Search results for: systems expansion
8047 The Effect of Torsional Angle on Reversible Electron Transfer in Donor: Acceptor Frameworks Using Bis(Imino)Pyridines as Proxy
Authors: Ryan Brisbin, Hassan Harb, Justin Debow, Hrant Hratchian, Ryan Baxter
Abstract:
Donor-Acceptor (DA) frameworks are crucial parts of any technology requiring charge transport. This type of behavior is ubiquitous across technologies from semi conductors to solar panels. Currently, most DA systems involve metallic components, but progressive research is being pursued to design fully organic DA systems to be used as both organic semi-conductors and light emitting diodes. These systems are currently comprised of conductive polymers and salts. However, little is known about the effect of various physical aspects (size, torsional angle, electron density) have on the act of reversible charge transfer. Herein, the effect of torsional angle on reductive stability in bis(imino)pyridines is analyzed using a combination of single crystal analysis and electro-chemical peak current ratios from cyclic voltammetry. The computed free energies of reduction and electron attachment points were also investigated through density functional theory and natural ionization orbital theory to gain greater understanding of the global effect torsional angles have on electron transfer in bis(imino)pyridines. Findings indicated that torsional angles are a multi-variable parameter affected by both local steric constraints and resonant electronic contributions. Local steric impacted torsional angles demonstrated a negligible effect on electrochemical reversibility, while resonant affected torsional angles were observed to significantly alter the electrochemical reversibility.Keywords: cyclic voltammetry, bis(imino)pyridines, structure-activity relationship, torsional angles
Procedia PDF Downloads 2388046 Intrusion Detection Using Dual Artificial Techniques
Authors: Rana I. Abdulghani, Amera I. Melhum
Abstract:
With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.Keywords: IDS, SI, BP, NSL_KDD, PSO
Procedia PDF Downloads 3828045 Agent-Based Simulation for Supply Chain Transport Corridors
Authors: Kamalendu Pal
Abstract:
Supply chains are the spinal cord of trade and commerce. Their logistics use different transport corridors on regular basis for operational purpose. The international supply chain transport corridors include different infrastructure elements (e.g. weighbridge, package handling equipment, border clearance authorities, and so on) in supply chains. This paper presents the use of multi-agent systems (MAS) to model and simulate some aspects of transportation corridors, and in particular the area of weighbridge resource optimization for operational profit generation purpose. An underlying multi-agent model provides a means of modeling the relationships among stakeholders in order to enable coordination in a transport corridor environment. Simulations of the costs of container unloading, reloading, and waiting time for queuing up tracks have been carried out using data sets. Results of the simulation provide the potential guidance in making decisions about optimal service resource allocation in a trade corridor.Keywords: multi-agent systems, simulation, supply chain, transport corridor, weighbridge
Procedia PDF Downloads 3538044 Material Supply Mechanisms for Contemporary Assembly Systems
Authors: Rajiv Kumar Srivastava
Abstract:
Manufacturing of complex products such as automobiles and computers requires a very large number of parts and sub-assemblies. The design of mechanisms for delivery of these materials to the point of assembly is an important manufacturing system and supply chain challenge. Different approaches to this problem have been evolved for assembly lines designed to make large volumes of standardized products. However, contemporary assembly systems are required to concurrently produce a variety of products using approaches such as mixed model production, and at times even mass customization. In this paper we examine the material supply approaches for variety production in moderate to large volumes. The conventional approach for material delivery to high volume assembly lines is to supply and stock materials line-side. However for certain materials, especially when the same or similar items are used along the line, it is more convenient to supply materials in kits. Kitting becomes more preferable when lines concurrently produce multiple products in mixed model mode, since space requirements could increase as product/ part variety increases. At times such kits may travel along with the product, while in some situations it may be better to have delivery and station-specific kits rather than product-based kits. Further, in some mass customization situations it may even be better to have a single delivery and assembly station, to which an entire kit is delivered for fitment, rather than a normal assembly line. Finally, in low-moderate volume assembly such as in engineered machinery, it may be logistically more economical to gather materials in an order-specific kit prior to launching final assembly. We have studied material supply mechanisms to support assembly systems as observed in case studies of firms with different combinations of volume and variety/ customization. It is found that the appropriate approach tends to be a hybrid between direct line supply and different kitting modes, with the best mix being a function of the manufacturing and supply chain environment, as well as space and handling considerations. In our continuing work we are studying these scenarios further, through the use of descriptive models and progressing towards prescriptive models to help achieve the optimal approach, capturing the trade-offs between inventory, material handling, space, and efficient line supply.Keywords: assembly systems, kitting, material supply, variety production
Procedia PDF Downloads 2268043 Presentation of HVA Faults in SONELGAZ Underground Network and Methods of Faults Diagnostic and Faults Location
Authors: I. Touaїbia, E. Azzag, O. Narjes
Abstract:
Power supply networks are growing continuously and their reliability is getting more important than ever. The complexity of the whole network comprises numerous components that can fail and interrupt the power supply for the end user. Underground distribution systems are normally exposed to permanent faults, due to specific construction characteristics. In these systems, visual inspection cannot be performed. In order to enhance service restoration, accurate fault location techniques must be applied. This paper describes the different faults that affect the underground distribution system of SONELGAZ (National Society of Electricity and Gas of Algeria), and cable fault location procedure with impulse reflection method (TDR), based in the analyses of the cable response of the electromagnetic impulse, allows cable fault prelocation. The results are obtained from real test in the underground distribution feeder from electrical network of energy distribution company of Souk-Ahras, in order to know the influence of cable characteristics in the types and frequency of faults.Keywords: distribution networks, fault location, TDR, underground cable
Procedia PDF Downloads 5338042 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 678041 Applying Knowledge Management and Attitude Based on Holistic Approach in Learning Andragogy, as an Effort to Solve Environmental Problems after Mining Activities
Authors: Aloysius Hardoko, Susilo
Abstract:
The root cause of environmental damage post coal mining activities as determined by the province of East Kalimantan as a corridor of economic activity masterplan acceleration of economic development expansion (MP3EI) is the behavior of adults. Adult behavior can be changed through knowledge management and attitude. Based on the root of the problem, the objective of the research is to apply knowledge management and attitude based on holistic approach in learning andragogy as an effort to solve environmental problems after coal mining activities. Research methods to achieve the objective of using quantitative research with pretest posttest group design. Knowledge management and attitudes based on a holistic approach in adult learning are applied through initial learning activities, core and case-based cover of environmental damage. The research instrument is a description of the case of environmental damage. The data analysis uses t-test to see the effect of knowledge management attitude based on holistic approach before and after adult learning. Location and sample of representative research of adults as many as 20 people in Kutai Kertanegara District, one of the districts in East Kalimantan province, which suffered the worst environmental damage. The conclusion of the research result is the application of knowledge management and attitude in adult learning influence to adult knowledge and attitude to overcome environmental problem post coal mining activity.Keywords: knowledge management and attitude, holistic approach, andragogy learning, environmental damage
Procedia PDF Downloads 2428040 Ballistic Performance of Magnesia Panels and Modular Wall Systems
Authors: Khin Thandar Soe, Mark Stephen Pulham
Abstract:
Ballistic building materials play a crucial role in ensuring the safety of the occupants within protective structures. Traditional options like Ordinary Portland Cement (OPC)-based walls, including reinforced concrete walls, precast concrete walls, masonry walls, and concrete blocks, are frequently employed for ballistic protection, but they have several drawbacks such as being thick, heavy, costly, and challenging to construct. On the other hand, glass and composite materials offer lightweight and easier construction alternatives, but they come with a high price tag. There has been no reported test data on magnesium-based ballistic wall panels or modular wall systems so far. This paper presents groundbreaking small arms test data related to the development of the world’s first magnesia cement ballistic wall panels and modular wall system. Non-hydraulic magnesia cement exhibits several superior properties, such as lighter weight, flexibility, acoustics, and fire performance, compared to the traditional Portland Cement. However, magnesia cement is hydrophilic and may degrade in prolonged contact with water. In this research, modified magnesia cement for water resistant and durability from UBIQ Technology is applied. The specimens are made of a modified magnesia cement formula and prepared in the Laboratory of UBIQ Technology Pty Ltd. The specimens vary in thickness, and the tests cover various small arms threats in compliance with standards AS/NZS2343 and UL752 and are performed up to the maximum threat level of Classification R2 (NATO) and UL-Level 8(NATO) by the Accredited Test Centre, BMT (Ballistic and Mechanical Testing, VIC, Australia). In addition, the results of the test conducted on the specimens subjected to the small 12mm diameter steel ball projectile impact generated by a gas gun are also presented and discussed in this paper. Gas gun tests were performed in UNSW@ADFA, Canberra, Australia. The tested results of the magnesia panels and wall systems are compared with one of concrete and other wall panels documented in the literature. The conclusion drawn is that magnesia panels and wall systems exhibit several advantages over traditional OPC-based wall systems, and they include being lighter, thinner, and easier to construct, all while providing equivalent protection against threats. This makes magnesia cement-based materials a compelling choice of application where efficiency and performance are critical to create a protective environment.Keywords: ballistics, small arms, gas gun, projectile, impact, wall panels, modular, magnesia cement
Procedia PDF Downloads 778039 Formulation and Characterization of Antimicrobial Chewing Gum Delivery of Some Herbal Extracts for Treatment of Periodontal Diseases
Authors: Reenu Yadav, Vidhi Guha, Udit N. Soni, Jay Ram Patel
Abstract:
