Search results for: space codes
2103 Diasporic Literature
Authors: Shamsher Singh
Abstract:
The Diaspora Literature involves a concept of native land, from where the displacement occurs and a record of harsh journeys undertaken on account of economic compulsions. Basically, Diaspora is a splintered community living in eviction. The scattering (initially) signifies the location of a fluid human autonomous space involving a complex set of negotiations and exchange between the nostalgia and desire for the native land and the making of a new home, adapting to the relationships between the minority and majority, being spokes persons for minority rights and their people back native place and significantly transacting the Contact Zone - a space changed with the possibility of multiple challenges. They write in the background of the sublime qualities of their homeland and, at the same time, try to fit themselves into the traditions and cultural values of other strange communities or land. It also serves as an interconnection of the various cultures involved, and it is used to understand the customs of different cultures and countries; it is also a source of inspiration globally. Although diasporic literature originated back in the 20th century, it spread to other countries like Britain, Canada, America, Denmark, Netherland, Australia, Kenya, Sweden, Kuwait and different parts of Europe. Meaning of Diaspora is the combination of two words which means the movement of people away from their own country or motherland. From a historical point of view, the ‘Diaspora’ is often associated with Jewish bigotry. At the moment, the Diaspora is used for the dispersal of social or cultural groups. This group will be living in two different streams of cultures at the same time. One who left behind his culture and the other has to adapt himself to new cultural situations. The diasporic mind hangs between his birth land and place of work at the same time. A person’s mental state, living in dual existence, gives birth to Dysphoria sensation. Litterateurs had different experiences in this type of sensation e.g., social, universal, political, economic and experiences from the strange land. The struggle of these experiences is seen in diasporic literature. When a person moves to different land or country to fulfill his dreams, the discrimination of language, work and other difficulties with strangers make his relationship more emotional and deeper into his past. These past memories and relations create more difficulties in settling in a foreign land. He lives there physically, but his mental state is in his past constantly, and he ends up his life in those background memories. A person living in Diaspora is actually a dual visionary man. Although this double vision expands his global consciousness, due to this vision, he gains judgemental qualities to understand others. At the same time, he weighs his respect for his native land and the situations of foreign land he experiences, and he finds it difficult to survive in those conditions. It can be said that diaspora literature indicates a person or social organization who lives dual life inquisition structure which becomes the cause of diasporic literature.Keywords: homeland sickness, language problem, quest for identity, materialistic desire
Procedia PDF Downloads 692102 Preparation and Characterization of Lanthanum Aluminate Electrolyte Material for Solid Oxide Fuel Cell
Authors: Onkar Nath Verma, Nitish Kumar Singh, Raghvendra, Pravin Kumar, Prabhakar Singh
Abstract:
The perovskite type electrolyte material LaAlO3 was prepared by solution based auto-combustion method using Al (NO3)3.6H2O, La2O3 with dilute nitrate acid (HNO3) as precursors and citric acid (C6H8O7.H2O) as a fuel. The synthesis protocol gave an easy processing of the LaAlO3 nano-particles. The XRD measurement revealed that the material has single phase with space group R-3c (rhombohedral). Thermal behavior was measured by simultaneous differential thermal analysis and thermo gravimetric analysis (DTA-TGA). The compact pellet density was determined. Also, the surface morphology was studied using scanning electron microscopy (SEM). The conductivity of LaAlO3 was measured employing LCR meter and found to increase with increasing temperature. This increase in conductivity may be attributed to increased mobility of oxide ion.Keywords: perovskite, LaAlO3, XRD, SEM, DTA-TGA, SOFC
Procedia PDF Downloads 5062101 Strategies for the Oral Delivery of Oligonucleotides
Authors: Venkat Garigapati
Abstract:
To date, more than a dozen oligonucleotide products are approved as injectable products for clinical use. However, there is no single oligo nucleotide product approved for clinical use. Oral delivery of oligo nucleotides is patient friendly administration however, many challenges involved in the development of oral formulation. Over the course of last twenty plus years, the research in this space aimed to address these challenges. This paper describes the issues involved in solubility, stability, enzymatic (nuclease) induced degradation, and permeation of nucleotides in the Gastrointestinal (GI) and how to overcome these challenges. Also, the translation of in vitro data to in vivo models hinders the formulation development. This paper describes the challenges involved in the development of Oligo Nucleotide products for oral administration. It also discusses the chemistry and formulation strategies for oral administration of oligonucleotides.Keywords: oral adminstration, oligo nucleotides, stability, permeation, gastrointestinal tract
