Search results for: passive solar architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3889

Search results for: passive solar architecture

1549 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations

Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri

Abstract:

With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.

Keywords: architectural layout, automated teller machine, e-services, postilion

Procedia PDF Downloads 633
1548 Complex Event Processing System Based on the Extended ECA Rule

Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park

Abstract:

ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.

Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things

Procedia PDF Downloads 530
1547 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 167
1546 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 156
1545 Managing Cognitive Load in Accounting: An Analysis of Three Instructional Designs in Financial Accounting

Authors: Seedwell Sithole

Abstract:

One of the persistent problems in accounting education is how to effectively support students’ learning. A promising technique to this issue is to investigate the extent that learning is determined by the design of instructional material. This study examines the academic performance of students using three instructional designs in financial accounting. Student’s performance scores and reported mental effort ratings were used to determine the instructional effectiveness. The findings of this study show that accounting students prefer graph and text designs that are integrated. The results suggest that spatially separated graph and text presentations in accounting should be reorganized to align with the requirements of human cognitive architecture.

Keywords: accounting, cognitive load, education, instructional preferences, students

Procedia PDF Downloads 151
1544 The Effect of TiO₂ Nano-Thin Films on Light Transmission and Self-Cleaning Capabilities of Glass Surface

Authors: Ahmad Alduweesh

Abstract:

Self-cleaning surfaces have become essential in various applications. For instance, in photovoltaics, they provide an easy-cost effecting way to keep the solar cells clean. Titanium dioxide (TiO₂) nanoparticles were fabricated at different thicknesses to study the effect of different thicknesses on the hydrophilicity behavior of TiO₂, eventually leading to customizing hydrophilicity levels to desired values under natural light. As a result, a remarkable increase was noticed in surface hydrophilicity after applying thermal annealing on the as-deposited TiO₂ thin-films, with contact angle dropping from around 85.4ᵒ for as-deposited thin-films down to 5.1ᵒ for one of the annealed samples. The produced thin films were exposed to the outside environment to observe the effect of dust. The transmittance of light using UV-VIS spectroscopy will be conducted on the lowest and highest thicknesses (5-40 nm); this will show whether the Titania has successfully enabled more sunlight to penetrate the glass or not. Surface characterizations, including AFM and contact angle, have been included in this test.

Keywords: physical vapor deposition, TiO₂, nano-thin films, hydrophobicity, hydrophilicity, self-cleaning surfaces

Procedia PDF Downloads 114
1543 An Informative Marketing Platform: Methodology and Architecture

Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone

Abstract:

Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.

Keywords: informative marketing, opt in page, software platform, web application

Procedia PDF Downloads 127
1542 Incidence, Pattern and Risk Factors of Congenial Heart Diseases in Neonates in a Tertiary Care Hospital, Egyptian Study

Authors: Gehan Hussein, Hams Ahmad, Baher Matta, Yasmeen Mansi, Mohamad Fawzi

Abstract:

Background: Congenital heart disease (CHD) is a common problem worldwide with variable incidence in different countries. The exact etiology is unknown, suggested to be multifactorial. We aimed to study the incidence of various CHD in a neonatal intensive care unit (NICU) in a tertiary care hospital in Egypt and the possible associations with variable risk factors. Methods: Prospective study was conducted over a period of one year (2013 /2014) at NICU KasrAlAini School of Medicine, Cairo University. Questionnaire about possible maternal and/or paternal risk factors for CHD, clinical examination, bedside echocardiography were done. Cases were classified into groups: group 1 without CHD and group 2 with CHD. Results: from 723 neonates admitted to NICU, 180 cases were proved to have CHD, 58 % of them were males. patent ductus arteriosus(PDA) was the most common CHD (70%), followed by an atrial septal defect (ASD8%), while Fallot tetralogy and single ventricle were the least common (0.45 %) for each. CHD was found in 30 % of consanguineous parents Maternal age ≥ 35 years at the time of conception was associated with increased incidence of PDA (p= 0.45 %). Maternal diabetes and insulin intake were significantly associated with cases of CHD (p=0.02 &0.001 respectively), maternal hypertension and hypothyroidism were both associated with VSD, but the difference did not reach statistical significance (P=0.36 &0.44respectively). Maternal passive smoking was significantly associated with PDA (p=0.03). Conclusion: The most frequent CHD in the studied population was PDA, followed by ASD. Maternal conditions as diabetes was associated with VSD occurrence.