Chewing gums are mobile novel drug delivery systems, with a potential for administering drugs either for local action or for systemic absorption via the buccal route. An antimicrobial chewing gum delivery system of the methanolic extracts of Beatea monosperma (barks and twigs), Cordia obliqua (leaves and seeds) and Cuminun cyminum (seeds) against periodontal diseases caused by some oral pathogens, was designed and characterized on various parameters.The results of the study support the traditional application of the plants and suggest, plant extracts possess compounds with antimicrobial properties that can be used as potential antimicrobial agents and gums can be a good carrier of herbal extracts. Developed formulation will cure/protect from various periodontal diseases. Further development and evaluations chewing gums including the isolated compounds on the commercial scale and their clinical and toxicological studies are the future challenges.Keywords: periodontal diseases, herbal chewing gum, herbal extracts, novel drug delivery systems
Procedia PDF Downloads 3948038 Hydraulic Analysis of Irrigation Approach Channel Using HEC-RAS Model
Authors: Muluegziabher Semagne Mekonnen
Abstract:
This study was intended to show the irrigation water requirements and evaluation of canal hydraulics steady state conditions to improve on scheme performance of the Meki-Ziway irrigation project. The methodology used was the CROPWAT 8.0 model to estimate the irrigation water requirements of five major crops irrigated in the study area. The results showed that for the whole existing and potential irrigation development area of 2000 ha and 2599 ha, crop water requirements were 3,339,200 and 4,339,090.4 m³, respectively. Hydraulic simulation models are fundamental tools for understanding the hydraulic flow characteristics of irrigation systems. Hydraulic simulation models are fundamental tools for understanding the hydraulic flow characteristics of irrigation systems. In this study Hydraulic Analysis of Irrigation Canals Using HEC-RAS Model was conducted in Meki-Ziway Irrigation Scheme. The HEC-RAS model was tested in terms of error estimation and used to determine canal capacity potential.Keywords: HEC-RAS, irrigation, hydraulic. canal reach, capacity
Procedia PDF Downloads 608037 A New Approach to Interval Matrices and Applications
Authors: Obaid Algahtani
Abstract:
An interval may be defined as a convex combination as follows: I=[a,b]={x_α=(1-α)a+αb: α∈[0,1]}. Consequently, we may adopt interval operations by applying the scalar operation point-wise to the corresponding interval points: I ∙J={x_α∙y_α ∶ αϵ[0,1],x_α ϵI ,y_α ϵJ}, With the usual restriction 0∉J if ∙ = ÷. These operations are associative: I+( J+K)=(I+J)+ K, I*( J*K)=( I*J )* K. These two properties, which are missing in the usual interval operations, will enable the extension of the usual linear system concepts to the interval setting in a seamless manner. The arithmetic introduced here avoids such vague terms as ”interval extension”, ”inclusion function”, determinants which we encounter in the engineering literature that deal with interval linear systems. On the other hand, these definitions were motivated by our attempt to arrive at a definition of interval random variables and investigate the corresponding statistical properties. We feel that they are the natural ones to handle interval systems. We will enable the extension of many results from usual state space models to interval state space models. The interval state space model we will consider here is one of the form X_((t+1) )=AX_t+ W_t, Y_t=HX_t+ V_t, t≥0, where A∈ 〖IR〗^(k×k), H ∈ 〖IR〗^(p×k) are interval matrices and 〖W 〗_t ∈ 〖IR〗^k,V_t ∈〖IR〗^p are zero – mean Gaussian white-noise interval processes. This feeling is reassured by the numerical results we obtained in a simulation examples.Keywords: interval analysis, interval matrices, state space model, Kalman Filter
Procedia PDF Downloads 4258036 Photocaged Carbohydrates: Versatile Tools for Biotechnological Applications
Authors: Claus Bier, Dennis Binder, Alexander Gruenberger, Dagmar Drobietz, Dietrich Kohlheyer, Anita Loeschcke, Karl Erich Jaeger, Thomas Drepper, Joerg Pietruszka
Abstract:
Light absorbing chromophoric systems are important optogenetic tools for biotechnical and biophysical investigations. Processes such as fluorescence or photolysis can be triggered by light-absorption of chromophores. These play a central role in life science. Photocaged compounds belong to such chromophoric systems. The photo-labile protecting groups enable them to release biologically active substances with high temporal and spatial resolution. The properties of photocaged compounds are specified by the characteristics of the caging group as well as the characteristics of the linked effector molecule. In our research, we work with different types of photo-labile protecting groups and various effector molecules giving us possible access to a large library of caged compounds. As a function of the caged effector molecule, a nearly limitless number of biological systems can be directed. Our main interest focusses on photocaging carbohydrates (e.g. arabinose) and their derivatives as effector molecules. Based on these resulting photocaged compounds a precisely controlled photoinduced gene expression will give us access to studies of numerous biotechnological and synthetic biological applications. It could be shown, that the regulation of gene expression via light is possible with photocaged carbohydrates achieving a higher-order control over this processes. With the one-step cleavable photocaged carbohydrate, a homogeneous expression was achieved in comparison to free carbohydrates.Keywords: bacterial gene expression, biotechnology, caged compounds, carbohydrates, optogenetics, photo-removable protecting group
Procedia PDF Downloads 2278035 A Web-Based Systems Immunology Toolkit Allowing the Visualization and Comparative Analysis of Publically Available Collective Data to Decipher Immune Regulation in Early Life
Authors: Mahbuba Rahman, Sabri Boughorbel, Scott Presnell, Charlie Quinn, Darawan Rinchai, Damien Chaussabel, Nico Marr
Abstract:
Collections of large-scale datasets made available in public repositories can be used to identify and fill gaps in biomedical knowledge. But first, these data need to be made readily accessible to researchers for analysis and interpretation. Here a collection of transcriptome datasets was made available to investigate the functional programming of human hematopoietic cells in early life. Thirty two datasets were retrieved from the NCBI Gene Expression Omnibus (GEO) and loaded in a custom, interactive web application called the Gene Expression browser (GXB), designed for visualization and query of integrated large-scale data. Multiple sample groupings and gene rank lists were created based on the study design and variables in each dataset. Web links to customized graphical views can be generated by users and subsequently be used to graphically present data in manuscripts for publication. The GXB tool also enables browsing of a single gene across datasets, which can provide information on the role of a given molecule across biological systems. The dataset collection is available online. As a proof-of-principle, one of the datasets (GSE25087) was re-analyzed to identify genes that are differentially expressed by regulatory T cells in early life. Re-analysis of this dataset and a cross-study comparison using multiple other datasets in the above mentioned collection revealed that PMCH, a gene encoding a precursor of melanin-concentrating hormone (MCH), a cyclic neuropeptide, is highly expressed in a variety of other hematopoietic cell types, including neonatal erythroid cells as well as plasmacytoid dendritic cells upon viral infection. Our findings suggest an as yet unrecognized role of MCH in immune regulation, thereby highlighting the unique potential of the curated dataset collection and systems biology approach to generate new hypotheses which can be tested in future mechanistic studies.Keywords: early-life, GEO datasets, PMCH, interactive query, systems biology
Procedia PDF Downloads 2968034 The Effects of Logistics Applications on Logistics Activities of Service Providers: An Assessment of a 3PL Company in Turkey
Authors: Fatmanur Avar, Kubra G. Kostepen, Seda Lafci
Abstract:
In today’s world, technological innovations have brought out entirely new business understanding. Companies operating in logistics have become more flexible to business trends such as digitalization, innovation, sustainability, flexibility, and productivity. Through the arrival of the fourth industrial revolution called as industry 4.0 approach, the logistics concepts have been redefined. By adopting automated planning and scheduling, organizing and controlling systems such as Transportation Management System (TMS), Enterprise Resource Planning (ERP), warehouse control systems, it will be possible for businesses to be ahead of logistics process. In this research, the aim is to reveal the effects of logistics 4.0 applications for a third party logistics service provider (3PL) located in Turkey. Also, the impacts of logistics 4.0 on key performance indicators (KPI) are examined under the scope of the study. As a methodology, a semi-structured interview is conducted with a global 3PL company and data collected from interviews is analyzed with content analysis. At the end of the analysis, it is presented the effects of logistics 4.0 applications on logistics activities of the company. Limitations and suggestions are also offered.Keywords: key performance indicators, KPI, logistics activities, logistics 4.0, 3PL
Procedia PDF Downloads 1828033 The Systems Theoretic Accident Model and Process (Stamp) as the New Trend to Promote Safety Culture in Construction
Authors: Natalia Ortega
Abstract:
Safety Culture (SCU) involves various perceptual, psychological, behavioral, and managerial factors. It has been shown that creating and maintaining an SCU is one way to reduce and prevent accidents and fatalities. In the construction sector, safety attitude, knowledge, and a supportive environment are predictors of safety behavior. The highest possible proportion of safety behavior among employees can be achieved by improving their safety attitude and knowledge. Accordingly, top management's commitment to safety is vital in shaping employees' safety attitude; therefore, the first step to improving employees' safety attitude is the genuine commitment of top management to safety. One of the factors affecting the successful implementation of health and safety promotion programs is the construction industry's subcontracting model. The contractual model's complexity, combined with the need for coordination among diverse stakeholders, makes it challenging to implement, manage, and follow up on health and well-being initiatives. The Systems theoretic accident model and process (STAMP) concept has expanded global consideration in recent years, increasing research attention. STAMP focuses attention on the role of constraints in safety management. The findings discover a growth of the research field from the definition in 2004 by Leveson and is being used across multiple domains. A systematic literature review of this novel model aims to meet the safety goals for human space exploration with a powerful and different approach to safety management, safety-driven design, and decision-making. Around two hundred studies have been published about applying the model. However, every single model for safety requires time to transform into research and practice, be tested and debated, and grow further and mature.Keywords: stamp, risk management, accident prevention, safety culture, systems thinking, construction industry, safety
Procedia PDF Downloads 808032 Wear Resistance and Thermal Stability of Tungsten Boride Layers Deposited by Magnetron Sputtering
Authors: Justyna Chrzanowska, Jacek Hoffman, Dariusz Garbiec, Łukasz Kurpaska, Piotr Denis, Tomasz Moscicki, Zygmunt Szymanski
Abstract:
Tungsten and boron compounds belong to the group of superhard materials and its hardness could exceed 40 GPa. In this study, the properties of the tungsten boride (WB) layers deposited in magnetron sputtering process are investigated. The sputtering process occurred from specially prepared targets that were composed of boron and tungsten mixed in molar ratio of 2.5 or 4.5 and sintered in spark plasma sintering process. WB layers were deposited on silicon (100) and stainless steel 304 substrates at room temperature (RT) or in 570 °C. Layers deposited in RT and in elevated temperature varied considerably. Layers deposited in RT are amorphous and have low adhesion. In contrast, the layers deposited in 570 °C are crystalline and have good adhesion. All deposited layers have a hardness about 40 GPa. Moreover, the friction coefficient of crystalline layers is 0.22 and wear rate is about 0.67•10-6 mm3N-1m-1. After material characterization the WB layers were annealed in argon atmosphere in 1000 °C for 1 hour. On the basis of X-Ray Diffraction analysis, it has been noted that the crystalline layers are thermally stable and do not change their phase composition, whereas the amorphous layers change their phase composition. Moreover, after annealing, on the surface of WB layers some cracks were observed. It is probably connected with the differences of the thermal expansion between the layer and the substrate. Despite of the presence of cracks, the wear resistance of annealed layers is still higher than the wear resistance of uncoated substrate. The analysis of the structure and properties of tungsten boride layers lead to the discussion about the application area of this material.Keywords: hard coatings, hard materials, magnetron sputtering, mechanical properties, tungsten boride
Procedia PDF Downloads 2898031 The Term of Intellectual Property and Artificial Intelligence
Authors: Yusuf Turan
Abstract:
Definition of Intellectual Property Rights according to the World Intellectual Property Organization: " Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce." It states as follows. There are 2 important points in the definition; we can say that it is the result of intellectual activities that occur by one or more than one PERSON and as INNOVATION. When the history and development of the relevant definitions are briefly examined, it is realized that these two points have remained constant and Intellectual Property law and rights have been shaped around these two points. With the expansion of the scope of the term Intellectual Property as a result of the development of technology, especially in the field of artificial intelligence, questions such as "Can "Artificial Intelligence" be an inventor?" need to be resolved within the expanding scope. In the past years, it was ruled that the artificial intelligence named DABUS seen in the USA did not meet the definition of "individual" and therefore would be an inventor/inventor. With the developing technology, it is obvious that we will encounter such situations much more frequently in the field of intellectual property. While expanding the scope, we should definitely determine the boundaries of how we should decide who performs the mental activity or creativity that we call indispensable on the inventor/inventor according to these problems. As a result of all these problems and innovative situations, it is clearly realized that not only Intellectual Property Law and Rights but also their definitions need to be updated and improved. Ignoring the situations that are outside the scope of the current Intellectual Property Term is not enough to solve the problem and brings uncertainty. The fact that laws and definitions that have been operating on the same theories for years exclude today's innovative technologies from the scope contradicts intellectual property, which is expressed as a new and innovative field. Today, as a result of the innovative creation of poetry, painting, animation, music and even theater works with artificial intelligence, it must be recognized that the definition of Intellectual Property must be revised.Keywords: artificial intelligence, innovation, the term of intellectual property, right
Procedia PDF Downloads 728030 Bifurcations of a System of Rotor-Ball Bearings with Waviness and Squeeze Film Dampers
Authors: Sina Modares Ahmadi, Mohamad Reza Ghazavi, Mandana Sheikhzad
Abstract:
Squeeze film damper systems (SFD) are often used in machines with high rotational speed to reduce non-periodic behavior by creating external damping. These types of systems are frequently used in aircraft gas turbine engines. There are some structural parameters which are of great importance in designing these kinds of systems, such as oil film thickness, C, and outer race mass, mo. Moreover, there is a crucial parameter associated with manufacturing process, under the title of waviness. Geometric imperfections are often called waviness if its wavelength is much longer than Hertzian contact width which is a considerable source of vibration in ball bearings. In this paper, a system of a flexible rotor and two ball bearings with floating ring squeeze film dampers and consideration of waviness has been modeled and solved by a numerical integration method, namely Runge-Kutta method to investigate the dynamic response of the system. The results show that by increasing the number of wave lobes, which is due to inappropriate manufacturing, non- periodic and chaotic behavior increases. This result reveals the importance of manufacturing accuracy. Moreover, as long as C< 1.5×10-4 m, by increasing the oil film thickness, unwanted vibrations and non-periodic behavior of the system have been reduced, On the other hand, when C>1.5×10-4 m, increasing the outer oil film thickness results in the increasing chaotic and non-periodic responses. This result shows that although the presence of oil film results in reduction the non-periodic and chaotic behaviors, but the oil film has an optimal thickness. In addition, with increasing mo, the disc displacement amplitude increases. This result reveals the importance of utilizing light materials in manufacturing the squeeze film dampers.Keywords: squeeze-film damper, waviness, ball bearing, bifurcation
Procedia PDF Downloads 3838029 A Methodology for the Identification of Technological Gaps and the Measurement of the Level of Technological Acceptance in the Rural Sector in Colombia
Authors: Anyi Katherine Garzon Robles, Luis Carlos Gomez Florez
Abstract:
Since the advent of the Internet, the use of Information Technologies (IT) has increased exponentially. The field of informatics and telecommunications has put on the table countless possibilities for the development of different socio-economic activities, promoting a change of social paradigm and the emergence of the so-called information and knowledge society. For more than a decade, the Colombian government has been working on the incorporation of IT into the public sector through an e-government strategy. However, to date, many technological gaps has not yet been identified in the country to our knowledge, especially in rural areas and far from large cities, where factors such as low investment and the expansion of the armed conflict have led to economic and technological stagnation. This paper presents the research results obtained from the execution of a research project, which was approach from a qualitative approach and a methodological design of a participatory action research type. This design consists of nine fundamental stages divided into four work cycles. For which different strategies for data collection and analysis were established. From which, a methodology was obtained for the identification of technological gaps and the measurement of the level of technological acceptance in the rural sector, based on the TAM (Technology Acceptance Model) model, as a previous activity to the development of IT solutions framed in the e-government strategy in Colombia. The result of this research work represents a contribution from academia for the improvement of the country's technological development and a guide for the proper planning of IT solutions aimed at promoting a close relationship between government and citizens.Keywords: E-government, knowledge society, level of technological acceptance, technological gaps, technology acceptance model
Procedia PDF Downloads 2378028 A Case Study of Assessing the Impact of Electronic Payment System on the Service Delivery of Banks in Nigeria
Authors: Idris Lawal
Abstract:
Electronic payment system is simply a payment or monetary transaction made over the internet or a network of computers. This study was carried out in order to assess how electronic payment system has impacted on banks service delivery, to examine the efficiency of electronic payment system in Nigeria and to determine the level of customer's satisfaction as a direct result of the deployment of electronic payment systems. It is an empirical study conducted using structured questionnaire distributed to officials and customers of Access Bank plc. Chi-square(x2) was adopted for the purpose of data analysis. The result of the study showed that the development of electronic payment system offer great benefit to bank customers including improved services, reduced turn-around time, ease of banking transaction, significant cost saving etc. The study recommends that customer protection laws should be properly put in place to safeguard the interest of end users of e-payment instruments.Keywords: bank, electronic payment systems, service delivery, customer's satisfaction
Procedia PDF Downloads 3998027 The Use of Knowledge Management Systems and Information Communication Technology Service Desk Management to Minimize the Digital Divide Experienced in the Museum Sector
Authors: Ruel A. Welch
Abstract:
Since the introduction of ServiceNow, the UK’s Science Museum Group’s (SMG) ICT service desk portal. There has not been an analysis of the tools available to SMG staff for just-in-time knowledge acquisition (knowledge management systems) and reporting ICT incidents with a focus on an aspect of professional identity, namely, gender. This study is conducted in the milieu of UK museums, galleries, arts, academic, charitable, and cultural heritage sectors. Numerous authors suggest that males and females experience ICT usage differently. Therefore, it is important for SMG to investigate the apparent disparities so that solutions can be derived to minimize this digital divide if one exists. It is acknowledged at SMG that there are challenges with keeping up with an ever-changing digital landscape. Subsequently, this entails the rapid upskilling of staff and developing an infrastructure that supports just-in-time technological knowledge acquisition and reporting technology-related issues. This problem was addressed by analyzing ServiceNow ICT incident reports and reports from knowledge articles from a six-month period from February to July. This study found a statistically significant relationship between gender and reporting an ICT incident. There is also a significant relationship between gender and the priority level of ICT incidents. Interestingly, there is no statistically significant relationship between gender and reading knowledge articles. Additionally, there is no statistically significant relationship between gender and reporting an ICT incident related to the knowledge article that was read by staff. The knowledge acquired from this study is useful to service desk management practice as it will help to inform the creation of future knowledge articles and ICT incident reporting processes.Keywords: digital divide, ICT service desk practice, knowledge management systems, workplace learning
Procedia PDF Downloads 1278026 Unsupervised Text Mining Approach to Early Warning System
Authors: Ichihan Tai, Bill Olson, Paul Blessner
Abstract:
Traditional early warning systems that alarm against crisis are generally based on structured or numerical data; therefore, a system that can make predictions based on unstructured textual data, an uncorrelated data source, is a great complement to the traditional early warning systems. The Chicago Board Options Exchange (CBOE) Volatility Index (VIX), commonly referred to as the fear index, measures the cost of insurance against market crash, and spikes in the event of crisis. In this study, news data is consumed for prediction of whether there will be a market-wide crisis by predicting the movement of the fear index, and the historical references to similar events are presented in an unsupervised manner. Topic modeling-based prediction and representation are made based on daily news data between 1990 and 2015 from The Wall Street Journal against VIX index data from CBOE.Keywords: early warning system, knowledge management, market prediction, topic modeling.