Procedia PDF Downloads 912100 Comparative Study on Fire Safety Evaluation Methods for External Cladding Systems: ISO 13785-2 and BS 8414
Authors: Kyungsuk Cho, H. Y. Kim, S. U. Chae, J. H. Choi
Abstract:
Technological development has led to the construction of super-tall buildings and insulators are increasingly used as exterior finishing materials to save energy. However, insulators are usually combustible and vulnerable to fire. Fires like that at Wooshin Golden Suite Building in Busan, Korea in 2010 and that at CCTV Building in Beijing, China are the major examples of fire spread accelerated by combustible insulators. The exterior finishing materials of a high-rise building are not made of insulators only, but they are integrated with the building’s external cladding system. There is a limit in evaluating the fire safety of a cladding system with a single small-unit material such as a cone calorimeter. Therefore, countries provide codes to evaluate the fire safety of exterior finishing materials using full-scale tests. This study comparesKeywords: external cladding systems, fire safety evaluation, ISO 13785-2, BS 8414
Procedia PDF Downloads 2442099 The Role of Metal-Induced Gap States in the Superconducting Qubit Decoherence at Low-Dimension
Authors: Dominik Szczesniak, Sabre Kais
Abstract:
In the present communication, we analyze selected local aspects of the metal-induced gap states (MIGSs) that may be responsible for the magnetic flux noise in some of the superconducting qubit modalities at low-dimension. The presented theoretical analysis stems from the earlier bulk considerations and is aimed at further explanation of the decoherence effect by recognizing its universal character. Specifically, the analysis is carried out by using the complex band structure method for arbitrary low-dimensional junctions. This allows us to provide the most fundamental and general observations for the systems of interest. In particular, herein, we investigate in detail the MIGSs behavior in the momentum space as a function of the potential fluctuations and the electron-electron interaction magnitude at the interface. In what follows, this study is meant to provide a direct relationship between the MIGSs behavior, the discussed decoherence effect, and the intrinsic properties of the low-dimensional Josephson junctions.Keywords: superconducting qubits, metal-induced gap states, decoherence, low-dimension
Procedia PDF Downloads 1412098 A Hybrid Distributed Algorithm for Multi-Objective Dynamic Flexible Job Shop Scheduling Problem
Authors: Aydin Teymourifar, Gurkan Ozturk
Abstract:
In this paper, a hybrid distributed algorithm has been suggested for multi-objective dynamic flexible job shop scheduling problem. The proposed algorithm is high level, in which several algorithms search the space on different machines simultaneously also it is a hybrid algorithm that takes advantages of the artificial intelligence, evolutionary and optimization methods. Distribution is done at different levels and new approaches are used for design of the algorithm. Apache spark and Hadoop frameworks have been used for the distribution of the algorithm. The Pareto optimality approach is used for solving the multi-objective benchmarks. The suggested algorithm that is able to solve large-size problems in short times has been compared with the successful algorithms of the literature. The results prove high speed and efficiency of the algorithm.Keywords: distributed algorithms, apache-spark, Hadoop, flexible dynamic job shop scheduling, multi-objective optimization
Procedia PDF Downloads 3582097 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses
Authors: Pooja Bakshi
Abstract:
In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia
Procedia PDF Downloads 4962096 Developing Cultural Competence as Part of Nursing Studies: Language, Customs and Health Issues
Authors: Mohammad Khatib, Salam Hadid
Abstract:
Introduction: Developing nurses' cultural competence begins in their basic training and requires them to participate in an array of activities which raise their awareness and stimulate their interest, desire and curiosity about different cultures, by creating opportunities for intercultural meetings promoting the concept of 'culture' and its components, including recognition of cultural diversity and the legitimacy of the other. Importantly, professionals need to acquire specific cultural knowledge and thorough understanding of the values, norms, customs, beliefs and symbols of different cultures. Similarly, they need to be given opportunities to practice the verbal and non-verbal communication skills of other cultures according to their cultural codes. Such a system is being implemented as part of nursing studies at Zefat Academic College in two study frameworks; firstly, a course integrating nursing theory and practice in multicultural nursing; secondly, a course in learning the languages spoken in Israel focusing on medical and nursing terminology. Methods: Students participating in the 'Transcultural Nursing' course come from a variety of backgrounds: Jews, or Arabs, religious, or secular; Muslim, Christian, new immigrants, Ethiopians or from other cultural affiliations. They are required to present and discuss cultural practices that affect health. In addition, as part of the language course, students learn and teach their friends 5 spoken languages (Arabic, Russian, Amharian, Yidish, and Sign language) focusing on therapeutic interaction and communication using the vocabulary and concepts necessary for the therapeutic encounter. An evaluation of the process and the results was done using a structured questionnaire which includes series of questions relating to the contributions of the courses to their cultural knowledge, awareness and skills. 