Search results for: legal solutions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5372

Search results for: legal solutions

2942 Challenges and Opportunities of Cloud-Based E-Learning Systems

Authors: Kashif Laeeq, Zubair A. Shaikh

Abstract:

The paradigm of education is drastically changing from conventional to e-learning model. Due to ease of learning with various other benefits, several educational institutions are adopting the e-learning models. Some institutions are still willing to transform their educational system on to e-learning, but due to limited resources, they are still compromising on the old traditional system. The cloud computing could be one of the best solutions to overcome this problem by providing hardware, software, and infrastructure resources with cost efficient manner. The adoption of cloud computing in education will bring revolution in this paradigm. This paper introduces various positive features of e-learning and presents a way how cloud computing technology can be provisioned e-learning model. This paper also investigates the numerous challenges and opportunities that would be observed in cloud computing adoption in e-learning domain. The concept and knowledge present in this paper may create a new direction of research in the domain of cloud-based e-learning.

Keywords: cloud-based e-learning, e-learning, cloud computing application, smart learning

Procedia PDF Downloads 408
2941 Application of Freeze Desalination for Tace elements Removal from Water

Authors: Fekadu Melak, Tsegaye Girma Asere

Abstract:

Trace element ions, such as Cr(VI) and F−, are of particular interest due to their environmental impact. Both ions exhibit an anionic nature in water that can show similar removal tendencies except for their significant differences in ionic radius. Accordingly, partial freezing was performed to examine freeze separation efficiencies of Cr(VI) and F– from aqueous solutions. Real groundwater and simulated wastewater were included to test effeciency of F– and Cr(VI), respectively. Parameters such as initial ion concentration, salt addition, and freeze duration were explored. Under optimal operating conditions, freeze separation efficiencies of 90 ± 0.12 to 97 ± 0.54% and 58 ± 0.23% to 60 ± 0.34% from 5 mg/L of Cr(VI) and F–, respectively, were demonstrated. The F– ion intercalation into the ice, initiating the decrement of freeze separation efficiency was observed in the salt addition processes. The influences of structuring-destructuring (kosmotropicity-chaotropicity) and the size-exclusion nature of ice crystals were used to explain the plausible mechanism in freeze separation efficiency trace elemental ions.

Keywords: Cr(VI), F-, partial freezing, size exclusion

Procedia PDF Downloads 84
2940 'I'm in a Very Safe Place': Webcam Sex Workers in Aotearoa, New Zealand and Their Perceptions of Danger and Risk

Authors: Madeline V. Henry

Abstract:

Sex work is a contested subject in academia. Many authors now argue that the practice should be recognized as a legitimate and rationally chosen form of labor, and that decriminalization is necessary to ensure the safety of sex workers and reduce their stigmatization. However, a prevailing argument remains that the work is inherently violent and oppressive and that all sex workers are directly or indirectly coerced into participating in the industry. This argument has been complicated by the recent proliferation of computer-mediated technologies that allow people to conduct sex work without the need to be physically co-present with customers or pimps. One example of this is the practice of ‘camming’, wherein ‘webcam models’ stream themselves stripping and/or performing autoerotic stimulation in an online chat-room for payment. In this presentation, interviews with eight ‘camgirls’ (aged 22-34) will be discussed. Their talk has been analyzed using Foucauldian discourse analysis, focusing on common discursive threads in relation to the work and their subjectivities. It was found that the participants demonstrated appreciation for the lack of physical danger they were in, but emphasized the unique and significant dangers of online-based sex work (their images and videos being recorded and shared without their consent, for example). Participants also argued that their largest concerns were based around stigma, which they claimed remained prevalent despite the decriminalized legal model in Aotearoa/New Zealand (which has been in place for over 14 years). Overall, this project seeks to challenge commonplace academic approaches to sex work, adding further research to support sex workers’ rights and highlighting new issues to consider in a digital environment.