Keywords: NICU, risk factors, congenital heart disease, echocardiography

Procedia PDF Downloads 191
1541 The Use of Indicators to Evaluate Minor Heritage Areas in a City

Authors: J. L. Oliver, T. Agryzkov, L. Tortosa, J. F. Vicent, J. Santacruz

Abstract:

This paper aims to demonstrate how a system of indicators can be used in order to evaluate some heritage areas which can be understood as minor ones. We mean by that those urban areas with high heritage interest from an academical point of view, but never properly valued. The reasons for this situation may be diverse, either they are not old enough, or they may show the modest architecture, the fact is these areas have not been considered deserving of protection, as the historical ones. As a result of this reality, they usually show now a very degraded urban space, which in addition contribute to accelerate a process of deterioration. Using a technic well known in urban design, we propose here a system of indicators for patrimonial purposes, as a tool to identify and quantify the heritage value of these kinds of areas. As a case study, we apply this system in some part of the City of Quito (El Ecuador).

Keywords: heritage cities, indicators, spatial analysis, historic sites

Procedia PDF Downloads 243
1540 Rapid Generation of Octagonal Pyramids on Silicon Wafer for Photovoltaics by Swift Anisotropic Chemical Etching Process

Authors: Sami Iqbal, Azam Hussain, Weiping Wu, Guo Xinli, Tong Zhang

Abstract:

A novel octagonal upright micro-pyramid structure was generated by wet chemical anisotropic etching on a monocrystalline silicon wafer (100). The primary objectives are to reduce front surface reflectance of silicon wafers, improve wettability, enhance surface morphology, and maximize the area coverage by generated octagonal pyramids. Under rigorous control and observation, the etching process' response time was maintained precisely. The experimental outcomes show a significant decrease in the optical surface reflectance of silicon wafers, with the lowest reflectance of 8.98%, as well as enhanced surface structure, periodicity, and surface area coverage of more than 85%. The octagonal silicon pyramid was formed with a high etch rate of 0.41 um/min and a much shorter reaction time with the addition of hydrofluoric acid coupled with magnetic stirring (mechanical agitation) at 300 rpm.

Keywords: octagonal pyramids, rapid etching, solar cells, surface engineering, surface reflectance

Procedia PDF Downloads 101
1539 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 499
1538 The Unique Journeys from Different Pasts to Multiple Presents in the Work of the Pritzker Prize Laureates of 2010-2020

Authors: Christakis Chatzichristou Kyriakos Miltiadou, Konstantinos Gounaridis

Abstract:

The paper discusses how the Pritzker Prize Laureates of the last decade themselves identify the various ways different aspects or interpretations of the past have influenced their design methodologies. As the recipients of what is considered to be the most prestigious award in architecture, these architects are worth examining not only because of their exemplary work but also because of the strong influence they have on architectural culture in general. Rather than attempting to interpret their projects, the methodology chosen focuses on what the architects themselves have to say on the subject. The research aims at, and, as the tabular form of the findings shows, also succeeds in revealing the numerous and diverse ways different aspects of what is termed as the Past can potentially enrich contemporary design practices.

Keywords: design methodology, Pritzker Prize Laureates, past, culture, tradition

Procedia PDF Downloads 44
1537 Applications of Green Technology and Biomimicry in Civil Engineering with a Maglev Car Elevator

Authors: Sameer Ansari, Suhas Nitsure

Abstract:

Biomimicry has made a big move into the built environment by adapting nature's solutions to human designs and inventions. We can examine numerous aspects of the built environment right from generating energy, fed by rainwater and powered by sun to over all land use impacts. This paper discusses the potential of a man made building which will work for the welfare of humans and reduce the impact of the harmful environment on us which we ourselves created for us. Building services inspired by nature such as building walls from homeostasis in organisms, natural ventilation from termites, artificial aggregates from natural aggregates, solar panels from photosynthesis and building structure itself compared to tree as a cantilever. Environmental services such as using CO2 as a feedstock for construction related activities, using Ornilux glasses and  saving birds from collision with buildings, using prefabricated steel for fast building members- save time and also negligible waste as no formwork is used. Maglev inspired car elevators in building which is unique and giving all together new direction to technology.