155 students completed the questionnaire. Results: A preliminary assessment of this educational system points an increase in cultural awareness and knowledge among the students as well as in their willingness to recognize the other's difference. A positive atmosphere of multiculturalism is reflected in students' mutual interest and respect was created. Students showed a deep understanding of cultural issues relating to health and care (consanguinity and genetics, food customs; cultural events, reincarnation, traditional treatments etc.). Most of the students were willing to recommend the courses to others and suggest some changes relating learning methods (more simulations, role playing and activities).Keywords: cultural competence, nursing education, culture, language
Procedia PDF Downloads 2792095 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 3382094 Issues and Challenges in Social Work Field Education: The Field Coordinator's Perspective
Authors: Tracy B.E. Omorogiuwa
Abstract:
Understanding the role of social work in improving societal well-being cannot be separated from the place of field education, which is an integral aspect of social work education. Field learning provides students with knowledge and opportunities to experience solving issues in the field and giving them a clue of the practice situation. Despite being a crucial component in social work curriculum, field education occupies a large space in learning outcome, given the issues and challenges pertaining to its purpose and significance in the society. The drive of this paper is to provide insight on the specific ways in which field education has been conceived, realized and valued in the society. Emphasis is on the significance of field instruction; the link with classroom learning; and the structure of field experience in social work education. Given documented analysis and experience, this study intends to contribute to the development of social work curriculum, by analyzing the pattern, issues and challenges fronting the social work field education in the University of Benin, Nigeria.Keywords: challenges, curriculum, field education, social work education
Procedia PDF Downloads 3032093 Dissolved Gas Analysis Based Regression Rules from Trained ANN for Transformer Fault Diagnosis
Authors: Deepika Bhalla, Raj Kumar Bansal, Hari Om Gupta
Abstract:
Dissolved Gas Analysis (DGA) has been widely used for fault diagnosis in a transformer. Artificial neural networks (ANN) have high accuracy but are regarded as black boxes that are difficult to interpret. For many problems it is desired to extract knowledge from trained neural networks (NN) so that the user can gain a better understanding of the solution arrived by the NN. This paper applies a pedagogical approach for rule extraction from function approximating neural networks (REFANN) with application to incipient fault diagnosis using the concentrations of the dissolved gases within the transformer oil, as the input to the NN. The input space is split into subregions and for each subregion there is a linear equation that is used to predict the type of fault developing within a transformer. The experiments on real data indicate that the approach used can extract simple and useful rules and give fault predictions that match the actual fault and are at times also better than those predicted by the IEC method.Keywords: artificial neural networks, dissolved gas analysis, rules extraction, transformer
Procedia PDF Downloads 5392092 Hydrogeological Study of the Different Aquifers in the Area of Biskra
Authors: A. Sengouga, Y. Imessaoudene, A. Semar, B. Mouhouche, M. Kadir
Abstract:
Biskra or Zibans, is located in a structural transition zone between the chain of the Saharan Atlas Mountains and the Sahara. It is an arid region where the superficial water resource is the mild, hence the importance of the lithological description and the evaluation of aquifers rock’s volumes, which are highly dependent on the mobilized water contained in the various reservoirs (Quaternary, Mio-Pliocene, Eocene and Continental intercalary). Through a data synthesis which is particularly based on stratigraphic logs of drilling, the description of aquifers heterogeneity and the determining of the spatial variability of aquifer appearance became possible, by using geostatistical analysis, which allowed the representation of the aquifer thicknesses mapping and their space variation. The different thematic maps realized focus on drilling position, the substratum shape and finally the aquifers thicknesses of the region. It is found that the high density of water points especially these of drilling points are superposed on the hydrologic reservoirs with significant thicknesses.Keywords: log stratigraphic ArcGIS 10, geometry of aquifers, rocks reservoir volume, Biskra
Procedia PDF Downloads 4622091 Private Coded Computation of Matrix Multiplication
Authors: Malihe Aliasgari, Yousef Nejatbakhsh
Abstract:
The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers
Procedia PDF Downloads 1252090 Dimensions of Guest Experience in Themed Hotels
Authors: Katalin Juhasz-Dora
Abstract:
Several studies have shown that physical environments, milieu, atmosphere and service space play a significant role in the consumer experience. In the case of themed servicescapes, different tangible assets (design, decoration, facilities, amenities), intangible assets (service, activities) contribute to the luxury guest experience. This current study summarizes the literature related to the guest experience in the case of luxury hotels. Based on the results of a case study, additional dimensions of guest experience are explored. The research findings contribute to the extension of literature by providing a conceptual framework in specific themed luxury hotels. Understanding the elements of themed servicescape and dimensions of guest experience play a significant role in consumer behavior. Implications for management and future research directions are presented.Keywords: atmosphere, guest experience, luxury service, themed hotel
Procedia PDF Downloads 1672089 Study the Effect of Dermal Application of Stone Hair Dye on Experimental Animals
Authors: Hatem Abdel Moniem Ahmed, Ragaa Mohamed Abdel Maaboud, Heba A. Mubarak
Abstract:
A commercially available Stone Hair Dye (SHD) was spread in Upper Egypt and used for dying woman's hair. Paraphenyl-diamine (PPD) is the main component of SHD and reported as a toxic substance. This work aims to study the systemic effects induced in experimental animals as a result of dermal application of SHD. 21 rats were divided into three groups, and doses of SHD and PPD were applied according to body weight (25 mg/100 g body weight) for 90 days. The results revealed that insignificant decrease in RBC count and Hb level, but there were significant increases in the WBC count, AST, ALT, GPT, and total protein while creatinine level was insignificantly increased. Hepatocytes showed a lot of degenerative changes in the form of vacuolated cytoplasm and irregular deeply stained nuclei with vascular congestion and lymphocytic infiltration, while renal affection indicated the occurrence of atrophy of glomerular capillaries, hyperplasia, and widening of bowman space.Keywords: PPD, SHD, rats and histology, biochemistry and hematology
Procedia PDF Downloads 4542088 Seismic Fragility Assessment of Continuous Integral Bridge Frames with Variable Expansion Joint Clearances
Authors: P. Mounnarath, U. Schmitz, Ch. Zhang
Abstract:
Fragility analysis is an effective tool for the seismic vulnerability assessment of civil structures in the last several years. The design of the expansion joints according to various bridge design codes is almost inconsistent, and only a few studies have focused on this problem so far. In this study, the influence of the expansion joint clearances between the girder ends and the abutment backwalls on the seismic fragility assessment of continuous integral bridge frames is investigated. The gaps (ranging from 60 mm, 150 mm, 250 mm and 350 mm) are designed by following two different bridge design code specifications, namely, Caltrans and Eurocode 8-2. Five bridge models are analyzed and compared. The first bridge model serves as a reference. This model uses three-dimensional reinforced concrete fiber beam-column elements with simplified supports at both ends of the girder. The other four models also employ reinforced concrete fiber beam-column elements but include the abutment backfill stiffness and four different gap values. The nonlinear time history analysis is performed. The artificial ground motion sets, which have the peak ground accelerations (PGAs) ranging from 0.1 g to 1.0 g with an increment of 0.05 g, are taken as input. The soil-structure interaction and the P-Δ effects are also included in the analysis. The component fragility curves in terms of the curvature ductility demand to the capacity ratio of the piers and the displacement demand to the capacity ratio of the abutment sliding bearings are established and compared. The system fragility curves are then obtained by combining the component fragility curves. Our results show that in the component fragility analysis, the reference bridge model exhibits a severe vulnerability compared to that of other sophisticated bridge models for all damage states. In the system fragility analysis, the reference curves illustrate a smaller damage probability in the earlier PGA ranges for the first three damage states, they then show a higher fragility compared to other curves in the larger PGA levels. In the fourth damage state, the reference curve has the smallest vulnerability. In both the component and the system fragility analysis, the same trend is found that the bridge models with smaller clearances exhibit a smaller fragility compared to that with larger openings. However, the bridge model with a maximum clearance still induces a minimum pounding force effect.Keywords: expansion joint clearance, fiber beam-column element, fragility assessment, time history analysis
Procedia PDF Downloads 4372087 Scattered Places in Stories Singularity and Pattern in Geographic Information
Abstract:
Increased knowledge about the nature of place and the conditions under which space becomes place is a key factor for better urban planning and place-making. Although there is a broad consensus on the relevance of this knowledge, difficulties remain in relating the theoretical framework about place and urban management. Issues related to representation of places are among the greatest obstacles to overcome this gap. With this critical discussion, based on literature review, we intended to explore, in a common framework for geographical analysis, the potential of stories to spell out place meanings, bringing together qualitative text analysis and text mining in order to capture and represent the singularity contained in each person's life history, and the patterns of social processes that shape places. The development of this reasoning is based on the extensive geographical thought about place, and in the theoretical advances in the field of Geographic Information Science (GISc).Keywords: discourse analysis, geographic information science place, place-making, stories
Procedia PDF Downloads 2012086 Name and Essence of “A Pound of Flesh”: On Identity Anxiety in The Merchant of Venice
Authors: Xiu Zhang
Abstract:
The Merchant of Venice focuses on identity anxiety through the contract of “a pound of flesh” and refers to the economic, legal and religious issues related to identity. The development of the emerging capitalist economy in Venetian society prompted Shylock to become a usurer. The social identity of Shylock’s lender enabled him to use the power of money to consolidate the interdependent relationship with Christians and strive for his position and living space in Venetian society. However, there have long been economical and religious conflicts between Jews and Christians. Therefore, in order to take vengeance on Antonio and take his life, so as to revenge the whole Christian society, Shylock insists on taking a pound of Antonio’s flesh in the name of abiding by the contract and the law. The choice of “a pound of flesh” is essentially the representation of human materialization and commercialization under the background of the rise of capitalism and economic transformation. At the same time, it also symbolizes Shylock’s efforts and attempts to reshape himself and his racial identity.Keywords: merchant of Venice, ethical choices, Shylock, a pound of flesh, identity anxiety
Procedia PDF Downloads 1442085 Performance Optimization of Polymer Materials Thanks to Sol-Gel Chemistry for Fuel Cells
Authors: Gondrexon, Gonon, Mendil-Jakani, Mareau
Abstract:
Proton Exchange Membrane Fuel Cells (PEMFCs) seems to be a promising device used for converting hydrogen into electricity. PEMFC is made of a Membrane Electrode Assembly (MEA) composed of a Proton Exchange Membrane (PEM) sandwiched by two catalytic layers. Nowadays, specific performances are targeted in order to ensure the long-term expansion of this technology. Current polymers used (perfluorinated as Nafion®) are unsuitable (loss of mechanical properties) for the high-temperature range. To overcome this issue, sulfonated polyaromatic polymers appear to be a good alternative since it has very good thermomechanical properties. However, their proton conductivity and chemical stability (oxidative resistance to H2O2 formed during fuel cell (FC) operating) are very low. In our team, we patented an original concept of hybrid membranes able to fulfill the specific requirements for PEMFC. This idea is based on the improvement of commercialized polymer membrane via an easy and processable stabilization thanks to sol-gel (SG) chemistry with judicious embeded chemical functions. This strategy is thus breaking up with traditional approaches (design of new copolymers, use of inorganic charges/additives). In 2020, we presented the elaboration and functional properties of a 1st generation of hybrid membranes with promising performances and durability. The latter was made by self-condensing a SG phase with 3(mercaptopropyl)trimethoxysilane (MPTMS) inside a commercial sPEEK host membrane. The successful in-situ condensation reactions of the MPTMS was demonstrated by measures of mass uptakes, FTIR spectroscopy (presence of C-Haliphatics) and solid state NMR 29Si (T2 & T3 signals of self-condensation products). The ability of the SG phase to prevent the oxidative degradation of the sPEEK phase (thanks to thiol chemical functions) was then proved with H2O2 accelerating tests and FC operating tests. A 2nd generation made of thiourea functionalized SG precursors (named HTU & TTU) was made after. By analysing in depth the morphologies of these different hybrids by direct space analysis (AFM/SEM/TEM) and reciprocal space analysis (SANS/SAXS/WAXS), we highlighted that both SG phase morphology and its localisation into the host has a huge impact on the PEM functional properties observed. This relationship is also dependent on the chemical function embedded. The hybrids obtained have shown very good chemical resistance during aging test (exposed to H2O2) compared to the commercial sPEEK. But the chemical function used is considered as “sacrificial” and cannot react indefinitely with H2O2. Thus, we are now working on a 3rd generation made of both sacrificial/regenerative chemical functions which are expected to inhibit the chemical aging of sPEEK more efficiently. With this work, we are confident to reach a predictive approach of the key parameters governing the final properties.Keywords: fuel cells, ionomers, membranes, sPEEK, chemical stability
Procedia PDF Downloads 742084 Determination of the Thermally Comfortable Air Temperature with Consideration of Individual Clothing and Activity as Preparation for a New Smart Home Heating System
Authors: Alexander Peikos, Carole Binsfeld
Abstract:
The aim of this paper is to determine a thermally comfortable air temperature in an automated living room. This calculated temperature should serve as input for a user-specific and dynamic heating control in such a living space. In addition to the usual physical factors (air temperature, humidity, air velocity, and radiation temperature), individual clothing and activity should be taken into account. The calculation of such a temperature is based on different methods and indices which are usually used for the evaluation of the thermal comfort. The thermal insulation of the worn clothing is determined with a Radio Frequency Identification system. The activity performed is only taken into account indirectly through the generated heart rate. All these methods are ultimately very well suited for use in temperature regulation in an automated home, but still require further research and extensive evaluation.Keywords: smart home, thermal comfort, predicted mean vote, radio frequency identification
Procedia PDF Downloads 1612083 Importance of Ethics in Cloud Security
Authors: Pallavi Malhotra
Abstract:
This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education
Procedia PDF Downloads 3272082 Popular Modern Devotional Prints: The Construction of Identity between the Visual and Viewer in Public Interaction Spaces
Authors: Muhammad Asghar, Muhammad Ali, Farwah Batool
Abstract:
Despite the general belief in Islam that figural representations should be avoided, particularly propagated by the Deobandis, a religious group influenced by Salafi and Wahhabi ideas, nevertheless the public interaction spaces such as Shops and offices are decorated with popular, mass-produced, modern devotional prints. This study seeks to focus on popular visual culture, its display in public interaction places such as shops and discusses how people establish relationships with images. The method adopted was basically ethnographic: to describe as precisely and completely as possible the phenomena to be studied, using the language and conceptual categories of the interlocutors themselves. This study has been enriched by ethnographic field research conducted during the months from October to December 2015 in the major cities of Punjab and their brief forays and surroundings where we explored how seeing upon images performs religious identity within the public space. The study examines the pattern of aesthetics and taste in the shops of especially common people whose sensibilities have not been refined or influenced by being exposed to any narrative or fine arts. Furthermore, it is our intention to question the general beliefs and opinions in the context of popular practices, the way in which people relate to these prints. The interpretations and analyses presented in this study illuminate how people create meaning through the display of such items of material culture in the immediate settings of their spaces. This study also seeks to demonstrate how popular Islam is practiced, transformed and understood through the display of popular representations of popular figures of piety like Sufi saints or their shrines are important to many believers and thus occupy important places in their shops. The findings are supported with empirical evidence and based on interviews with the shopkeepers, owners and office employees. Looking upon those popular modern devotional prints keeps people’s reverence of the personages alive. Because of their sacred themes they affect a relationship between the saint and the beholders as well as serve to symbolize and reinforce their belief since they become powerful loci of emotional attachment. Collectively such devotional prints satisfy a local taste to help people establish contact with God through the saints’ intercession in order to receive protection and benediction, and help in spiritual, mental and material problems. By putting all these facets of belief together we gain an insight into both the subjective and cognizant role that icons’ of saints play in the lives of believers. Their veneration through ingeniously contrived modern means of production makes a significant contribution to an understanding of how such imagery promotes a powerful belief in Sufi saints, which ultimately gives indications of how popular Islam is practiced and understood at its gross roots level.Keywords: ethnographic field research, popular visual culture, protected space, religious identity
Procedia PDF Downloads 2282081 A Genetic Based Algorithm to Generate Random Simple Polygons Using a New Polygon Merge Algorithm
Authors: Ali Nourollah, Mohsen Movahedinejad
Abstract:
In this paper a new algorithm to generate random simple polygons from a given set of points in a two dimensional plane is designed. The proposed algorithm uses a genetic algorithm to generate polygons with few vertices. A new merge algorithm is presented which converts any two polygons into a simple polygon. This algorithm at first changes two polygons into a polygonal chain and then the polygonal chain is converted into a simple polygon. The process of converting a polygonal chain into a simple polygon is based on the removal of intersecting edges. The merge algorithm has the time complexity of O ((r+s) *l) where r and s are the size of merging polygons and l shows the number of intersecting edges removed from the polygonal chain. It will be shown that 1 < l < r+s. The experiments results show that the proposed algorithm has the ability to generate a great number of different simple polygons and has better performance in comparison to celebrated algorithms such as space partitioning and steady growth.Keywords: Divide and conquer, genetic algorithm, merge polygons, Random simple polygon generation.
