Search results for: embedded into core business
3360 Visualization of Wave Propagation in Monocoupled System with Effective Negative Stiffness, Effective Negative Mass, and Inertial Amplifier
Authors: Abhigna Bhatt, Arnab Banerjee
Abstract:
A periodic system with only a single coupling degree of freedom is called a monocoupled system. Monocoupled systems with mechanisms like mass in the mass system generates effective negative mass, mass connected with rigid links generates inertial amplification, and spring-mass connected with a rigid link generateseffective negative stiffness. In this paper, the representative unit cell is introduced, considering all three mechanisms combined. Further, the dynamic stiffness matrix of the unit cell is constructed, and the dispersion relation is obtained by applying the Bloch theorem. The frequency response function is also calculated for the finite length of periodic unit cells. Moreover, the input displacement signal is given to the finite length of periodic structure and using inverse Fourier transform to visualize the wave propagation in the time domain. This visualization explains the sudden attenuation in metamaterial due to energy dissipation by an embedded resonator at the resonance frequency. The visualization created for wave propagation is found necessary to understand the insights of physics behind the attenuation characteristics of the system.Keywords: mono coupled system, negative effective mass, negative effective stiffness, inertial amplifier, fourier transform
Procedia PDF Downloads 1263359 Static and Dynamic Behaviors of Sandwich Structures With Metallic Connections
Authors: Shidokht Rashiddadash, Mojtaba Sadighi, Soheil Dariushi
Abstract:
Since sandwich structures are used in many areas ranging from ships, trains, automobiles, aircrafts, bridge and building, connecting sandwich structures is necessary almost in all industries. So application of metallic joints between sandwich panels is increasing. Various joining methods are available such as mechanically fastened joints (riveting or bolting) or adhesively bonded joints and choosing one of them depends on the application. In this research, sandwich specimens were fabricated with two different types of metallic connections with dissimilar geometries. These specimens included beams and plates and were manufactured using glass-epoxy skins and aluminum honeycomb core. After construction of the specimens, bending and low velocity impact tests were executed on them and the behaviors of specimens were discussed. Numerical models were developed using LS-DYNA software and validated with test results. Finally, parametric studies were performed on the thicknesses and lengths of two connections by employing the numerical models.Keywords: connection, honeycomb, low velocity impact, sandwich panel, static test
Procedia PDF Downloads 563358 Intelligent Building as a Pragmatic Approach towards Achieving a Sustainable Environment
Authors: Zahra Hamedani
Abstract:
Many wonderful technological developments in recent years has opened up the possibility of using intelligent buildings for a number of important applications, ranging from minimizing resource usage as well as increasing building efficiency to maximizing comfort, adaption to inhabitants and responsiveness to environmental changes. The concept of an intelligent building refers to the highly embedded, interactive environment within which by exploiting the use of artificial intelligence provides the ability to know its configuration, anticipate the optimum dynamic response to prevailing environmental stimuli, and actuate the appropriate physical reaction to provide comfort and efficiency. This paper contains a general identification of the intelligence paradigm and its impacts on the architecture arena, that with examining the performance of artificial intelligence, a mechanism to analyze and finally for decision-making to control the environment will be described. This mechanism would be a hierarchy of the rational agents which includes decision-making, information, communication and physical layers. This multi-agent system relies upon machine learning techniques for automated discovery, prediction and decision-making. Then, the application of this mechanism regarding adaptation and responsiveness of intelligent building will be provided in two scales of environmental and user. Finally, we review the identifications of sustainability and evaluate the potentials of intelligent building systems in the creation of sustainable architecture and environment.Keywords: artificial intelligence, intelligent building, responsiveness, adaption, sustainability
Procedia PDF Downloads 4103357 Development of E-Tendering Models for Nigerian Public Procuring Entities
Authors: Bello Abdullahi, Kabir Bala, Yahaya M. Ibrahim, Ahmed D. Ibrahim
Abstract:
Public sector tendering has traditionally been conducted using manual paper-based processes which are known to be inefficient, less transparent, and more prone to manipulations and errors. However, the advent of the Internet and its associated technologies has led to the development of numerous e-Tendering systems that addressed many of the problems associated with the manual paper-based tendering system. Currently, in Nigeria, the public tendering processes are largely conducted based on manual paper-based system that is bedevilled by a number of problems such as inordinate delays, inefficiencies, manipulation of the tender evaluation process, corruption, lack of transparency and competition, among other problems. These problems can be addressed through the adoption of existing web-based e-Tendering systems which are known to address most of these problems. However, these existing e-Tendering systems that have been developed are not based on the Nigerian legal procurement processes and as such their suitability for local application is very limited. This paper is part of a larger study that attempt to address this problem through the development of an e-Tendering system that is based on the requirements of the Nigerian public procuring entities. In this paper, the identified tendering processes commonly used by Nigerian public procuring entities in the selection of construction sources are presented. A multi-methods research approach was used to identify those tendering processes. Specifically, 19 existing business use cases used by Nigerian public procuring entities were identified and 61 system use cases were prescribed based on the identified business use cases. The use cases were used as the basis for the development of domain and software conceptual models. The models were successfully used to guide the development of an e-Tendering system called NPS-eTender. Ripple and Unified Process were adopted as the software development methodologies.Keywords: e-tendering, e-procurement, requirement model, conceptual model, public sector tendering, public procurement