Keywords: biomimicry, green technology, maglev car elevator, civil engineering

Procedia PDF Downloads 576
1536 Research on the Evolution of Public Space in Tourism-Oriented Traditional Rural Settlements

Authors: Yu Zhang, Mingxue Lang, Li Dong

Abstract:

The hundreds of years of slow succession of living environment in rural area is a crucial carrier of China’s long history of culture and national wisdom. In recent years, the space evolution of traditional rural settlements has been promoted by the intervention of tourism development, among which the public architecture and outdoor activity areas together served as the major places for villagers, and tourists’ social activities are an important characterization for settlement spatial evolution. Traditional public space upgrade and layout study of new public space can effectively promote the tourism industry development of traditional rural settlements. This article takes Qi County, one China Traditional Culture Village as the exemplification and uses the technology of Remote Sensing (RS), Geographic Information System (GIS) and Space Syntax, studies the evolution features of public space of tourism-oriented traditional rural settlements in four steps. First, acquire the 2003 and 2016 image data of Qi County, using the remote sensing application EDRAS8.6. Second, vectorize the basic maps of Qi County including its land use map with the application of ArcGIS 9.3 meanwhile, associating with architectural and site information concluded from field research. Third, analyze the accessibility and connectivity of the inner space of settlements using space syntax; run cross-correlation with the public space data of 2003 and 2016. Finally, summarize the evolution law of the public space of settlements; study the upgrade pattern of traditional public space and location plan for new public space. Major findings of this paper including: first, location layout of traditional public space has a larger association with the calculation results of space syntax and further confirmed the objective value of space syntax in expressing the space and social relations. Second, the intervention of tourism development generates remarkable impact on public space location of tradition rural settlements. Third, traditional public space produces the symbols of both strengthening and decline and forms a diversified upgrade pattern for the purpose of meeting the different tourism functional needs. Finally, space syntax provides an objective basis for location plan of new public space that meets the needs of tourism service. Tourism development has a significant impact on the evolution of public space of traditional rural settlements. Two types of public space, architecture, and site are both with changes seen from the perspective of quantity, location, dimension and function after the intervention of tourism development. Function upgrade of traditional public space and scientific layout of new public space are two important ways in achieving the goal of sustainable development of tourism-oriented traditional rural settlements.

Keywords: public space evolution, Qi county, space syntax, tourism oriented, traditional rural settlements

Procedia PDF Downloads 341
1535 Innovative In-Service Training Approach to Strengthen Health Care Human Resources and Scale-Up Detection of Mycobacterium tuberculosis

Authors: Tsegahun Manyazewal, Francesco Marinucci, Getachew Belay, Abraham Tesfaye, Gonfa Ayana, Amaha Kebede, Tsegahun Manyazewal, Francesco Marinucci, Getachew Belay, Abraham Tesfaye, Gonfa Ayana, Amaha Kebede, Yewondwossen Tadesse, Susan Lehman, Zelalem Temesgen

Abstract:

In-service health trainings in Sub-Saharan Africa are mostly content-centered with higher disconnection with the real practice in the facility. This study intended to evaluate in-service training approach aimed to strengthen health care human resources. A combined web-based and face-to-face training was designed and piloted in Ethiopia with the diagnosis of tuberculosis. During the first part, which lasted 43 days, trainees accessed web-based material and read without leaving their work; while the second part comprised a one-day hands-on evaluation. Trainee’s competency was measured using multiple-choice questions, written-assignments, exercises and hands-on evaluation. Of 108 participants invited, 81 (75%) attended the course and 71 (88%) of them successfully completed. Of those completed, 73 (90%) scored a grade from A to C. The approach was effective to transfer knowledge and turn it into practical skills. In-service health training should transform from a passive one-time-event to a continuous behavioral change of participants and improvements on their actual work.