Procedia PDF Downloads 5362080 Estimating Tree Height and Forest Classification from Multi Temporal Risat-1 HH and HV Polarized Satellite Aperture Radar Interferometric Phase Data
Authors: Saurav Kumar Suman, P. Karthigayani
Abstract:
In this paper the height of the tree is estimated and forest types is classified from the multi temporal RISAT-1 Horizontal-Horizontal (HH) and Horizontal-Vertical (HV) Polarised Satellite Aperture Radar (SAR) data. The novelty of the proposed project is combined use of the Back-scattering Coefficients (Sigma Naught) and the Coherence. It uses Water Cloud Model (WCM). The approaches use two main steps. (a) Extraction of the different forest parameter data from the Product.xml, BAND-META file and from Grid-xxx.txt file come with the HH & HV polarized data from the ISRO (Indian Space Research Centre). These file contains the required parameter during height estimation. (b) Calculation of the Vegetation and Ground Backscattering, Coherence and other Forest Parameters. (c) Classification of Forest Types using the ENVI 5.0 Tool and ROI (Region of Interest) calculation.Keywords: RISAT-1, classification, forest, SAR data
Procedia PDF Downloads 4072079 Efficient Subsurface Mapping: Automatic Integration of Ground Penetrating Radar with Geographic Information Systems
Authors: Rauf R. Hussein, Devon M. Ramey
Abstract:
Integrating Ground Penetrating Radar (GPR) with Geographic Information Systems (GIS) can provide valuable insights for various applications, such as archaeology, transportation, and utility locating. Although there has been progress toward automating the integration of GPR data with GIS, fully automatic integration has not been achieved yet. Additionally, manually integrating GPR data with GIS can be a time-consuming and error-prone process. In this study, actual, real-world GPR applications are presented, and a software named GPR-GIS 10 is created to interactively extract subsurface targets from GPR radargrams and automatically integrate them into GIS. With this software, it is possible to quickly and reliably integrate the two techniques to create informative subsurface maps. The results indicated that automatic integration of GPR with GIS can be an efficient tool to map and view any subsurface targets in their appropriate location in a 3D space with the needed precision. The findings of this study could help GPR-GIS integrators save time and reduce errors in many GPR-GIS applications.Keywords: GPR, GIS, GPR-GIS 10, drone technology, automation
Procedia PDF Downloads 962078 12x12 MIMO Terminal Antennas Covering the Whole LTE and WiFi Spectrum
Authors: Mohamed Sanad, Noha Hassan
Abstract:
A broadband resonant terminal antenna has been developed. It can be used in different MIMO arrangements such as 2x2, 4x4, 8x8, or even 12x12 MIMO configurations. The antenna covers the whole LTE and WiFi bands besides the existing 2G/3G bands (700-5800 MHz), without using any matching/tuning circuits. Matching circuits significantly reduce the efficiency of any antenna and reduce the battery life. They also reduce the bandwidth because they are frequency dependent. The antenna can be implemented in smartphone handsets, tablets, laptops, notebooks or any other terminal. It is also suitable for different IoT and vehicle applications. The antenna is manufactured from a flexible material and can be bent or folded and shaped in any form to fit any available space in any terminal. It is self-contained and does not need to use the ground plane, the chassis or any other component of the terminal. Hence, it can be mounted on any terminal at different positions and configurations. Its performance does not get affected by the terminal, regardless of its type, shape or size. Moreover, its performance does not get affected by the human body of the terminal’s users. Because of all these unique features of the antenna, multiples of them can be simultaneously used for MIMO diversity coverage in any terminal device with a high isolation and a low correlation factor between them.Keywords: IOT, LTE, MIMO, terminal antenna, WiFi
Procedia PDF Downloads 1892077 Finite Element Study of Coke Shape Deep Beam to Column Moment Connection Subjected to Cyclic Loading
Authors: Robel Wondimu Alemayehu, Sihwa Jung, Manwoo Park, Young K. Ju
Abstract:
Following the aftermath of the 1994 Northridge earthquake, intensive research on beam to column connections is conducted, leading to the current design basis. The current design codes require the use of either a prequalified connection or a connection that passes the requirements of large-scale cyclic qualification test prior to use in intermediate or special moment frames. The second alternative is expensive both in terms of money and time. On the other hand, the maximum beam depth in most of the prequalified connections is limited to 900mm due to the reduced rotation capacity of deeper beams. However, for long span beams the need to use deeper beams may arise. In this study, a beam to column connection detail suitable for deep beams is presented. The connection detail comprises of thicker-tapered beam flange adjacent to the beam to column connection. Within the thicker-tapered flange region, two reduced beam sections are provided with the objective of forming