Search results for: implementation of a programmable logic controller (PLC) based ‘optimisation controller’
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30992

Search results for: implementation of a programmable logic controller (PLC) based ‘optimisation controller’

28412 Structured Cross System Planning and Control in Modular Production Systems by Using Agent-Based Control Loops

Authors: Simon Komesker, Achim Wagner, Martin Ruskowski

Abstract:

In times of volatile markets with fluctuating demand and the uncertainty of global supply chains, flexible production systems are the key to an efficient implementation of a desired production program. In this publication, the authors present a holistic information concept taking into account various influencing factors for operating towards the global optimum. Therefore, a strategy for the implementation of multi-level planning for a flexible, reconfigurable production system with an alternative production concept in the automotive industry is developed. The main contribution of this work is a system structure mixing central and decentral planning and control evaluated in a simulation framework. The information system structure in current production systems in the automotive industry is rigidly hierarchically organized in monolithic systems. The production program is created rule-based with the premise of achieving uniform cycle time. This program then provides the information basis for execution in subsystems at the station and process execution level. In today's era of mixed-(car-)model factories, complex conditions and conflicts arise in achieving logistics, quality, and production goals. There is no provision for feedback loops of results from the process execution level (resources) and process supporting (quality and logistics) systems and reconsideration in the planning systems. To enable a robust production flow, the complexity of production system control is artificially reduced by the line structure and results, for example in material-intensive processes (buffers and safety stocks - two container principle also for different variants). The limited degrees of freedom of line production have produced the principle of progress figure control, which results in one-time sequencing, sequential order release, and relatively inflexible capacity control. As a result, modularly structured production systems such as modular production according to known approaches with more degrees of freedom are currently difficult to represent in terms of information technology. The remedy is an information concept that supports cross-system and cross-level information processing for centralized and decentralized decision-making. Through an architecture of hierarchically organized but decoupled subsystems, the paradigm of hybrid control is used, and a holonic manufacturing system is offered, which enables flexible information provisioning and processing support. In this way, the influences from quality, logistics, and production processes can be linked holistically with the advantages of mixed centralized and decentralized planning and control. Modular production systems also require modularly networked information systems with semi-autonomous optimization for a robust production flow. Dynamic prioritization of different key figures between subsystems should lead the production system to an overall optimum. The tasks and goals of quality, logistics, process, resource, and product areas in a cyber-physical production system are designed as an interconnected multi-agent-system. The result is an alternative system structure that executes centralized process planning and decentralized processing. An agent-based manufacturing control is used to enable different flexibility and reconfigurability states and manufacturing strategies in order to find optimal partial solutions of subsystems, that lead to a near global optimum for hybrid planning. This allows a robust near to plan execution with integrated quality control and intralogistics.

Keywords: holonic manufacturing system, modular production system, planning, and control, system structure

Procedia PDF Downloads 161
28411 Generalized π-Armendariz Authentication Cryptosystem

Authors: Areej M. Abduldaim, Nadia M. G. Al-Saidi

Abstract:

Algebra is one of the important fields of mathematics. It concerns with the study and manipulation of mathematical symbols. It also concerns with the study of abstractions such as groups, rings, and fields. Due to the development of these abstractions, it is extended to consider other structures, such as vectors, matrices, and polynomials, which are non-numerical objects. Computer algebra is the implementation of algebraic methods as algorithms and computer programs. Recently, many algebraic cryptosystem protocols are based on non-commutative algebraic structures, such as authentication, key exchange, and encryption-decryption processes are adopted. Cryptography is the science that aimed at sending the information through public channels in such a way that only an authorized recipient can read it. Ring theory is the most attractive category of algebra in the area of cryptography. In this paper, we employ the algebraic structure called skew -Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.

Keywords: cryptosystem, identification, skew π-Armendariz rings, skew polynomial rings, zero knowledge protocol

Procedia PDF Downloads 202
28410 Relationship Between In-Service Training and Employees’ Feeling of Psychological Ownership

Authors: Mahsa Kallhor Mohammadi, Hamideh Reshadatjoo

Abstract:

This study verified the relationship between in-service training and employees’ feeling of psychological ownership. This research applied a descriptive survey that investigated a correlation between variables. The target population was 140 employees of a Drilling Fluid and Waste Management Service Company, and the sample was 123 employees who were selected randomly and encouraged to complete an electronic questionnaire which was designed based on standard questionnaires for research variables covering 62 questions. The face validity of the questionnaire was supported by an experimental test, and its content validity was approved by the thesis supervisor and consulting advisor. For the descriptive statistics frequency tables and diagrams, measures of central tendency such as mode, median, and mean and measures of variability such as variance, standards deviation, and quartile deviation were used. In the inferential statistics section, the Pearson correlation coefficient was used to verify the relationship between the variables of the research. According to the results, all of the research hypotheses were supported. According to hypothesis 1, there was a positive and significant relationship between training policy-making and employees’ psychological ownership (r=0/408, α=0/05). According to hypothesis 2, there was a positive and significant relationship between training planning and employees’ psychological ownership (r=0/446, α=0/05). According to hypothesis 3, there was a positive and significant relationship between providing the training and employees’ psychological ownership (r=0/512, α=0/05). According to hypothesis 4, there was a positive and significant relationship between training performance management and employees’ psychological ownership (r=0/462, α=0/05). According to hypothesis 5, there was a positive and significant relationship between employees’ motivation and psychological ownership (r=0/694, α=0/05). Therefore, through systematic in-service training, which is in the same line with the strategic goals of an organization and is based on scientific needs analysis, design, implementation, and evaluation, it is possible to improve employees’ sense of psychological ownership toward an organization.

Keywords: in-service training, motivation, organizational behavior, psychological ownership

Procedia PDF Downloads 49
28409 An ICF Framework for Game-Based Experiences in Geriatric Care

Authors: Marlene Rosa, Susana Lopes

Abstract:

Board games have been used for different purposes in geriatric care, demonstrating good results for health in general. However, there is not a conceptual framework that can help professionals and researchers in this area to design intervention programs or to think about future studies in this area. The aim of this study was to provide a pilot collection of board games’ serious purposes in geriatric care, using a WHO framework for health and disability. Study cases were developed in seven geriatric residential institutions from the center region in Portugal that are included in AGILAB program. The AGILAB program is a serious game-based method to train and spread out the implementation of board games in geriatric care. Each institution provides 2-hours/week of experiences using TATI Hand Game for serious purposes and then fulfill questions about a study-case (player characteristics; explain changes in players health according to this game experience). Two independent researchers read the information and classified it according to the International Classification for Functioning and Disability (ICF) categories. Any discrepancy was solved in a consensus meeting. Results indicate an important variability in body functions and structures: specific mental functions (e.g., b140 Attention functions, b144 Memory functions), b156 Perceptual functions, b2 sensory functions and pain (e.g., b230 Hearing functions; b265 Touch function; b280 Sensation of pain), b7 neuromusculoskeletal and movement-related functions (e.g., b730 Muscle power functions; b760 Control of voluntary movement functions; b710 Mobility of joint functions). Less variability was found in activities and participation domains, such as purposeful sensory experiences (d110-d129) (e.g., d115 Listening), communication (d3), d710 basic interpersonal interactions, d920 recreation and leisure (d9200 Play; d9205 Socializing). Concluding, this framework designed from a brief gamed-based experience includes mental, perceptual, sensory, neuromusculoskeletal, and movement-related functions and participation in sensory, communication, and leisure domains. More studies, including different experiences and a high number of users, should be developed to provide a more comprehensive ICF framework for game-based experiences in geriatric care.

Keywords: board game, aging, framework, experience

Procedia PDF Downloads 116
28408 Efficient Implementation of Finite Volume Multi-Resolution Weno Scheme on Adaptive Cartesian Grids

Authors: Yuchen Yang, Zhenming Wang, Jun Zhu, Ning Zhao

Abstract:

An easy-to-implement and robust finite volume multi-resolution Weighted Essentially Non-Oscillatory (WENO) scheme is proposed on adaptive cartesian grids in this paper. Such a multi-resolution WENO scheme is combined with the ghost cell immersed boundary method (IBM) and wall-function technique to solve Navier-Stokes equations. Unlike the k-exact finite volume WENO schemes which involve large amounts of extra storage, repeatedly solving the matrix generated in a least-square method or the process of calculating optimal linear weights on adaptive cartesian grids, the present methodology only adds very small overhead and can be easily implemented in existing edge-based computational fluid dynamics (CFD) codes with minor modifications. Also, the linear weights of this adaptive finite volume multi-resolution WENO scheme can be any positive numbers on condition that their sum is one. It is a way of bypassing the calculation of the optimal linear weights and such a multi-resolution WENO scheme avoids dealing with the negative linear weights on adaptive cartesian grids. Some benchmark viscous problems are numerical solved to show the efficiency and good performance of this adaptive multi-resolution WENO scheme. Compared with a second-order edge-based method, the presented method can be implemented into an adaptive cartesian grid with slight modification for big Reynolds number problems.