Keywords: Ethiopia, health care, Mycobacterium tuberculosis, training

Procedia PDF Downloads 504
1534 Hydrogen: Contention-Aware Hybrid Memory Management for Heterogeneous CPU-GPU Architectures

Authors: Yiwei Li, Mingyu Gao

Abstract:

Integrating hybrid memories with heterogeneous processors could leverage heterogeneity in both compute and memory domains for better system efficiency. To ensure performance isolation, we introduce Hydrogen, a hardware architecture to optimize the allocation of hybrid memory resources to heterogeneous CPU-GPU systems. Hydrogen supports efficient capacity and bandwidth partitioning between CPUs and GPUs in both memory tiers. We propose decoupled memory channel mapping and token-based data migration throttling to enable flexible partitioning. We also support epoch-based online search for optimized configurations and lightweight reconfiguration with reduced data movements. Hydrogen significantly outperforms existing designs by 1.21x on average and up to 1.31x.

Keywords: hybrid memory, heterogeneous systems, dram cache, graphics processing units

Procedia PDF Downloads 96
1533 On-Chip Aging Sensor Circuit Based on Phase Locked Loop Circuit

Authors: Ararat Khachatryan, Davit Mirzoyan

Abstract:

In sub micrometer technology, the aging phenomenon starts to have a significant impact on the reliability of integrated circuits by bringing performance degradation. For that reason, it is important to have a capability to evaluate the aging effects accurately. This paper presents an accurate aging measurement approach based on phase-locked loop (PLL) and voltage-controlled oscillator (VCO) circuit. The architecture is rejecting the circuit self-aging effect from the characteristics of PLL, which is generating the frequency without any aging phenomena affects. The aging monitor is implemented in low power 32 nm CMOS technology, and occupies a pretty small area. Aging simulation results show that the proposed aging measurement circuit improves accuracy by about 2.8% at high temperature and 19.6% at high voltage.

Keywords: aging effect, HCI, NBTI, nanoscale

Procedia PDF Downloads 359
1532 Pricing the Risk Associated to Weather of Variable Renewable Energy Generation

Authors: Jorge M. Uribe

Abstract:

We propose a methodology for setting the price of an insurance contract targeted to manage the risk associated with weather conditions that affect variable renewable energy generation. The methodology relies on conditional quantile regressions to estimate the weather risk of a solar panel. It is illustrated using real daily radiation and weather data for three cities in Spain (Valencia, Barcelona and Madrid) from February 2/2004 to January 22/2019. We also adapt the concepts of value at risk and expected short fall from finance to this context, to provide a complete panorama of what we label as weather risk. The methodology is easy to implement and can be used by insurance companies to price a contract with the aforementioned characteristics when data about similar projects and accurate cash flow projections are lacking. Our methodology assigns a higher price to an insurance product with the stated characteristics in Madrid, compared to Valencia and Barcelona. This is consistent with Madrid showing the largest interquartile range of operational deficits and it is unrelated to the average value deficit, which illustrates the importance of our proposal.

Keywords: insurance, weather, vre, risk

Procedia PDF Downloads 148
1531 Electrochemistry of Metal Chalcogenides Semiconductor Materials; Theory and Practical Applications

Authors: Mahmoud Elrouby

Abstract:

Metal chalcogenide materials have wide spectrum of properties, for that these materials can be used in electronics, optics, magnetics, solar energy conversion, catalysis, passivation, ion sensing, batteries, and fuel cells. This work aims to, how can obtain these materials via electrochemical methods simply for further applications. The work regards in particular the systems relevant to the sulphur sub-group elements, i.e., sulphur, selenium, and tellurium. The role of electrochemistry in synthesis, development, and characterization of the metal chalcogenide materials and related devices is vital and important. Electrochemical methods as preparation tool offer the advantages of soft chemistry to access bulk, thin, nano film and epitaxial growth of a wide range of alloys and compounds, while as a characterization tool provides exceptional assistance in specifying the physicochemical properties of materials. Moreover, quite important applications and modern devices base their operation on electrochemical principles. Thereupon, our scope in the first place was to organize existing facts on the electrochemistry of metal chalcogenides regarding their synthesis, properties, and applications.