Keywords: camming, sex work, stigma, risk

Procedia PDF Downloads 155
2939 Victims and Violators: Open Source Information, Admissibility Standards, and War Crimes Investigations in Iraq and Syria

Authors: Genevieve Zingg

Abstract:

Modern technology and social media platforms have fundamentally altered the nature of war crimes investigations by providing new forms of data, evidence, and documentation, and pose a unique opportunity to expand the efficacy of international law. However, much of the open source information available is deemed inadmissible in subsequent legal proceedings and fails to function as evidence largely due to issues of reliability and verifiability. Focusing on current judicial investigations related to ongoing conflicts in Syria and Iraq, this paper will examine key challenges and opportunities for the effective use of open source information in securing justice. This paper will consider strategies and approaches that can be used to ensure that information collected by affected populations meets basic admissibility standards. This paper argues that the critical failure to equip civilian populations in conflict zones with knowledge and information regarding established admissibility standards and guidelines both jeopardizes the potential of open source information and compromises the ability of victims to participate effectively in justice and accountability processes. The ultimate purpose of this paper is, therefore, to examine how to maximize the value of open source information based on the rules of evidence in international, regional, and national courts, and how to maximize the participation of affected populations in holding their abusers to account.

Keywords: human rights, international criminal law, international justice, international law, Iraq, open source information, social media, Syria, transitional justice, war crimes

Procedia PDF Downloads 336
2938 Numerical Solving Method for Specific Dynamic Performance of Unstable Flight Dynamics with PD Attitude Control

Authors: M. W. Sun, Y. Zhang, L. M. Zhang, Z. H. Wang, Z. Q. Chen

Abstract:

In the realm of flight control, the Proportional- Derivative (PD) control is still widely used for the attitude control in practice, particularly for the pitch control, and the attitude dynamics using PD controller should be investigated deeply. According to the empirical knowledge about the unstable flight dynamics, the control parameter combination conditions to generate sole or finite number of closed-loop oscillations, which is a quite smooth response and is more preferred by practitioners, are presented in analytical or numerical manners. To analyze the effects of the combination conditions of the control parameters, the roots of several polynomials are sought to obtain feasible solutions. These conditions can also be plotted in a 2-D plane which makes the conditions be more explicit by using multiple interval operations. Finally, numerical examples are used to validate the proposed methods and some comparisons are also performed.

Keywords: attitude control, dynamic performance, numerical solving method, interval, unstable flight dynamics

Procedia PDF Downloads 581
2937 Study of Education Learning Techniques and Game Genres

Authors: Khadija Al Farei, Prakash Kumar, Vikas Rao Naidu

Abstract:

Games are being developed with different genres for different age groups, for many decades. In many places, educational games are playing a vital role for active classroom environment and better learning among students. Currently, the educational games have assumed an important place in children and teenagers lives. The role of educational games is important for improving the learning capability among the students especially of this generation, who really live among electronic gadgets. Hence, it is now important to make sure that in our educational system, we are updated with all such advancement in technologies. Already much research is going on in this area of edutainment. This research paper will review around ten different research papers to find the relation between the education learning techniques and games. The result of this review provides guidelines for enhanced teaching and learning solutions in education. In-house developed educational games proved to be more effective, compared to the one which is readily available in the market.

Keywords: education, education game, educational technology, edutainment, game genres, gaming in education

Procedia PDF Downloads 415
2936 Technology Blending as an Innovative Construction Mechanism in the Global South

Authors: Janet Kaningen, Richard N. Kaningen, Jonas Kaningen

Abstract:

This paper aims to discover the best ways to improve production efficiency, cost efficiency, community cohesion, and long-term sustainability in Ghana's housing delivery. Advanced Construction Technologies (ACTs) are set to become the sustainable mainstay of the construction industry due to the demand for innovative housing solutions. Advances in material science, building component production, and assembly technologies are leading to the development of next-generation materials such as polymeric-fiber-based products, light-metal alloys, and eco-materials. Modular housing construction has become more efficient and cost-effective than traditional building methods and is becoming increasingly popular for commercial, industrial, and residential projects. Effective project management and logistics will be imperative in the future speed and cost of modular construction housing.

Keywords: technology blending, sustainability, housing, Ghana

Procedia PDF Downloads 87
2935 Dynamic Analysis of Double Deck Tunnel

Authors: C. W. Kwak, I. J. Park, D. I. Jang

Abstract:

The importance of cost-wise effective application and construction is getting increase due to the surge of traffic volume in the metropolitan cities. Accordingly, the necessity of the tunnel has large section becomes more critical. Double deck tunnel can be one of the most appropriate solutions to the necessity. The dynamic stability of double deck tunnel is essential against seismic load since it has large section and connection between perimeter lining and interim slab. In this study, 3-dimensional dynamic numerical analysis was conducted based on the Finite Difference Method to investigate the seismic behavior of double deck tunnel. Seismic joint for dynamic stability and the mitigation of seismic impact on the lining was considered in the modeling and analysis. Consequently, the mitigation of acceleration, lining displacement and stress were verified successfully.