Keywords: adaptive mesh refinement method, finite volume multi-resolution WENO scheme, immersed boundary method, wall-function technique.

Procedia PDF Downloads 137
28407 A New Converter Topology for Wind Energy Conversion System

Authors: Mahmoud Khamaira, Ahmed Abu-Siada, Yasser Alharbi

Abstract:

Doubly Fed Induction Generators (DFIGs) are currently extensively used in variable speed wind power plants due to their superior advantages that include reduced converter rating, low cost, reduced losses, easy implementation of power factor correction schemes, variable speed operation and four quadrants active and reactive power control capabilities. On the other hand, DFIG sensitivity to grid disturbances, especially for voltage sags represents the main disadvantage of the equipment. In this paper, a coil is proposed to be integrated within the DFIG converters to improve the overall performance of a DFIG-based wind energy conversion system (WECS). The charging and discharging of the coil are controlled by controlling the duty cycle of the switches of the dc-dc chopper. Simulation results reveal the effectiveness of the proposed topology in improving the overall performance of the WECS system under study.

Keywords: doubly fed induction generator, coil, wind energy conversion system, converter topology

Procedia PDF Downloads 648
28406 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 70
28405 Transparency of Algorithmic Decision-Making: Limits Posed by Intellectual Property Rights

Authors: Olga Kokoulina

Abstract:

Today, algorithms are assuming a leading role in various areas of decision-making. Prompted by a promise to provide increased economic efficiency and fuel solutions for pressing societal challenges, algorithmic decision-making is often celebrated as an impartial and constructive substitute for human adjudication. But in the face of this implied objectivity and efficiency, the application of algorithms is also marred with mounting concerns about embedded biases, discrimination, and exclusion. In Europe, vigorous debates on risks and adverse implications of algorithmic decision-making largely revolve around the potential of data protection laws to tackle some of the related issues. For example, one of the often-cited venues to mitigate the impact of potentially unfair decision-making practice is a so-called 'right to explanation'. In essence, the overall right is derived from the provisions of the General Data Protection Regulation (‘GDPR’) ensuring the right of data subjects to access and mandating the obligation of data controllers to provide the relevant information about the existence of automated decision-making and meaningful information about the logic involved. Taking corresponding rights and obligations in the context of the specific provision on automated decision-making in the GDPR, the debates mainly focus on efficacy and the exact scope of the 'right to explanation'. In essence, the underlying logic of the argued remedy lies in a transparency imperative. Allowing data subjects to acquire as much knowledge as possible about the decision-making process means empowering individuals to take control of their data and take action. In other words, forewarned is forearmed. The related discussions and debates are ongoing, comprehensive, and, often, heated. However, they are also frequently misguided and isolated: embracing the data protection law as ultimate and sole lenses are often not sufficient. Mandating the disclosure of technical specifications of employed algorithms in the name of transparency for and empowerment of data subjects potentially encroach on the interests and rights of IPR holders, i.e., business entities behind the algorithms. The study aims at pushing the boundaries of the transparency debate beyond the data protection regime. By systematically analysing legal requirements and current judicial practice, it assesses the limits of the transparency requirement and right to access posed by intellectual property law, namely by copyrights and trade secrets. It is asserted that trade secrets, in particular, present an often-insurmountable obstacle for realising the potential of the transparency requirement. In reaching that conclusion, the study explores the limits of protection afforded by the European Trade Secrets Directive and contrasts them with the scope of respective rights and obligations related to data access and portability enshrined in the GDPR. As shown, the far-reaching scope of the protection under trade secrecy is evidenced both through the assessment of its subject matter as well as through the exceptions from such protection. As a way forward, the study scrutinises several possible legislative solutions, such as flexible interpretation of the public interest exception in trade secrets as well as the introduction of the strict liability regime in case of non-transparent decision-making.

