneurship is more than mere encouraging business start-ups. Recommendations were given which include the need for authorities to have a clear vision towards entrepreneurship education and skill acquisition. Authorities should also emphasise a periodic and appropriate evaluation of entrepreneurship and to also integrate into schools academic curriculum to encourage practical learning by doing.

Keywords: entrepreneurship, entrepreneurship education, active learning, Cefe methodology

Procedia PDF Downloads 521
1677 The Dynamic Cone Penetration Test: A Review of Its Correlations and Applications

Authors: Abdulrahman M. Hamid

Abstract:

Dynamic Cone Penetration Test (DCPT) is widely used for field quality assessment of soils. Its application to predict the engineering properties of soil is globally promoted by the fact that it is difficult to obtain undisturbed soil samples, especially when loose or submerged sandy soil is encountered. Detailed discussion will be presented on the current development of DCPT correlations with resilient modulus, relative density, California Bearing Ratio (CBR), unconfined compressive strength and shear strength that have been developed for different materials in both the laboratory and field, as well as on the usage of DCPT in quality control of compaction of earth fills and performance evaluation of pavement layers. In addition, the relationship of the DCPT with other instruments such as falling weight deflectometer, nuclear gauge, soil stiffens gauge, and plate load test will be reported. Lastely, the application of DCPT in Saudi Arabia in recent years will be addressed in this manuscript.

Keywords: dynamic cone penetration test, falling weight deflectometer, nuclear gauge, soil stiffens gauge, plate load test, automated dynamic cone penetration

Procedia PDF Downloads 434
1676 Exploiting SLMail Server with a Developed Buffer Overflow with Kali Linux

Authors: Senesh Wijayarathne

Abstract:

This study focuses on how someone could develop a Buffer Overflow and could use that to exploit the SLMail Server. This study uses a Kali Linux V2018.4 Virtual Machine and Windows 7 - Internet Explorer V8 Virtual Machine (IPv4 Address - 192.168.56.107). This study starts by sending continued bytes to the SLMail Server to find the crashing point range and creating a unique pattern of the length of the crashing point range to control the Extended Instruction Pointer (EIP). Then by sending all characters to SLMail Server, we could observe and find which characters are not rendered properly by the software, also known as Bad Characters. By finding the ‘Jump to the ESP register (JMP ESP) and with the help of ‘Mona Modules’, we could use msfvenom to create a non-stage windows reverse shell payload. By including all the details gathered previously on one script, we could get a system-level reverse shell of the Windows 7 PC. The end of this paper will discuss how to mitigate this vulnerability.

Keywords: slmail server, extended instruction pointer, jump to the esp register, bad characters, virtual machine, windows 7, kali Linux, buffer overflow, Seattle lab, vulnerability

Procedia PDF Downloads 166
1675 Impact of Different Modulation Techniques on the Performance of Free-Space Optics

Authors: Naman Singla, Ajay Pal Singh Chauhan

Abstract:

As the demand for providing high bit rate and high bandwidth is increasing at a rapid rate so there is a need to see in this problem and finds a technology that provides high bit rate and also high bandwidth. One possible solution is by use of optical fiber. Optical fiber technology provides high bandwidth in THz. But the disadvantage of optical fiber is of high cost and not used everywhere because it is not possible to reach all the locations on the earth. Also high maintenance required for usage of optical fiber. It puts a lot of cost. Another technology which is almost similar to optical fiber is Free Space Optics (FSO) technology. FSO is the line of sight technology where modulated optical beam whether infrared or visible is used to transfer information from one point to another through the atmosphere which works as a channel. This paper concentrates on analyzing the performance of FSO in terms of bit error rate (BER) and quality factor (Q) using different modulation techniques like non return to zero on off keying (NRZ-OOK), differential phase shift keying (DPSK) and differential quadrature phase shift keying (DQPSK) using OptiSystem software. The findings of this paper show that FSO system based on DQPSK modulation technique performs better.

Keywords: attenuation, bit rate, free space optics, link length

Procedia PDF Downloads 347
1674 Performance Evaluation and Dear Based Optimization on Machining Leather Specimens to Reduce Carbonization

Authors: Khaja Moiduddin, Tamer Khalaf, Muthuramalingam Thangaraj

Abstract:

Due to the variety of benefits over traditional cutting techniques, the usage of laser cutting technology has risen substantially in recent years. Hot wire machining can cut the leather in the required shape by controlling the wire by generating thermal energy. In the present study, an attempt has been made to investigate the effects of performance measures in the hot wire machining process on cutting leather specimens. Carbonization and material removal rates were considered as quality indicators. Burning leather during machining might cause carbon particles, reducing product quality. Minimizing the effect of carbon particles is crucial for assuring operator and environmental safety, health, and product quality. Hot wire machining can efficiently cut the specimens by controlling the current through it. Taguchi- DEAR-based optimization was also performed in the process, which resulted in a required Carbonization and material removal rate. Using the DEAR approach, the optimal parameters of the present study were found with 3.7% prediction error accuracy.

Keywords: cabronization, leather, MRR, current

Procedia PDF Downloads 64