Keywords: double deck tunnel, interim slab, 3-dimensional dynamic numerical analysis, seismic joint

Procedia PDF Downloads 382
2934 Automated Monitoring System to Support Investigation of Contributing Factors of Work-Related Disorders and Accidents

Authors: Erika R. Chambriard, Sandro C. Izidoro, Davidson P. Mendes, Douglas E. V. Pires

Abstract:

Work-related illnesses and disorders have been a constant aspect of work. Although their nature has changed over time, from musculoskeletal disorders to illnesses related to psychosocial aspects of work, its impact on the life of workers remains significant. Despite significant efforts worldwide to protect workers, the disparity between changes in work legislation and actual benefit for workers’ health has been creating a significant economic burden for social security and health systems around the world. In this context, this study aims to propose, test and validate a modular prototype that allows for work environmental aspects to be assessed, monitored and better controlled. The main focus is also to provide a historical record of working conditions and the means for workers to obtain comprehensible and useful information regarding their work environment and legal limits of occupational exposure to different types of environmental variables, as means to improve prevention of work-related accidents and disorders. We show the developed prototype provides useful and accurate information regarding the work environmental conditions, validating them with standard occupational hygiene equipment. We believe the proposed prototype is a cost-effective and adequate approach to work environment monitoring that could help elucidate the links between work and occupational illnesses, and that different industry sectors, as well as developing countries, could benefit from its capabilities.

Keywords: Arduino prototyping, occupational health and hygiene, work environment, work-related disorders prevention

Procedia PDF Downloads 126
2933 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 51
2932 Climate Change as Wicked Problems towards Sustainable Development

Authors: Amin Padash, Mehran Khodaparast, Saadat Khodaparast

Abstract:

Climate change is a significant and lasting change in the statistical distribution of weather patterns over periods ranging from decades to millions of years. Climate change is caused by factors such as biotic processes, variations in solar radiation received by Earth, plate tectonics, and volcanic eruptions. Certain human activities have also been identified as significant causes of recent climate change, often referred to as “Global Warming”. The ultimate goal of this paper is to determine how climate change affects the style of life and all of our activities. The paper focuses on what the effects of humans are on climate change and how communities can achieve sustainable development and use resources in a way that is good for the ecosystem and public. We opine Climate Change is a vital issue that can be called “Wicked Problem”. This paper attempts to address this wicked problem by COMPRAM Methodology as one of the possible solutions.

Keywords: climate change, COMPRAM, human influences, sustainable development, wicked problems

Procedia PDF Downloads 454
2931 Studying Methodological Maps on the Engineering Education Program

Authors: Elsaed Elsaed

Abstract:

With the constant progress in our daily lives through information and communication technology and the presence of abundant in research activities in the hardware and software associated with them, and develop and improve their performance, but still there is a need to provide all combined solutions in one business. A systematic mapping study was conducted to investigate the contributions that have been prepared, and the areas of knowledge that are explored further, and any aspects of the research used to divide the common understanding of the latest technology in software engineering education. Which, we have categorized into a well-defined engineering framework. An overview of current research topics and trends and their distribution by type of research and scope of application. In addition, the topics were grouped into groups and a list of proposed methods and frameworks and tools was used. The map shows that the current research impact is limited to a few areas of knowledge are needed to map a future path to fill the gaps in the instruction activities.

Keywords: methodological maps, engineering education program, literature survey, communication technology

Procedia PDF Downloads 140
2930 Non-Chronological Approach in Crane Girder and Composite Steel Beam Installation: Case Study

Authors: Govindaraj Ramanathan

Abstract:

The time delay and the structural stability are major issues in big size projects due to several factors. Improper planning and poor coordination lead to delay in construction, which sometimes result in reworking or rebuilding. This definitely increases the cost and time of project. This situation stresses the structural engineers to plan out of the limits of contemporary technology utilizing non-chronological approach with creative ideas. One of the strategies to solve this issue is through structural integrity solutions in a cost-effective way. We have faced several problems in a project worth 470 million USD, and one such issue is crane girder installation with composite steel beams. We have applied structural integrity approach with the proper and revised planning schedule to solve the problem efficiently with minimal expenses.