Keywords: electrodeposition, metal chacogenides, semiconductors, applications

Procedia PDF Downloads 298
1530 The Combination of Curcuma Extract and IgG Colostrum on Strongyloides Infection in CD1 Mice

Authors: Laurentius J. M. Rumokoy, Jimmy Posangi, Wisje Lusia Toar, Julio Lopez Aban

Abstract:

The threat of pathogen infection agents to the neonates is a major health problem to the new born life livestock. Neonate losses became an important case in the world as well as in Indonesia. This condition can be triggered by an infection with nematode in conjunction with a failure of immunoglobulin passive transfer. The study was conducted to evaluate the role of the curcuma combined with IgG colostrum on the development of parasites in the gut of CD1 mice. Animal experiments were divided in four groups (G) based on the treatment: G1 (infection only); G2 (curcuma+infection), G3 (IgG + infection) and G4 (curcuma+IgG+infection). The parameters measured were EPG (eggs per gram) and female in the intestine. The results obtained showed that the treatment has no a significant influence on the number of eggs per gram of feces in the group infected compared to the control group without receiving IgG nor curcuma. However, the EGP response tended to decrease at day 6 in G3 and G4 with a minimum number at zero eggs. This performant showed that the immunoglobulin-G and curcuma substances could slightly decreased the number of eggs in animal infected with Strongyloides. The results obtained showed also that the treatment has no significant difference (P > 0.05) on female larva in the gut of MCD1 experimental. In other side, we found that the best performance to inhibit the female quantity in the gut was the treatment with IgG and infection of parasite in G3. In this treatment, the minimum number was five female only in the gut. The results described IgG response was better than the curcuma single use in reducing the female parasite in the gut. This positive response of IgG compared to other controls group was associated with the function of colostrum antibodies.

Keywords: parasites, livestock, curcuma, colostrums

Procedia PDF Downloads 176
1529 Energy Efficient Shading Strategies for Windows of Hospital ICUs in the Desert

Authors: A. Sherif, A. El Zafarany, R. Arafa

Abstract:

Hospitals, everywhere, are considered heavy energy consumers. Hospital Intensive Care Unit spaces pose a special challenge, where design guidelines requires the provision of external windows for day-lighting and external view. Window protection strategies could be employed to reduce energy loads without detriment effect on comfort or health care. This paper addresses the effectiveness of using various window strategies on the annual cooling, heating and lighting energy use of a typical Hospital Intensive Unit space. Series of experiments were performed using the EnergyPlus simulation software for a typical Intensive Care Unit (ICU) space in Cairo, located in the Egyptian desert. This study concluded that the use of shading systems is more effective in conserving energy in comparison with glazing of different types, in the Cairo ICUs. The highest energy savings in the West and South orientations were accomplished by external perforated solar screens, followed by overhangs positioned at a protection angle of 45°.

Keywords: energy, hospital, intensive care units, shading

Procedia PDF Downloads 289
1528 Comparison between the Conventional Methods and PSO Based MPPT Algorithm for Photovoltaic Systems

Authors: Ramdan B. A. Koad, Ahmed F. Zobaa

Abstract:

Since the output characteristics of Photovoltaic (PV) system depends on the ambient temperature, solar radiation and load impedance, its maximum Power Point (MPP) is not constant. Under each condition PV module has a point at which it can produce its MPP. Therefore, a Maximum Power Point Tracking (MPPT) method is needed to uphold the PV panel operating at its MPP. This paper presents comparative study between the conventional MPPT methods used in (PV) system: Perturb and Observe (P&O), Incremental Conductance (IncCond), and Particle Swarm Optimization (PSO) algorithm for (MPPT) of (PV) system. To evaluate the study, the proposed PSO MPPT is implemented on a DC-DC converter and has been compared with P&O and INcond methods in terms of their tracking speed, accuracy and performance by using the Matlab tool Simulink. The simulation result shows that the proposed algorithm is simple, and is superior to the P&O and IncCond methods.