Procedia PDF Downloads 1953356 Family Firms Performance: Examining the Impact of Digital and Technological Capabilities using Partial Least Squares Structural Equation Modeling and Necessary Condition Analysis
Authors: Pedro Mota Veiga
Abstract:
This study comprehensively evaluates the repercussions of innovation, digital advancements, and technological capabilities on the operational performance of companies across fifteen European Union countries following the initial wave of the COVID-19 pandemic. Drawing insights from longitudinal data sourced from the 2019 World Bank business surveys and subsequent 2020 World Bank COVID-19 follow-up business surveys, our extensive examination involves a diverse sample of 5763 family businesses. In exploring the relationships between these variables, we adopt a nuanced approach to assess the impact of innovation and digital and technological capabilities on performance. This analysis unfolds along two distinct perspectives: one rooted in necessity and the other insufficiency. The methodological framework employed integrates partial least squares structural equation modeling (PLS-SEM) with condition analysis (NCA), providing a robust foundation for drawing meaningful conclusions. The findings of the study underscore a positive influence on the performance of family firms stemming from both technological capabilities and digital advancements. Furthermore, it is pertinent to highlight the indirect contribution of innovation to enhanced performance, operating through its impact on digital capabilities. This research contributes valuable insights to the broader understanding of how innovation, coupled with digital and technological capabilities, can serve as pivotal factors in shaping the post-COVID-19 landscape for businesses across the European Union. The intricate analysis of family businesses, in particular adds depth to the comprehension of the dynamics at play in diverse economic contexts within the European Union.Keywords: digital capabilities, technological capabilities, family firms performance, innovation, NCA, PLS-SEM
Procedia PDF Downloads 633355 The Role of Knowledge Management in Global Software Engineering
Authors: Samina Khalid, Tehmina Khalil, Smeea Arshad
Abstract:
Knowledge management is essential ingredient of successful coordination in globally distributed software engineering. Various frameworks, KMSs, and tools have been proposed to foster coordination and communication between virtual teams but practical implementation of these solutions has not been found. Organizations have to face challenges to implement knowledge management system. For this purpose at first, a literature review is arranged to investigate about challenges that restrict organizations to implement KMS and then by taking in account these challenges a problem of need of integrated solution in the form of standardized KMS that can easily store tacit and explicit knowledge, has traced down to facilitate coordination and collaboration among virtual teams. Literature review has been already shown that knowledge is a complex perception with profound meanings, and one of the most important resources that contributes to the competitive advantage of an organization. In order to meet the different challenges caused by not properly managing knowledge related to projects among virtual teams in GSE, we suggest making use of the cloud computing model. In this research a distributed architecture to support KM storage is proposed called conceptual framework of KM as a service in cloud. Framework presented is enhanced and conceptual framework of KM is embedded into that framework to store projects related knowledge for future use.Keywords: management, Globsl software development, global software engineering
Procedia PDF Downloads 5273354 Researching International PhD Algerian Students’ Communication Challenges in Speaking When Discussing and Interacting with Their British Peers: A Researcher’s Interpretive Perspective through the Use of Semi-Structured Interview
Authors: H. Maita
Abstract:
This paper addresses the issue of the speaking challenges that the Algerian PhD students experience during their studies abroad, particularly in UK territory; more specifically, this study describes how these students may deal with such challenges and whether the cultural differences is one core reason in such dilemma or not. To this end, an understanding and interpretation of what actually encompasses both linguistic interference and cultural differences are required. Throughout the paper there is an attempt to explain the theoretical basis of the interpretive research and to theoretically discuss the pivotal use of the interview, as a data collection tool, in interpretive research. Thus, the central issue of this study is to frame the theoretical perspective of the interpretive research through the discussion of PhD Algerian’s communication and interaction challenges in the EFL context. This study is a corner stone for other research studies to further investigate the issue related to communication challenges because no specific findings will be pointed out in this research.Keywords: communication, EFL, interaction, linguistic interference
Procedia PDF Downloads 1323353 Geochemical Evaluation of Weathering-Induced Release of Trace Metals from the Maastritchian Shales in Parts of Bida an Anambra Basins, Nigeria
Authors: Adetunji Olusegun Aderigibigbe
Abstract:
Shales, especially black shales, are of great geological significance, in the study of heavy/trace metal contamination. This is due to their abundance in occurrence and high concentration of heavy metals embedded which are released during their weathering. Heavy metals constitute one of the most dangerous pollution known to human because they are toxic (i.e., carcinogenic), non-biodegradable and can enter the global eco-biological circle. In the past, heavy metal contamination in aquatic environment and agricultural top soil has been attributed to industrial wastes, mining extractions and pollution from traffic vehicles; only a few studies have focused on weathering of shale as possible source of heavy metal contamination. Based on the above background, this study attempts to establish weathering of shale as possible source of trace/heavy metal contaminations. This was done by carefully selecting fresh and their corresponding weathered shale samples from selected localities in Bida and Anambra Basins. The samples were analysed in Activation Laboratories Ltd; Ontario, Canada for trace/heavy metal. It was observed that some major and trace metals were released during weathering, i.e., some were depleted and some enriched. By this contamination of water zones and agricultural top soils are not only traceable to biogenic processes but geogenic inputs (weathering of shale) as well.Keywords: contamination, fresh samples, heavy metals, pollution, shales, trace metals, weathered samples
Procedia PDF Downloads 1333352 Cyber Operational Design and Military Decision Making Process
Authors: M. Karaman, H. Catalkaya
Abstract:
Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state
Procedia PDF Downloads 5893351 Formulation and Evaluation of Colon-Specific Drug Delivery System of Zaltoprofen
Authors: Surajj Sarode, G. P. Vadnere, G. Vidya Sagar
Abstract:
Compression coating is one of the strategies for delivering drug to the colon based on Gastrointestinal PH and transit time concept. The main aim of these formulations to develop rapidly disintegrating Zaltoprofen core tablets compression-coated with a mixture of time-dependent hydrophilic swellable polymer HPMC K 15 and PH responsive soluble polymer Chitosan and Guar gum in different ratios. The effect of the proportion of HPMC, Chitosan and Guar gum in the coat on premature drug release in upper part (Stomach and small intestine) of GIT and the amount of drug release in colon target area was studied. The formulations are carried out by using Direct Compression method. Sodium starch Glycolate used for rapid disintegration. FTIR used for Drug-Polymer Interaction studies. The prepared tablets were evaluated for hardness, thickness, friability, in-vitro disintegration, in-Vitro dissolution and in-vitro kinetic study.Keywords: zaltoprofen, chitosan, formulation, drug delivery
Procedia PDF Downloads 4523350 Instructional Coaches' Perceptions of Professional Development: An Exploration of the School-Based Support Program
Authors: Youmen Chaaban, Abdallah Abu-Tineh
Abstract:
This article examines the development of a professional development (PD) model for educator growth and learning that is embedded into the school context. The School based Support Program (SBSP), designed for the Qatari context, targets the practices, knowledge, and skills of both school leadership and teachers in an attempt to improve students’ learning outcomes. Key aspects of the model include the development of learning communities among teachers, strong leadership that supports school improvement activities, and the use of research-based PD to improve teacher practices and student achievement. This paper further presents the results of a qualitative study examining the perceptions of nineteen instructional coaches about the strengths of the PD program, the challenges they face in their day-to-day implementation of the program, and their suggestions for the betterment of the program’s implementation and outcomes. Data were collected from the instructional coaches through open-ended surveys followed by focus group interviews. The instructional coaches reported several strengths, which were compatible with the literature on effective PD. However, the challenges they faced were deeply rooted within the structure of the program, in addition to external factors operating at the school and Ministry of Education levels. Thus, a general consensus on the way the program should ultimately develop was reached.Keywords: situated professional development, school reform, instructional coach, school based support program
Procedia PDF Downloads 3563349 Optimization of Energy Harvesting Systems for RFID Applications
Authors: P. Chambe, B. Canova, A. Balabanian, M. Pele, N. Coeur
Abstract:
To avoid battery assisted tags with limited lifetime batteries, it is proposed here to replace them by energy harvesting systems, able to feed from local environment. This would allow total independence to RFID systems, very interesting for applications where tag removal from its location is not possible. Example is here described for luggage safety in airports, and is easily extendable to similar situation in terms of operation constraints. The idea is to fix RFID tag with energy harvesting system not only to identify luggage but also to supply an embedded microcontroller with a sensor delivering luggage weight making it impossible to add or to remove anything from the luggage during transit phases. The aim is to optimize the harvested energy for such RFID applications, and to study in which limits these applications are theoretically possible. Proposed energy harvester is based on two energy sources: piezoelectricity and electromagnetic waves, so that when the luggage is moving on ground transportation to airline counters, the piezo module supplies the tag and its microcontroller, while the RF module operates during luggage transit thanks to readers located along the way. Tag location on the luggage is analyzed to get best vibrations, as well as harvester better choice for optimizing the energy supply depending on applications and the amount of energy harvested during a period of time. Effects of system parameters (RFID UHF frequencies, limit distance between the tag and the antenna necessary to harvest energy, produced voltage and voltage threshold) are discussed and working conditions for such system are delimited.Keywords: RFID tag, energy harvesting, piezoelectric, EM waves
Procedia PDF Downloads 4523348 Internet Addiction among Students: An Empirical Study in Pondicherry University
Authors: Mashood C., Abdul Vahid K., Ashique C. K.