two plastic hinges within the tapered-thicker flange region. In addition, the length, width, and thickness of the tapered-thicker flange region are proportioned in such a way that a third plastic hinge forms at the end of the tapered-thicker flange region. As a result, the total rotation demand is distributed over three plastic zones. Making it suitable for deeper beams that have lower rotation capacity at one plastic hinge. The effectiveness of this connection detail is studied through finite element analysis. For the study, a beam that has a depth of 1200mm is used. Additionally, comparison with welded unreinforced flange-welded web (WUF-W) moment connection and reduced beam section moment connection is made. The results show that the rotation capacity of a WUF-W moment connection is increased from 2.0% to 2.2% by applying the proposed moment connection detail. Furthermore, the maximum moment capacity, energy dissipation capacity and stiffness of the WUF-W moment connection is increased up to 58%, 49%, and 32% respectively. In contrast, applying the reduced beam section detail to the same WUF-W moment connection reduced the rotation capacity from 2.0% to 1.50% plus the maximum moment capacity and stiffness of the connection is reduced by 22% and 6% respectively. The proposed connection develops three plastic hinge regions as intended and it shows improved performance compared to both WUF-W moment connection and reduced beam section moment connection. Moreover, the achieved rotation capacity satisfies the minimum required for use in intermediate moment frames.Keywords: connections, finite element analysis, seismic design, steel intermediate moment frame
Procedia PDF Downloads 1682076 Effects of G-jitter Combined with Heat and Mass Transfer by Mixed Convection MHD Flow of Maxwell Fluid in a Porous Space
Authors: Faisal Salah, Z. A. Aziz, K. K. Viswanathan
Abstract:
In this article, the effects of g-jitter induced and combined with heat and mass transfer by mixed convection of MHD Maxwell fluid in microgravity situation is investigated for a simple system. This system consists of two heated vertical parallel infinite flat plates held at constant but different temperatures and concentrations. By using modified Darcy’s law, the equations governing the flow are modelled. These equations are solved analytically for the induced velocity, temperature and concentration distributions. Many interesting available results in the relevant literature (i.e. Newtonian fluid) is obtained as the special case of the present general analysis. Finally, the graphical results for the velocity profile of the oscillating flow in the channel are presented and discussed for different values of the material constants.Keywords: g-jitter, heat and mass transfer, mixed convection, Maxwell fluid, porous medium
Procedia PDF Downloads 4942075 Progress of Research on Community Canteens and Reflections on Planning in China
Authors: Xi Zuo
Abstract:
Against the background of the aging population and changing family structure in China, community canteens have become an important vehicle for community-based home care services and a new space for social interaction. In this paper, we review past studies and the actual construction situation in China, firstly sort out the social interaction of the elderly and the types of places, and on this basis, we find that there is an obvious disconnection between the current construction and the academic research, and the contradiction between social benefit and cost-effectiveness, and therefore we put forward the relevant construction planning and thinking, in order to provide a disciplinary basis and academic support for the construction of community canteens and the construction of elderly-friendly cities. In order to provide disciplinary basis and academic support for the construction of community canteens and the construction of senior-friendly cities.Keywords: urban and rural planning, community canteens, elderly people, senior-friendly
Procedia PDF Downloads 632074 The Physics of Turbulence Generation in a Fluid: Numerical Investigation Using a 1D Damped-MNLS Equation
Authors: Praveen Kumar, R. Uma, R. P. Sharma
Abstract:
This study investigates the generation of turbulence in a deep-fluid environment using a damped 1D-modified nonlinear Schrödinger equation model. The well-known damped modified nonlinear Schrödinger equation (d-MNLS) is solved using numerical methods. Artificial damping is added to the MNLS equation, and turbulence generation is investigated through a numerical simulation. The numerical simulation employs a finite difference method for temporal evolution and a pseudo-spectral approach to characterize spatial patterns. The results reveal a recurring periodic pattern in both space and time when the nonlinear Schrödinger equation is considered. Additionally, the study shows that the modified nonlinear Schrödinger equation disrupts the localization of structure and the recurrence of the Fermi-Pasta-Ulam (FPU) phenomenon. The energy spectrum exhibits a power-law behavior, closely following Kolmogorov's spectra steeper than k⁻⁵/³ in the inertial sub-range.Keywords: water waves, modulation instability, hydrodynamics, nonlinear Schrödinger's equation
Procedia PDF Downloads 78