Keywords: algorithms, public interest, trade secrets, transparency

Procedia PDF Downloads 115
28404 Optical Flow Technique for Supersonic Jet Measurements

Authors: Haoxiang Desmond Lim, Jie Wu, Tze How Daniel New, Shengxian Shi

Abstract:

This paper outlines the development of a novel experimental technique in quantifying supersonic jet flows, in an attempt to avoid seeding particle problems frequently associated with particle-image velocimetry (PIV) techniques at high Mach numbers. Based on optical flow algorithms, the idea behind the technique involves using high speed cameras to capture Schlieren images of the supersonic jet shear layers, before they are subjected to an adapted optical flow algorithm based on the Horn-Schnuck method to determine the associated flow fields. The proposed method is capable of offering full-field unsteady flow information with potentially higher accuracy and resolution than existing point-measurements or PIV techniques. Preliminary study via numerical simulations of a circular de Laval jet nozzle successfully reveals flow and shock structures typically associated with supersonic jet flows, which serve as useful data for subsequent validation of the optical flow based experimental results. For experimental technique, a Z-type Schlieren setup is proposed with supersonic jet operated in cold mode, stagnation pressure of 8.2 bar and exit velocity of Mach 1.5. High-speed single-frame or double-frame cameras are used to capture successive Schlieren images. As implementation of optical flow technique to supersonic flows remains rare, the current focus revolves around methodology validation through synthetic images. The results of validation test offers valuable insight into how the optical flow algorithm can be further improved to improve robustness and accuracy. Details of the methodology employed and challenges faced will be further elaborated in the final conference paper should the abstract be accepted. Despite these challenges however, this novel supersonic flow measurement technique may potentially offer a simpler way to identify and quantify the fine spatial structures within the shock shear layer.

Keywords: Schlieren, optical flow, supersonic jets, shock shear layer

Procedia PDF Downloads 305
28403 An Exploration of Inclusive Education Settings in the Context of Saudi Arabia: Stakeholder Perspectives

Authors: Nourah Alshalhoub

Abstract:

As Saudi Arabia is one of the countries moving toward more inclusive schools, there are few researchers who have examined the new model of inclusive practice; that is, a model introduced by the Tatweer project. Tatweer is an initiative supported by the Saudi government to develop education with a particular focus on inclusion. This on-going doctoral work aims to find out the nature of inclusive practice that Taweer introduced to create effective practice to include students with different abilities. While stakeholders are important elements to the implementation of inclusive education practice, the study’s goal is to find out and explore their understandings and perspectives. This study considers the perspectives of stakeholders, who are involved and influential on the implementation of the practice, from different dimensions. Tatweer project’s managers, head teachers, teachers and teaching assistants will be interviewed to find out how do they understand inclusive education concept and what perspective do they hold. Reliant on this material, this work seeks to inquire into what meaning inclusion and inclusive practice holds in Tatweer and to what extent this educational models let students with different abilities be more included. Four primary schools in Riyadh were purposively selected and data will be collected through semi-structured interviews. Semi-structured interview was selected as a study tool because it is a relevant and helpful method in understanding the thoughts, views, and beliefs of the stakeholders individually, and investigating issues more thoroughly in the context of Saudi Arabia.

Keywords: inclusive education, perspective, understanding, definition, inclusion

Procedia PDF Downloads 282
28402 Research the Causes of Defects and Injuries of Reinforced Concrete and Stone Construction

Authors: Akaki Qatamidze

Abstract:

Implementation of the project will be a step forward in terms of reliability in Georgia and the improvement of the construction and the development of construction. Completion of the project is expected to result in a complete knowledge, which is expressed in concrete and stone structures of assessing the technical condition of the processing. This method is based on a detailed examination of the structure, in order to establish the injuries and the elimination of the possibility of changing the structural scheme of the new requirements and architectural preservationists. Reinforced concrete and stone structures research project carried out in a systematic analysis of the important approach is to optimize the process of research and development of new knowledge in the neighboring areas. In addition, the problem of physical and mathematical models of rational consent, the main pillar of the physical (in-situ) data and mathematical calculation models and physical experiments are used only for the calculation model specification and verification. Reinforced concrete and stone construction defects and failures the causes of the proposed research to enhance the effectiveness of their maximum automation capabilities and expenditure of resources to reduce the recommended system analysis of the methodological concept-based approach, as modern science and technology major particularity of one, it will allow all family structures to be identified for the same work stages and procedures, which makes it possible to exclude subjectivity and addresses the problem of the optimal direction. It discussed the methodology of the project and to establish a major step forward in the construction trades and practical assistance to engineers, supervisors, and technical experts in the construction of the settlement of the problem.