Abstract:
The technology is growing beyond human expectation. Internet is one of very sophisticated product of the information technology. It has various advantages like connecting the world, simplifying the difficult tasks done in past etc. Simultaneously it has demerits also; that is lack of authenticity and internet addiction. To find out the problems of internet addiction, a study conducted among the Postgraduate students of Pondicherry University and collected 454 samples. The study strictly focused to identify the internet addiction among students, influence and interdependence of personality on internet addiction among first years and second years. To evaluate this, we used two major analysis, these are Confirmatory Factor Analysis (CFA) to predict the internet addiction with the observed data and Logistic Regression to identify the difference between first years and second years in the case of internet addiction. Before applying to the core analysis, the data applied to some preliminary tests to check the model fit. The empirical findings shows that , the students of Pondicherry University are very much addicted to the internet, But there is no such huge difference between first years and second years in case of internet addiction.Keywords: internet addiction, students, Pondicherry University, empirical study
Procedia PDF Downloads 4593347 Targeted Delivery of Novel Copper-Based Nanoparticles for Advance Cancer Therapeutics
Authors: Arindam Pramanik, Parimal Karmakar
Abstract:
We have explored the synergistic anti-cancer activity of copper ion and acetylacetone complex containing 1,3 diketone group (like curcumin) in metallorganic compound “Copper acetylacetonate” (CuAA). The cytotoxicity mechanism of CuAA complex was evaluated on various cancer cell lines in vitro. Among these, reactive oxygen species (ROS), glutathione level (GSH) in the cell was found to increase. Further mitochondrial membrane damage was observed. The fate of cell death was found to be induced by apoptosis. For application purpose, we have developed a novel biodegradable, non-toxic polymer-based nanoparticle which has hydrophobically modified core for loading of the CuAA. Folic acid is conjugated on the surface of the polymer (chitosan) nanoparticle for targeting to cancer cells for minimizing toxicity to normal cells in-vivo. Thus, this novel drug CuAA has an efficient anticancer activity which has been targeted specifically to cancer cells through polymer nanoparticle.Keywords: anticancer, apoptosis, copper nanoparticle, targeted drug delivery
Procedia PDF Downloads 4843346 Non-Steroidal Microtubule Disrupting Analogues Induce Programmed Cell Death in Breast and Lung Cancer Cell Lines
Authors: Marcel Verwey, Anna M. Joubert, Elsie M. Nolte, Wolfgang Dohle, Barry V. L. Potter, Anne E. Theron
Abstract:
A tetrahydroisoquinolinone (THIQ) core can be used to mimic the A,B-ring of colchicine site-binding microtubule disruptors such as 2-methoxyestradiol in the design of anti-cancer agents. Steroidomimeric microtubule disruptors were synthesized by introducing C'2 and C'3 of the steroidal A-ring to C'6 and C'7 of the THIQ core and by introducing a decorated hydrogen bond acceptor motif projecting from the steroidal D-ring to N'2. For this in vitro study, four non-steroidal THIQ-based analogues were investigated and comparative studies were done between the non-sulphamoylated compound STX 3450 and the sulphamoylated compounds STX 2895, STX 3329 and STX 3451. The objective of this study was to investigate the modes of cell death induced by these four THIQ-based analogues in A549 lung carcinoma epithelial cells and metastatic breast adenocarcinoma MDA-MB-231 cells. Cytotoxicity studies to determine the half maximal growth inhibitory concentrations were done using spectrophotometric quantification via crystal violet staining and lactate dehydrogenase (LDH) assays. Microtubule integrity and morphologic changes of exposed cells were investigated using polarization-optical transmitted light differential interference contrast microscopy, transmission electron microscopy and confocal microscopy. Flow cytometric quantification was used to determine apoptosis induction and the effect that THIQ-based analogues have on cell cycle progression. Signal transduction pathways were elucidated by quantification of the mitochondrial membrane integrity, cytochrome c release and caspase 3, -6 and -8 activation. Induction of autophagic cell death by the THIQ-based analogues was investigated by morphological assessment of fluorescent monodansylcadaverine (MDC) staining of acidic vacuoles and by quantifying aggresome formation via flow cytometry. Results revealed that these non-steroidal microtubule disrupting analogues inhibited 50% of cell growth at nanomolar concentrations. Immunofluorescence microscopy indicated microtubule depolarization and the resultant mitotic arrest was further confirmed through cell cycle analysis. Apoptosis induction via the intrinsic pathway was observed due to depolarization of the mitochondrial membrane, induction of cytochrome c release as well as, caspase 3 activation. Potential involvement of programmed cell death type II was observed due to the presence of acidic vacuoles and aggresome formation. Necrotic cell death did not contribute significantly, indicated by stable LDH levels. This in vitro study revealed the induction of the intrinsic apoptotic pathway as well as possible involvement of autophagy after exposure to these THIQ-based analogues in both MDA-MB-231- and A549 cells. Further investigation of this series of anticancer drugs still needs to be conducted to elucidate the temporal, mechanistic and functional crosstalk mechanisms between the two observed programmed cell deaths pathways.Keywords: apoptosis, autophagy, cancer, microtubule disruptor