Keywords: construction management, delay, non-chronological approach, composite beam, structural integrity

Procedia PDF Downloads 237
2929 Corrosion Characterization of ZA-27 Metal Matrix Composites

Authors: H. V. Jayaprakash, P. V. Krupakara

Abstract:

This paper deals with the high corrosion resistance developed by the metal matrix composites when compared with that of matrix alloy by open circuit potential test. Matrix selected is ZA-27 and reinforcement selected is red mud particulates, which is a ceramic material. The composites are prepared using liquid melt metallurgy technique using vortex method. Preheated but uncoated red mud particulates are added to the melt. Metal matrix composites containing 2, 4 and 6 weight percentage of red mud are casted. Matrix was also casted in the same way for comparison. Specimen are fabricated according to ASTM standards. The corrodents used for the tests were 0.025, 0.05 and 0.1 molar sodium hydroxide solutions. They are subjected to Open Circuit Potential studies and weight loss corrosion tests. Corrosion rate was found to be decreased with increase in exposure time in both experiments. Effect of exposure time and presence of increased percentage of reinforcement red mud is discussed in detail.

Keywords: composites, vortex, particulates, red mud

Procedia PDF Downloads 449
2928 Shear Elastic Waves in Disordered Anisotropic Multi-Layered Periodic Structure

Authors: K. B. Ghazaryan, R. A. Ghazaryan

Abstract:

Based on the constitutive model and anti-plane equations of anisotropic elastic body of monoclinic symmetry we consider the problem of shear wave propagation in multi-layered disordered composite structure with point defect. Using transfer matrix method the analytic expression is obtained providing solutions of shear Floquet wave propagation in periodic disordered anisotropic structure. The usefulness of the obtained analytical expression was discussed also in reflection and refraction problems from multi-layered reflector as well as in vibration problem of multi-layered waveguides. Numerical results are presented highlighting the effects arising in disordered periodic structure due to defects of multi-layered structure.

Keywords: shear elastic waves, monoclinic anisotropic media, periodic structure, disordered multilayer laminae, multi-layered waveguide

Procedia PDF Downloads 408
2927 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables

Authors: Vicx Farm

Abstract:

This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.

Keywords: energy, agriculture, sustainability, power

Procedia PDF Downloads 74
2926 A Practical Model for Managing Beach Safety Focusing on Tourist Drownings in Koh Samui, Thailand

Authors: Siyathorn Khunon, Thanawit Buafai

Abstract:

This paper aims to investigate management of beach safety with a focus on tourist drownings in Samui. The data collected in this investigation will then lead to the proposal of a practical management model suitable for use in Samui. Qualitative research was conducted in the following manner: nine stakeholders from local government organizations and tourism businesses were interviewed in-depth. Additionally, a best practice case study from Phuket was applied to analyze beach safety. Twelve foreign tourists were also interviewed. Then, a focus group comprised of 32 people was used to determine practical solutions for enhancing tourists’ safety on the beach in Samui. A steering committee to coordinate between public and private organizations was proposed to manage and enhance tourists’ safety. A practical model is proposed to increase the safety level of tourists in Samui

Keywords: beach safety, drowning, tourist, Samui

Procedia PDF Downloads 274
2925 Modification of a Commercial Ultrafiltration Membrane by Electrospray Deposition for Performance Adjustment

Authors: Elizaveta Korzhova, Sebastien Deon, Patrick Fievet, Dmitry Lopatin, Oleg Baranov

Abstract:

Filtration with nanoporous ultrafiltration membranes is an attractive option to remove ionic pollutants from contaminated effluents. Unfortunately, commercial membranes are not necessarily suitable for specific applications, and their modification by polymer deposition is a fruitful way to adapt their performances accordingly. Many methods are usually used for surface modification, but a novel technique based on electrospray is proposed here. Various quantities of polymers were deposited on a commercial membrane, and the impact of the deposit is investigated on filtration performances and discussed in terms of charge and hydrophobicity. The electrospray deposition is a technique which has not been used for membrane modification up to now. It consists of spraying small drops of polymer solution under a high voltage between the needle containing the solution and the metallic support on which membrane is stuck. The advantage of this process lies in the small quantities of polymer that can be coated on the membrane surface compared with immersion technique. In this study, various quantities (from 2 to 40 μL/cm²) of solutions containing two charged polymers (13 mmol/L of monomer unit), namely polyethyleneimine (PEI) and polystyrene sulfonate (PSS), were sprayed on a negatively charged polyethersulfone membrane (PLEIADE, Orelis Environment). The efficacy of the polymer deposition was then investigated by estimating ion rejection, permeation flux, zeta-potential and contact angle before and after the polymer deposition. Firstly, contact angle (θ) measurements show that the surface hydrophilicity is notably improved by coating both PEI and PSS. Moreover, it was highlighted that the contact angle decreases monotonously with the amount of sprayed solution. Additionally, hydrophilicity enhancement was proved to be better with PSS (from 62 to 35°) than PEI (from 62 to 53°). Values of zeta-potential (ζ were estimated by measuring the streaming current generated by a pressure difference on both sides of a channel made by clamping two membranes. The ζ-values demonstrate that the deposits of PSS (negative at pH=5.5) allow an increase of the negative membrane charge, whereas the deposits of PEI (positive) lead to a positive surface charge. Zeta-potentials measurements also emphasize that the sprayed quantity has little impact on the membrane charge, except for very low quantities (2 μL/m²). The cross-flow filtration of salt solutions containing mono and divalent ions demonstrate that polymer deposition allows a strong enhancement of ion rejection. For instance, it is shown that rejection of a salt containing a divalent cation can be increased from 1 to 20 % and even to 35% by deposing 2 and 4 μL/cm² of PEI solution, respectively. This observation is coherent with the reversal of the membrane charge induced by PEI deposition. Similarly, the increase of negative charge induced by PSS deposition leads to an increase of NaCl rejection from 5 to 45 % due to electrostatic repulsion of the Cl- ion by the negative surface charge. Finally, a notable fall in the permeation flux due to the polymer layer coated at the surface was observed and the best polymer concentration in the sprayed solution remains to be determined to optimize performances.

Keywords: ultrafiltration, electrospray deposition, ion rejection, permeation flux, zeta-potential, hydrophobicity

Procedia PDF Downloads 187
2924 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 107
2923 Digital Transformation in Production Planning and Control: Evaluation of the Organizational Readiness

Authors: Tobias Wissing, Peter Burggräf, Johannes Wagner

Abstract:

Cost pressure, competitiveness and the increasing turbulence of globalized saturated markets has been the driver for a variety of research activities in the field of production planning and control (PPC) during the past decades. For some time past an increasing awareness for innovative technologies in terms of Industry 4.0 can be noticed. Although there are many promising approaches a solely installation of those smart solutions will not maximize the PPC performance. To accelerate the successful digital transformation the cooperation between employee and technology also has to be adapted. The existing processes and organizational structures might be not sufficient to maximize the utilization of technological innovations. This paper presents the key results of an extensive study which was conducted by the Laboratory for Machine Tools and Production Engineering (WZL) of the RWTH Aachen University to evaluate the current situation and examine the organizational readiness for this digital transformation.

Keywords: cyber-physical production system, digital transformation, industry 4.0, production planning and control

Procedia PDF Downloads 353
2922 Renovation of Industrial Zones in Ho Chi Minh City: An Approach from Changing Function of Processing to Urban Warehousing

Authors: Thu Le Thi Bao

Abstract:

Industrial parks have both active roles in promoting economic development and source of appearance of boarding houses and slums in the adjacent area, lacking infrastructure, causing many social evils. The context of the recent pandemic and climate change on a global scale pose issues that need to be resolved for sustainable development. Ho Chi Minh City aims to develop housing for migrant workers to stabilize human resources and, at the same time, solve problems of social evils caused by poor living conditions. The paper focuses on the content of renovating existing industrial parks and worker accommodation in Ho Chi Minh City to propose appropriate models, contributing to the goal of urban embellishment and solutions for industrial parks to adapt to abnormal impact conditions such as pandemics, climate change, crises.