Procedia PDF Downloads 3388025 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA
Authors: Mohamad Khairi Ishak
Abstract:
Conventional public key crypto systems such as RSA (Ron Rivest, Adi Shamir and Leonard Adleman), DSA (Digital Signature Algorithm), and Elgamal are no longer efficient to be implemented in the small, memory constrained devices. Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key crypto systems, has thus become a very attractive choice for many applications. This paper describes implementation of an elliptic curve cryptography (ECC) encryption engine on a FPGA. The system has been implemented in 2 different key sizes, which are 131 bits and 163 bits. Area and timing analysis are provided for both key sizes for comparison. The crypto system, which has been implemented on Altera’s EPF10K200SBC600-1, has a hardware size of 5945/9984 and 6913/9984 of logic cells for 131 bits implementation and 163 bits implementation respectively. The crypto system operates up to 43 MHz, and performs point multiplication operation in 11.3 ms for 131 bits implementation and 14.9 ms for 163 bits implementation. In terms of speed, our crypto system is about 8 times faster than the software implementation of the same system.Keywords: elliptic curve cryptography, FPGA, key sizes, memory
Procedia PDF Downloads 3238024 Research Analysis of Urban Area Expansion Based on Remote Sensing
Authors: Sheheryar Khan, Weidong Li, Fanqian Meng
Abstract:
The Urban Heat Island (UHI) effect is one of the foremost problems out of other ecological and socioeconomic issues in urbanization. Due to this phenomenon that human-made urban areas have replaced the rural landscape with the surface that increases thermal conductivity and urban warmth; as a result, the temperature in the city is higher than in the surrounding rural areas. To affect the evidence of this phenomenon in the Zhengzhou city area, an observation of the temperature variations in the urban area is done through a scientific method that has been followed. Landsat 8 satellite images were taken from 2013 to 2015 to calculate the effect of Urban Heat Island (UHI) along with the NPP-VRRIS night-time remote sensing data to analyze the result for a better understanding of the center of the built-up area. To further support the evidence, the correlation between land surface temperatures and the normalized difference vegetation index (NDVI) was calculated using the Red band 4 and Near-infrared band 5 of the Landsat 8 data. Mono-window algorithm was applied to retrieve the land surface temperature (LST) distribution from the Landsat 8 data using Band 10 and 11 accordingly to convert the top-of-atmosphere radiance (TOA) and to convert the satellite brightness temperature. Along with Landsat 8 data, NPP-VIIRS night-light data is preprocessed to get the research area data. The analysis between Landsat 8 data and NPP night-light data was taken to compare the output center of the Built-up area of Zhengzhou city.Keywords: built-up area, land surface temperature, mono-window algorithm, NDVI, remote sensing, threshold method, Zhengzhou
Procedia PDF Downloads 1398023 Study of Ladle Furnace Slag as Mineral Filler in Asphalt Concrete with Electric Arc Furnace Slag
Authors: W. J. Wang, D. F. Lin, L. Y. Chen, K. Y. Liu
Abstract:
In this study, the ladle furnace slag was used as a mineral filler in asphalt concrete with electric arc furnace slag (EAF asphalt concrete) to investigate the effect on the engineering and thermal properties of asphalt cement mastics and EAF asphalt concrete, the lime was used as a comparison for mineral filler, and the usage percentage of mineral filler was set at 2%, 4%, 6%, and 8%. First of all, the engineering properties of the ladle furnace slag and lime were compared, and then the mineral filler was mixed with bitumen to form the asphalt cement mastics in order to analyze the influence of the ladle furnace slag on the properties of asphalt cement mastics, and lastly, the mineral filler was used in the EAF asphalt concrete to analyze its feasibility of using ladle furnace slag as a mineral filler. The study result shows that the ladle furnace slag and the lime have no obvious difference in their physical properties, and from the energy dispersive spectrometer (EDS) test results, we know that the lime and the ladle furnace slag have similar elemental composition, but the Ca found in the ladle furnace slag belongs to CaO, and the lime belongs to CaCO3, therefore the ladle furnace slag has the property of expansion. According to the test results, the viscosity of asphalt cement mastics will increase with the increase in the use of mineral filler. Since the ladle furnace slag has more CaO content, the viscosity of the asphalt cement mastics with ladle furnace slag will increase more than using lime as mineral filler in the asphalt cement mastics, and the use of ladle furnace slag only needs to be 2% in order to achieve the effect of anti-peeling which is 6% for lime. From the related test results of EAF asphalt concrete, it is known that the maximum stability value can be obtained when the use of mineral filler is about 5%. When the ladle furnace slag is used as the mineral filler, it can improve the stiffness, indirect tension strength, spalling resistance, and thermal insulation of EAF asphalt concrete, which also indicates that using the ladle furnace slag as the mineral filler of bitumen can help to improve the durability of the asphalt pavement.Keywords: ladle furnace slag, mineral filler, asphalt cement mastics, EAF asphalt concrete
Procedia PDF Downloads 858022 Wait-Optimized Scheduler Algorithm for Efficient Process Scheduling in Computer Systems
Authors: Md Habibur Rahman, Jaeho Kim
Abstract:
Efficient process scheduling is a crucial factor in ensuring optimal system performance and resource utilization in computer systems. While various algorithms have been proposed over the years, there are still limitations to their effectiveness. This paper introduces a new Wait-Optimized Scheduler (WOS) algorithm that aims to minimize process waiting time by dividing them into two layers and considering both process time and waiting time. The WOS algorithm is non-preemptive and prioritizes processes with the shortest WOS. In the first layer, each process runs for a predetermined duration, and any unfinished process is subsequently moved to the second layer, resulting in a decrease in response time. Whenever the first layer is free or the number of processes in the second layer is twice that of the first layer, the algorithm sorts all the processes in the second layer based on their remaining time minus waiting time and sends one process to the first layer to run. This ensures that all processes eventually run, optimizing waiting time. To evaluate the performance of the WOS algorithm, we conducted experiments comparing its performance with traditional scheduling algorithms such as First-Come-First-Serve (FCFS) and Shortest-Job-First (SJF). The results showed that the WOS algorithm outperformed the traditional algorithms in reducing the waiting time of processes, particularly in scenarios with a large number of short tasks with long wait times. Our study highlights the effectiveness of the WOS algorithm in improving process scheduling efficiency in computer systems. By reducing process waiting time, the WOS algorithm can improve system performance and resource utilization. The findings of this study provide valuable insights for researchers and practitioners in developing and implementing efficient process scheduling algorithms.Keywords: process scheduling, wait-optimized scheduler, response time, non-preemptive, waiting time, traditional scheduling algorithms, first-come-first-serve, shortest-job-first, system performance, resource utilization
Procedia PDF Downloads 918021 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 1408020 Soil Arching Effect in Columnar Embankments: A Numerical Study
Authors: Riya Roy, Anjana Bhasi
Abstract:
Column-supported embankments provide a practical and efficient solution for construction on soft soil due to the low cost and short construction times. In the recent years, geosynthetic have been used in combination with column systems to support embankments. The load transfer mechanism in these systems is a combination of soil arching effect, which occurs between columns and membrane effect of the geosynthetic. This paper aims at the study of soil arching effect on columnar embankments using finite element software, ABAQUS. An axisymmetric finite element model is generated and using this model, parametric studies are carried out. Thus the effects of various factors such as height of embankment fill, elastic modulus of pile and tensile stiffness of geosynthetic, on soil arching have been studied. The development of negative skin friction along the pile-soil interface have also been studied and the results obtained from this study are compared with the current design methods.Keywords: ABAQUS, geosynthetic, negative skin friction, soil arching
Procedia PDF Downloads 3798019 Improved Wetting for Improved Solubility and Dissolution of Candesartan Cilexetil
Authors: Shilpa Bhilegaonkar, Ram Gaud
Abstract:
Candesartan cilexetil is a poorly soluble antihypertensive agent with solubility limited bioavailability (15%). To initiate process of solubilisation, it is very much necessary to displace the air at the surface and wet the drug surface with a solvent, with which drug is compatible. Present research adopts the same principle to improve solubility and dissolution of candesartan cilexetil. Solvents used here are surfactant and modified surfactant in different drug: solvent (1:1-1:9) ratio’s for preparation of adsorbates. Adsorbates were then converted into free flowing powders as liquisolid compacts and compressed to form tablets. Liquisolid compacts were evaluated for improvement in saturation solubility and dissolution of candesartan cilexetil. All systems were evaluated for improvement in saturation solubility and dissolution in different medias such as water, 0.1 N HCl, Phosphate buffer pH 6.8 and media given by office of generic drugs along with other physicochemical testing. All systems exhibited a promising advantage in terms of solubility and dissolution without affecting the drug structure as confirmed by IR and XRD. No considerable advantage was seen of increasing solvent ratio with drug.Keywords: candesartan cilexetil, improved dissolution, solubility, liquisolid
Procedia PDF Downloads 3288018 Modeling of a Concentrating Photovoltaic Module with and without Cooling System
Authors: Intissar Benrhouma, Marta Victoria, Ignacio Anton, Bechir Chaouachi
Abstract:
Concentrating photovoltaic systems CPV use optical elements, such as Fresnel lenses, to concentrate solar intensity. The concentrated solar energy is delivered to the solar cell from 20 to 100 W/cm². Some of this energy is converted to electricity, while the rest must be disposed of as a residual heat. Solar cells cooling should be a necessary part of CPV modeling because these systems allowed increasing the power received by the cell. This high power can rise the electrons’ potential causing the heating of the cell, which reduces the global module’s efficiency. This work consists of modeling a concentrating photovoltaic module with and without a cooling system. We have established a theoretical model based on energy balances carried out on a photovoltaic module using solar radiation concentration cells. Subsequently, we developed a calculation program on Matlab which allowed us to simulate the functioning of this module. The obtained results show that the addition of a cooling system to the module improves greatly the performance of our CPV system.Keywords: solar energy, photovoltaic, concentration, cooling, performance improvement
Procedia PDF Downloads 398