Procedia PDF Downloads 2533345 Disowning of ‘Our Lady of Alice Bhatti’ by Mohammad Hanif Through Gendered and Religious Discourse
Authors: Abrar Ajmal
Abstract:
The language used in literature reveals the culture and social gestalt of any society in which it has been constructed and consumed. This paper carries the same rationale, which aims to track certain socio-religious and cultural-economic disparities and discrepancies towards minorities, particularly Christians, in an Islamic re(public) where there is a clear majority of Muslims with the help of analysis of instances of language used in the narratives “Our Lady of Alice Bhatt” by Mohammad Hanif. It would highlight social inequalities practiced deeply in sociocultural discourse. Moreover, this research would also touch upon the question of gender discrimination and gender construction as a female entity in a male-chauvinistic scenic turnout using language since the novel revolves around communicative forfeits of Alice Bhatti’s life where she is fraying in fisticuffs to befit herself in a miss-fitted society. It would employ using Fairclough's framework for analysis to conduct a critical discourse analysis of the text at three axiom levels namely textual analysis, discursive practices, and socio-cultural analysis. Thus, the results would reveal textual findings in linguistic analysis, a range of embedded discourses in discursive practices, and consumption of the text into socio-cultural explications with the use of language and lexicalization employed in the selected excerpts.Keywords: gendered discourse, socio-economic disparities minorities, Islamization, analytical framework
Procedia PDF Downloads 593344 Hybrid Fuzzy Weighted K-Nearest Neighbor to Predict Hospital Readmission for Diabetic Patients
Authors: Soha A. Bahanshal, Byung G. Kim
Abstract:
Identification of patients at high risk for hospital readmission is of crucial importance for quality health care and cost reduction. Predicting hospital readmissions among diabetic patients has been of great interest to many researchers and health decision makers. We build a prediction model to predict hospital readmission for diabetic patients within 30 days of discharge. The core of the prediction model is a modified k Nearest Neighbor called Hybrid Fuzzy Weighted k Nearest Neighbor algorithm. The prediction is performed on a patient dataset which consists of more than 70,000 patients with 50 attributes. We applied data preprocessing using different techniques in order to handle data imbalance and to fuzzify the data to suit the prediction algorithm. The model so far achieved classification accuracy of 80% compared to other models that only use k Nearest Neighbor.Keywords: machine learning, prediction, classification, hybrid fuzzy weighted k-nearest neighbor, diabetic hospital readmission
Procedia PDF Downloads 1863343 Satellite Connectivity for Sustainable Mobility
Authors: Roberta Mugellesi Dow
Abstract:
As the climate crisis becomes unignorable, it is imperative that new services are developed addressing not only the needs of customers but also taking into account its impact on the environment. The Telecommunication and Integrated Application (TIA) Directorate of ESA is supporting the green transition with particular attention to the sustainable mobility.“Accelerating the shift to sustainable and smart mobility” is at the core of the European Green Deal strategy, which seeks a 90% reduction in related emissions by 2050 . Transforming the way that people and goods move is essential to increasing mobility while decreasing environmental impact, and transport must be considered holistically to produce a shared vision of green intermodal mobility. The use of space technologies, integrated with terrestrial technologies, is an enabler of smarter traffic management and increased transport efficiency for automated and connected multimodal mobility. Satellite connectivity, including future 5G networks, and digital technologies such as Digital Twin, AI, Machine Learning, and cloud-based applications are key enablers of sustainable mobility.SatCom is essential to ensure that connectivity is ubiquitously available, even in remote and rural areas, or in case of a failure, by the convergence of terrestrial and SatCom connectivity networks, This is especially crucial when there are risks of network failures or cyber-attacks targeting terrestrial communication. SatCom ensures communication network robustness and resilience. The combination of terrestrial and satellite communication networks is making possible intelligent and ubiquitous V2X systems and PNT services with significantly enhanced reliability and security, hyper-fast wireless access, as well as much seamless communication coverage. SatNav is essential in providing accurate tracking and tracing capabilities for automated vehicles and in guiding them to target