Keywords: industrial park, social housing, accommodation, distribution center

Procedia PDF Downloads 113
2921 Second-Order Slip Flow and Heat Transfer in a Long Isothermal Microchannel

Authors: Huei Chu Weng, Chien-Hung Liu

Abstract:

This paper presents a study on the effect of second-order slip and jump on forced convection through a long isothermally heated or cooled planar microchannel. The fully developed solutions of thermal flow fields are analytically obtained on the basis of the second-order Maxwell-Burnett slip and Smoluchowski jump boundary conditions. Results reveal that the second-order term in the Karniadakis slip boundary condition is found to contribute a negative velocity slip and then to lead to a higher pressure drop as well as a higher fluid temperature for the heated-wall case or to a lower fluid temperature for the cooled-wall case. These findings are contrary to predictions made by the Deissler model. In addition, the role of second-order slip becomes more significant when the Knudsen number increases.

Keywords: microfluidics, forced convection, gas rarefaction, second-order boundary conditions

Procedia PDF Downloads 450
2920 Pantograph-Catenary Contact Force: Features Evaluation for Catenary Diagnostics

Authors: Mehdi Brahimi, Kamal Medjaher, Noureddine Zerhouni, Mohammed Leouatni

Abstract:

The Prognostics and Health Management is a system engineering discipline which provides solutions and models to the implantation of a predictive maintenance. The approach is based on extracting useful information from monitoring data to assess the “health” state of an industrial equipment or an asset. In this paper, we examine multiple extracted features from Pantograph-Catenary contact force in order to select the most relevant ones to achieve a diagnostics function. The feature extraction methodology is based on simulation data generated thanks to a Pantograph-Catenary simulation software called INPAC and measurement data. The feature extraction method is based on both statistical and signal processing analyses. The feature selection method is based on statistical criteria.

Keywords: catenary/pantograph interaction, diagnostics, Prognostics and Health Management (PHM), quality of current collection

Procedia PDF Downloads 290
2919 Decoding the Structure of Multi-Agent System Communication: A Comparative Analysis of Protocols and Paradigms

Authors: Gulshad Azatova, Aleksandr Kapitonov, Natig Aminov

Abstract:

Multiagent systems have gained significant attention in various fields, such as robotics, autonomous vehicles, and distributed computing, where multiple agents cooperate and communicate to achieve complex tasks. Efficient communication among agents is a crucial aspect of these systems, as it directly impacts their overall performance and scalability. This scholarly work provides an exploration of essential communication elements and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of these protocols across various scenarios. The research also sheds light on emerging trends within communication protocols for multiagent systems, including the incorporation of machine learning methods and the adoption of blockchain-based solutions to ensure secure communication. These trends provide valuable insights into the evolving landscape of multiagent systems and their communication protocols.

Keywords: communication, multi-agent systems, protocols, consensus

Procedia PDF Downloads 74
2918 The Ethio-Eritrea Claims Commission on Use of Force: Issue of Self-Defense or Violation of Sovereignty

Authors: Isaias Teklia Berhe

Abstract:

A decision that deals with international disputes, be it arbitral or judicial, has to properly reflect objectivity and coherence with existing rules of international law. This paper shows the decision of the Ethio-Eritrea Claims Commission on the jus ad bellum case is bereft of objectivity and coherence, which contributed a disservice to international law on many aspects. The Commission’s decision that holds Eritrea in contravention to Art 2(4) of the UN Charter based on Ethiopia’s contention is flawed. It fails to consider: the illegitimacy of an actual authority established over contested territory through hostile acts, the proper determination of effectivites under international law, the sanctity of colonially determined boundaries, Ethiopia’s prior firm political recognition and undergirds to respect colonial boundary, and Ethio-Eritrea Border Commission’s decision. The paper will also argue that the Commission confused Eritrea’s right of self-defense with the rule against the non-use of force to settle territorial disputes; wherefore its decision sanitizes or sterilizes unlawful change of territory resulted through unlawful use of force to the effect of advantaging aggressions. The paper likewise argues that the decision is so sacrilegious that it disregards the ossified legal finality of colonial boundaries. Moreover, its approach toward armed attack does not reflect the peculiarity of the jus ad bellum case rather it brings about definitional uncertainties and sustains the perception that the law on self-defense is unsettled.