Keywords: photovoltaic systems, maximum power point tracking, perturb and observe method, incremental conductance, methods and practical swarm optimization algorithm

Procedia PDF Downloads 358
1527 Enhancing Greenhouse Productivity and Energy Efficiency Through UV-IR Reflective Coatings and Dust Mitigation: A Case Study in Saudi Arabia

Authors: Tayirjan Taylor Isimjan, Essam Jamea, Muien Qaryouti

Abstract:

The demand for efficient greenhouse production is escalating, necessitating continuous improvements in controlled plant growth environments. Central to maximizing growth are critical light-related factors, including quantity, quality, and geometric distribution of intercepted radiation. This becomes particularly crucial in regions like the Middle East, characterized by high solar radiation and dusty atmospheric conditions. Existing greenhouse technologies often rely on additional expensive equipment to manage light conditions effectively. In this study, we propose a distinct approach employing functional coatings to mitigate dust and block UV and IR radiation, thereby conserving energy and enhancing productivity. By combining UV-IR reflective coatings with dust mitigation strategies, we aim to address both environmental challenges and energy consumption issues faced by greenhouse agriculture in Saudi Arabia.

Keywords: greenhouse, UV-IR reflective coatings, dust mitigation, energy efficiency, productivity

Procedia PDF Downloads 61
1526 Behavior of Helical Piles as Foundation of Photovoltaic Panels in Tropical Soils

Authors: Andrea J. Alarcón, Maxime Daulat, Raydel Lorenzo, Renato P. Da Cunha, Pierre Breul

Abstract:

Brazil has increased the use of renewable energy during the last years. Due to its sunshine and large surface area, photovoltaic panels founded in helical piles have been used to produce solar energy. Since Brazilian territory is mainly cover by highly porous structured tropical soils, when the helical piles are installed this structure is broken and its soil properties are modified. Considering the special characteristics of these soils, helical foundations behavior must be extensively studied. The first objective of this work is to determine the most suitable method to estimate the tensile capacity of helical piles in tropical soils. The second objective is to simulate the behavior of these piles in tropical soil. To obtain the rupture to assess load-displacement curves and the ultimate load, also a numerical modelling using Plaxis software was conducted. Lastly, the ultimate load and the load-displacements curves are compared with experimental values to validate the implemented model.

Keywords: finite element, helical piles, modelling, tropical soil, uplift capacity

Procedia PDF Downloads 173
1525 Opto-Electronic Study of the Silicon Nitride Doped Cerium Thin Films Deposed by Evaporation

Authors: Bekhedda Kheira

Abstract:

Rare earth-doped luminescent materials (Ce, Eu, Yb, Tb, etc.) are now widely used in flat-screen displays, fluorescent lamps, and photovoltaic solar cells. They exhibit several fine emission bands in a spectral range from near UV to infrared when added to inorganic materials. This study chose cerium oxide (CeO2) because of its exceptional intrinsic properties, energy levels, and ease of implementation of doped layer synthesis. In this study, thin films were obtained by the evaporation deposition technique of cerium oxide (CeO2) on silicon Nitride (SiNx) layers and then annealing under nitrogen N2. The characterization of these films was carried out by different techniques, scanning electron microscopy (SEM) to visualize morphological properties and (EDS) was used to determine the elemental composition of individual dots, optical analysis characterization of thin films was studied by a spectrophotometer in reflectance mode to determine different energies gap of the nanostructured layers and to adjust these values for the photovoltaic application.