locations. SatNav can also enable location-based services like car sharing applications, parking assistance, and fare payment. In addition to GNSS receivers, wireless connections, radar, lidar, and other installed sensors can enable automated vehicles to monitor surroundings, to ‘talk to each other’ and with infrastructure in real-time, and to respond to changes instantaneously. SatEO can be used to provide the maps required by the traffic management, as well as evaluate the conditions on the ground, assess changes and provide key data for monitoring and forecasting air pollution and other important parameters. Earth Observation derived data are used to provide meteorological information such as wind speed and direction, humidity, and others that must be considered into models contributing to traffic management services. The paper will provide examples of services and applications that have been developed aiming to identify innovative solutions and new business models that are allowed by new digital technologies engaging space and non space ecosystem together to deliver value and providing innovative, greener solutions in the mobility sector. Examples include Connected Autonomous Vehicles, electric vehicles, green logistics, and others. For the technologies relevant are the hybrid satcom and 5G providing ubiquitous coverage, IoT integration with non space technologies, as well as navigation, PNT technology, and other space data.Keywords: sustainability, connectivity, mobility, satellites
Procedia PDF Downloads 1333342 Stronger Together – Micro-Entrepreneurs’ Resilience Development in a Communal Training Space
Authors: Halonen
Abstract:
Covid-19 pandemic and the succeeding crises have profoundly shaken the accustomed ways of interaction and thereby challenged the customary engagement patterns among entrepreneurs Consequently, this has led to the experience of lack of collegial interaction for some. Networks and relationships are a crucial factor to strengthening resilience, being especially significant in non-ordinary times. This study aims to shed light on entrepreneurs’ resilience development in and through entrepreneurs’ communal and training space. The context for research is a communal training space in a municipality in Finland of which goal is to help entrepreneurs to experience of peer support and community as part of the "tribe" is strengthened, the entrepreneurs' well-being at work, resilience, ability to change, innovativeness and general life management is strengthened. This communal space is regarded as an example of a physical community of practice (CoP) of entrepreneurs. The research aims to highlight the importance of rediscovering the “new normal” communality as itself but as a key building block of resilience. The initial research questions of the study are: RQ1: What is the role of entrepreneurs’ CoP and communal space in nurturing resilience development among them? RQ2: What positive entrepreneurial outcomes can be achieved through established CoP. The data will be gathered starting from the launch of the communality space in September 2023 onwards. It includes participatory observations of training gatherings, interviews with entrepreneurs and utilizes action research as the method. The author has an active role in participating and facilitating the development. The full paper will be finalized by the fall 2024. The idea of the new normal communality in a CoP among entrepreneurs is to be rediscovered due to its positive impact on entrepreneur’s resilience and business success. The other implications of study can extend to wider entrepreneurial ecosystem and other key stakeholders. Especially emphasizing the potential of communality in CoP for fostering entrepreneurs’ resilience and well-being ensuing business growth, community-driven entrepreneurship development and vitality of the case municipality.Keywords: resilience, resilience development, communal space, community of practice (CoP)
Procedia PDF Downloads 743341 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware
Authors: Azita Ramezani, Atousa Ramezani
Abstract:
In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection
Procedia PDF Downloads 713340 The Persuasive Influence of Nollywood Film in Cultural Transmission: Negotiating Nigerian Culture in a South African Environment
Authors: Oluwayemisi Onyenankeya
Abstract:
The popularity and viewership of Nollywood films have expanded across African countries as well as European and American cities especially those with considerable Diaspora population. This appears to underscore the assumption that Nollywood films not only project or transmit the embedded Nigerian cultural values to audience members but also actually make appreciable impression on those audience members. This study sought to ascertain the role of Nollywood film in the transference of Nigerian cultural heritage across other cultures using students at the University of Fort Hare as a case study. This study sought to determine if audience members learn, imbibe or manifest any behavioural tendencies that can be ascribed to the influence of watching Nollywood films. Specifically, the study sought to establish the aspect of Nigerian culture that Nollywood films transmit to audience members. The survey research method was used while data was analysed using descriptive statistics. In all, 400 questionnaires were distributed while 370 were returned. Results show that students who were exposed to Nollywood film could mimic some common Nigerian expressions and exclamations. A small percentage of viewers could actually speak a smattering of some Nigerian language while a few have bought or made dresses in the pattern of what they saw in the films. It could be concluded that Nollywood films do exert significant influence on the viewers in the University of Fort Hare.Keywords: culture, film, Nollywood, transmission