Keywords: armed attack, Eritrea, Ethiopia, self-defense, territorial integrity, use of force

Procedia PDF Downloads 278
2917 Mechanical and Thermal Stresses in A Functionally Graded Cylinders

Authors: Ali Kurşun, Emre Kara, Erhan Çetin, Şafak Aksoy, Ahmet Kesimli

Abstract:

In this study, thermal elastic stress distribution occurred on long hollow cylinders made of functionally graded material (FGM) was analytically defined under thermal, mechanical and thermo mechanical loads. In closed form solutions for elastic stresses and displacements are obtained analytically by using the infinitesimal deformation theory of elasticity. It was assumed that elasticity modulus, thermal expansion coefficient and density of cylinder materials could change in terms of an exponential function as for that Poisson’s ratio was constant. A gradient parameter n is chosen between - 1 and 1. When n equals to zero, the disc becomes isotropic. Circumferential, radial and longitudinal stresses in the FGMs cylinders are depicted in the figures. As a result, the gradient parameters have great effects on the stress systems of FGMs cylinders.

Keywords: functionally graded materials, thermoelasticity, thermomechanical load, hollow cylinder.

Procedia PDF Downloads 458
2916 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security

Authors: Kenneth Harper

Abstract:

Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.

Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs

Procedia PDF Downloads 19
2915 Impact of Population Size on Symmetric Travelling Salesman Problem Efficiency

Authors: Wafa' Alsharafat, Suhila Farhan Abu-Owida

Abstract:

Genetic algorithm (GA) is a powerful evolutionary searching technique that is used successfully to solve and optimize problems in different research areas. Genetic Algorithm (GA) considered as one of optimization methods used to solve Travel salesman Problem (TSP). The feasibility of GA in finding a TSP solution is dependent on GA operators; encoding method, population size, termination criteria, in general. In specific, crossover and its probability play a significant role in finding possible solutions for Symmetric TSP (STSP). In addition, the crossover should be determined and enhanced in term reaching optimal or at least near optimal. In this paper, we spot the light on using a modified crossover method called modified sequential constructive crossover and its impact on reaching optimal solution. To justify the relevance of a parameter value in solving the TSP, a set comparative analysis conducted on different crossover methods values.

Keywords: genetic algorithm, crossover, mutation, TSP

Procedia PDF Downloads 227
2914 Dissolution Leaching Kinetics of Ulexite in Sodium Dihydrogen Phosphate Solutions

Authors: Emine Teke, Soner Kuşlu, Sabri Çolak, Turan Çalban

Abstract:

The aim of the present study was to investigate the dissolution kinetics of ulexite in sodium dihydrogen phosphate in a mechanical agitation system and also to declare an alternative reactant to produce the boric acid. Reaction temperature, concentration of sodium dihydrogen phosphate, stirring speed, solid-liquid ratio, and ulexite particle size were selected as parameters. The experimental results were successfully correlated by using linear regression and a statistical program. Dissolution curves were evaluated in order to test the shrinking core models for solid-fluid systems. It was observed that increase in the reaction temperature and decrease in the solid/liquid ratio causes an increase in the dissolution rate of ulexite. The activation energy was found to be 36.4 kJ/mol. The leaching of ulexite was controlled by diffusion through the ash (or product) layer.

Keywords: ulexite, sodium dihydrogen phosphate, leaching kinetics, boron

Procedia PDF Downloads 307
2913 Mechanisms for Strategic Adoption of Innovation Procurement

Authors: Carolina B. A. Morais, Antonio Bob Santos

Abstract:

In order to determine how innovation procurement can strengthen public efficiency and foster the modernization of public services, while at the same time promoting the opening of new private markets, this paper aims to present the two key instruments for the practice of innovation procurement at a European, national, and regional level – Pre-Commercial Procurement (PCP), and Public Procurement of Innovative Solutions (PPI). Thus, it starts with a theoretical framework on the emergence of this topic in the European Innovation Policy (Section 2), then continues with the identification and systematization of the main mechanisms for its effective adoption, both on the demand and supply side of the market (Section 3), as well as to expose and describe methods and tools for positioning innovation at the heart of public entities. The innovative projects best distinguished by the European Commission for their good practices in innovation procurement are identified, and the main methodology for the development and management of innovation procurement – Forward Commitment Procurement (FCP) – is applied to them in a pioneering way (Section 4). The relevance of innovation in public procurement is systematized and reflected upon in Section 5.

Keywords: innovation procurement, innovation policy, innovation, pubic procurement

Procedia PDF Downloads 120