Keywords: thin films, photovoltaic, rare earth, evaporation

Procedia PDF Downloads 88
1524 The Voyage of Adolfo Caminha to the USA: The Discourse about Americanism in Brazil in the Late Nineteenth Century

Authors: Maxwel F. Silva, José Geraldo Pedrosa

Abstract:

This paper is a study about the voyage of Adolfo Caminha to the USA in the late nineteenth century described in “No país dos ianques”. The hypothesis is that the USA constitutes a civilizing reference that moves away from Europe. The Americanism expression it means that the Yankees have invented a new repertoire through which built a new idea of civilization. The base is European, but your architecture is new. This paper is not concerned with the meanings and uses of the Americanism expression among the Yankees, but with the ways in which the America were understood by otherness, especially in the late nineteenth and early twentieth century. In this way, this study discusses the concept of Americanism in the thought of Adolfo Caminha and it is relation with the Brazil in the late nineteenth century, especially in questions about democracy, liberty and progress.

Keywords: Adolfo Caminha, Americanism, discourse, voyage

Procedia PDF Downloads 552
1523 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 227
1522 The Quantitative Analysis of the Traditional Rural Settlement Plane Boundary

Authors: Yifan Dong, Xincheng Pu

Abstract:

Rural settlements originate from the accumulation of residential building elements, and their agglomeration forms the settlement pattern and defines the relationship between the settlement and the inside and outside. The settlement boundary is an important part of the settlement pattern. Compared with the simplification of the urban settlement boundary, the settlement of the country is more complex, fuzzy and uncertain, and then presents a rich and diverse boundary morphological phenomenon. In this paper, China traditional rural settlements plane boundary as the research object, using fractal theory and fractal dimension method, quantitative analysis of planar shape boundary settlement, and expounds the research for the architectural design, ancient architecture protection and renewal and development and the significance of the protection of settlements.

Keywords: rural settlement, border, fractal, quantification

Procedia PDF Downloads 248
1521 Data Analysis Tool for Predicting Water Scarcity in Industry

Authors: Tassadit Issaadi Hamitouche, Nicolas Gillard, Jean Petit, Valerie Lavaste, Celine Mayousse

Abstract:

Water is a fundamental resource for the industry. It is taken from the environment either from municipal distribution networks or from various natural water sources such as the sea, ocean, rivers, aquifers, etc. Once used, water is discharged into the environment, reprocessed at the plant or treatment plants. These withdrawals and discharges have a direct impact on natural water resources. These impacts can apply to the quantity of water available, the quality of the water used, or to impacts that are more complex to measure and less direct, such as the health of the population downstream from the watercourse, for example. Based on the analysis of data (meteorological, river characteristics, physicochemical substances), we wish to predict water stress episodes and anticipate prefectoral decrees, which can impact the performance of plants and propose improvement solutions, help industrialists in their choice of location for a new plant, visualize possible interactions between companies to optimize exchanges and encourage the pooling of water treatment solutions, and set up circular economies around the issue of water. The development of a system for the collection, processing, and use of data related to water resources requires the functional constraints specific to the latter to be made explicit. Thus the system will have to be able to store a large amount of data from sensors (which is the main type of data in plants and their environment). In addition, manufacturers need to have 'near-real-time' processing of information in order to be able to make the best decisions (to be rapidly notified of an event that would have a significant impact on water resources). Finally, the visualization of data must be adapted to its temporal and geographical dimensions. In this study, we set up an infrastructure centered on the TICK application stack (for Telegraf, InfluxDB, Chronograf, and Kapacitor), which is a set of loosely coupled but tightly integrated open source projects designed to manage huge amounts of time-stamped information. The software architecture is coupled with the cross-industry standard process for data mining (CRISP-DM) data mining methodology. The robust architecture and the methodology used have demonstrated their effectiveness on the study case of learning the level of a river with a 7-day horizon. The management of water and the activities within the plants -which depend on this resource- should be considerably improved thanks, on the one hand, to the learning that allows the anticipation of periods of water stress, and on the other hand, to the information system that is able to warn decision-makers with alerts created from the formalization of prefectoral decrees.

Keywords: data mining, industry, machine Learning, shortage, water resources

Procedia PDF Downloads 121
1520 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 203