Procedia PDF Downloads 2423339 Permanent Magnet Synchronous Generator: Unsymmetrical Point Operation
Authors: P. Pistelok
Abstract:
The article presents the concept of an electromagnetic circuit generator with permanent magnets mounted on the surface rotor core designed for single phase work. Computation field-circuit model was shown. The spectrum of time course of voltages in the idle work was presented. The cross section with graphically presentation of magnetic induction in particular parts of electromagnetic circuits was presented. Distribution of magnetic induction at the rated load point for each phase were shown. The time course of voltages and currents for each phases for rated power were displayed. An analysis of laboratory results and measurement of load characteristics of the generator was discussed. The work deals with three electromagnetic circuits of generators with permanent magnet where output voltage characteristics versus rated power were expressed.Keywords: permanent magnet generator, permanent magnets, vibration, course of torque, single phase work, asymmetrical three phase work
Procedia PDF Downloads 2883338 Modification of Working Conditions Based on Participatory Ergonomics to Improve Occupational Health and Safety (K3) and Welding Worker Productivity
Authors: Tri Wisudawati, Radita Dwi Putera
Abstract:
The role of human resources is the basic capital in determining the purpose of a business place. Without the role of human resources, activities in the company will not run smoothly. Every business place always has a risk of accidents. The magnitude of the risk that occurs depends on the type of industry, technology, and risk control efforts made. Work-related accidents are accidents that occur due to work or while carrying out work. Welding MSMEs have a fairly high risk to health, safety and the environment both from the side of workers who can cause accidents and from the side of the work environment, which has the potential to become a hazard and risk. Participatory ergonomic intervention can be a feasible and effective approach to reducing exposure to work-related risk factors in developing country industries. Complaints about occupational health and safety experienced by workers in the welding workshop industry should be able to be overcome by implementing an ergonomic intervention approach. The analysis process includes HIRARC analysis, participatory ergonomics analysis, and SEM-PLS analysis. Hierarch analysis is carried out by assessing the level of severity and likelihood, as well as risk control. At the participatory ergonomics analysis stage, it is obtained from the organizational culture and organizational stakeholders. At the SEM-PLS stage, an analysis is carried out to see whether there is a strong relationship between the research variables in order to produce occupational health and safety (K3) and worker productivity in the welding shop better and in accordance with welding safety standards. So that the output of this study is how participatory ergonomics interventions affect working conditions to improve occupational health and safety and the productivity of welding workers.Keywords: ergonomic partisipatory, health and safety, welding workers, welding safety
Procedia PDF Downloads 233337 Unified Theory of the Security Dilemma: Geography, MAD and Democracy
Authors: Arash Heydarian Pashakhanlou
Abstract:
The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence
Procedia PDF Downloads 2383336 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farming as Web of Things to Cloud Interface Using Platform as a Service
Authors: Sumaya Iqbal, Aijaz Ahmad Reshi
Abstract:
The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made the resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular Representational State Transfer protocol (REST) was extended for the specific requirements of the application. Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway
Procedia PDF Downloads 1223335 Nonlinear Analysis of a Building Surmounted by a RC Water Tank under Hydrodynamic Load
Authors: Hocine Hammoum, Karima Bouzelha, Lounis Ziani, Lounis Hamitouche
Abstract:
In this paper, we study a complex structure which is an apartment building surmounted by a reinforced concrete water tank. The tank located on the top floor of the building is a container with capacity of 1000 m3. The building is complex in its design, its calculation and by its behavior under earthquake effect. This structure located in Algiers and aged of 53 years has been subjected to several earthquakes, but the earthquake of May 21st, 2003 with a magnitude of 6.7 on the Richter scale that struck Boumerdes region at 40 Kms East of Algiers was fatal for it. It was downgraded after an investigation study because the central core sustained serious damage. In this paper, to estimate the degree of its damages, the seismic performance of the structure will be evaluated taking into account the hydrodynamic effect, using a static equivalent nonlinear analysis called pushover.Keywords: performance analysis, building, reinforced concrete tank, seismic analysis, nonlinear analysis, hydrodynamic, pushover
Procedia PDF Downloads 4213334 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 1533333 Silver-Doped Magnetite Titanium Oxide Nanoparticles for Photocatalytic Degradation of Organic Pollutants
Authors: Hanna Abbo, Siyasanga Noganta, Salam Titinchi
Abstract:
The global lack of clean water for human sanitation and other purposes has become an emerging dilemma for human beings. The presence of organic pollutants in wastewater produced by textile industries, leather manufacturing and chemical industries is an alarming matter for a safe environment and human health. For the last decades, conventional methods have been applied for the purification of water but due to industrialization these methods fall short. Advanced oxidation processes and their reliable application in degradation of many contaminants have been reported as a potential method to reduce and/or alleviate this problem. Lately it has been assumed that incorporation of some metal nanoparticles such as magnetite nanoparticles as photocatalyst for Fenton reaction which could improve the degradation efficiency of contaminants. Core/shell nanoparticles, are extensively studied because of their wide applications in the biomedical, drug delivery, electronics fields and water treatment. The current study is centred on the synthesis of silver-doped Fe3O4/SiO2/TiO2 photocatalyst. Magnetically separable Fe3O4@SiO2@TiO2 composite with core–shell structure were synthesized by the deposition of uniform anatase TiO2 NPs on Fe3O4@SiO2 by using titanium butoxide (TBOT) as titanium source. Then, the silver is doped on SiO2 layer by hydrothermal method. Integration of magnetic nanoparticles was suggested to avoid the post separation difficulties associated with the powder form of the TiO2 catalyst, increase of the surface area and adsorption properties. The morphology, structure, composition, and magnetism of the resulting composites were characterized and their photocatalytic activities were also evaluated. The results demonstrate that TiO2 NPs were uniformly deposited on the Fe3O4@SiO2 surface. The silver nanoparticles were also uniformly distributed on the surface of TiO2 nanoparticles. The aim of this work is to study the suitability of photocatalysis for the treatment of aqueous streams containing organic pollutants such as methylene blue which is selected as a model compound to represent one of the pollutants existing in wastewaters. Various factors such as initial pollutant concentration, photocatalyst dose and wastewater matrix were studied for their effect on the photocatalytic degradation of the organic model pollutants using the as synthesized catalysts and compared with the commercial titanium dioxide (Aeroxide P25). Photocatalysis was found to be a potential purification method for the studied pollutant also in an industrial wastewater matrix with the removal percentages of over 81 % within 15 minutes. Methylene blue was removed most efficiently and its removal consumed the least of energy in terms of the specific applied energy. The magnetic Ag/SiO2/TiO2 composites show high photocatalytic performance and can be recycled three times by magnetic separation without major loss of activity, which meant that they can be used as efficient and conveniently renewable photocatalyst.Keywords: Magnetite nanoparticles, Titanium, Photocatalyst, Organic pollutant, Water treatment
Procedia PDF Downloads 2673332 Modular Harmonic Cancellation in a Multiplier High Voltage Direct Current Generator
Authors: Ahmad Zahran, Ahmed Herzallah, Ahmad Ahmad, Mahran Quraan
Abstract:
Generation of high DC voltages is necessary for testing the insulation material of high voltage AC transmission lines with long lengths. The harmonic and ripple contents of the output DC voltage supplied by high voltage DC circuits require the use of costly capacitors to smooth the output voltage after rectification. This paper proposes a new modular multiplier high voltage DC generator with embedded Cockcroft-Walton circuits that achieve a negligible harmonic and ripple contents of the output DC voltage without the need for costly filters to produce a nearly constant output voltage. In this new topology, Cockcroft-Walton modules are connected in series to produce a high DC output voltage. The modules are supplied by low input AC voltage sources that have the same magnitude and frequency and shifted from each other by a certain angle to eliminate the harmonics from the output voltage. The small ripple factor is provided by the smoothing column capacitors and the phase shifted input voltages of the cascaded modules. The constituent harmonics within each module are determined using Fourier analysis. The viability of the proposed DC generator for testing purposes and the effectiveness of the cascaded connection are confirmed by numerical simulations using MATLAB/Simulink.Keywords: Cockcroft-Walton circuit, harmonics, ripple factor, HVDC generator
Procedia PDF Downloads 3673331 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 40