Keywords: building, reinforced concrete, expertise, stone structures

Procedia PDF Downloads 321
28401 Increasing Adherence to Preventative Care Bundles for Healthcare-Associated Infections: The Impact of Nurse Education

Authors: Lauren G. Coggins

Abstract:

Catheter-associated urinary tract infections (CAUTI) and central line-associated bloodstream infections (CLABSI) are among the most common healthcare-associated infections (HAI), contributing to prolonged lengths of stay, greater costs of patient care, and increased patient mortality. Evidence-based preventative care bundles exist to establish consistent, safe patient-care practices throughout an entire organization, helping to ensure the collective application of care strategies that aim to improve patient outcomes and minimize complications. The cardiac intensive care unit at a nationally ranked teaching and research hospital in the United States exceeded its annual CAUTI and CLABSI targets in the fiscal year 2019, prompting examination into the unit’s infection prevention efforts that included preventative care bundles for both HAIs. Adherence to the CAUTI and CLABSI preventative care bundles was evaluated through frequent audits conducted over three months, using standards and resources from The Joint Commission, a globally recognized leader in quality improvement in healthcare and patient care safety. The bundle elements with the lowest scores were identified as the most commonly missed elements. Three elements from both bundles, six elements in total, served as key content areas for the educational interventions targeted to bedside nurses. The CAUTI elements included appropriate urinary catheter order, appropriate continuation criteria, and urinary catheter care. The CLABSI elements included primary tubing compliance, needleless connector compliance, and dressing change compliance. An integrated, multi-platform education campaign featured content on each CAUTI and CLABSI preventative care bundle in its entirety, with additional reinforcement focused on the lowest scoring elements. One-on-one educational materials included an informational pamphlet, badge buddy, a presentation to reinforce nursing care standards, and real-time application through case studies and electronic health record demonstrations. A digital hub was developed on the hospital’s Intranet for quick access to unit resources, and a bulletin board helped track the number of days since the last CAUTI and CLABSI incident. Audits continued to be conducted throughout the education campaign, and staff were given real-time feedback to address any gaps in adherence. Nearly every nurse in the cardiac intensive care unit received all educational materials, and adherence to all six key bundle elements increased after the implementation of educational interventions. Recommendations from this implementation include providing consistent, comprehensive education across multiple teaching tools and regular audits to track adherence. The multi-platform education campaign brought focus to the evidence-based CAUTI and CLABSI bundles, which in turn will help to reduce CAUTI and CLABSI rates in clinical practice.

Keywords: education, healthcare-associated infections, infection, nursing, prevention

Procedia PDF Downloads 103
28400 Transgressing Boundaries for Encouraging Critical Thinking: Reflections on the Integration of Active Pedagogy and Transnational Exchange into Social Work Education

Authors: Rosemary R. Carlton, Roxane Caron

Abstract:

Almost three decades ago, bell hooks (1994) identified the classroom as “the most radical space of possibility in the academy”. A feminist scholar, educator, and activist, hooks urged educators to transgress the boundaries of what might be customary or considered acceptable in teaching, thus encouraging the pursuit of new ways of knowing and different strategies for sharing knowledge. This paper reflects upon a particular response to hooks’ still relevant call for transgression in teaching. Specifically, this paper reports on the design, implementation, and preliminary analysis of a social work course integrating active pedagogy and transnational exchange to encourage students’ critical thinking and autonomous learning in their development as social workers in a global context. The bachelor’s level course, Pratiques spécifiques: Projet international, was developed collaboratively across three francophone institutions of higher learning in Belgium, Canada, and France: the Haute École de Namur-Liège-Luxembourg (Hénallux); the Université de Montréal; and, the Institut d’enseignement supérieur et professionnel, l’IRTS Paris Île-de-France. The driving aims of the course are to promote autonomous learning and critical thinking through a lens of transnational understandings of social problems -competencies indispensable to students’ development as social workers. The course is offered to two paired cohorts, one addressing the subject of “migrations” (Canada/France) and the other the subject of “sexual exploitation” (Canada/Belgium). Through the adaptation of a critical pedagogy of problem-based learning, students are called upon to actively engage in acquiring and applying knowledge to respond to “real life” social issues relating to migration or sexual exploitation. At the conclusion of the course, each cohort of students is brought together for a week-long intensive period of transnational exchange either at the Université de Montréal in Canada or at Hénallux in Belgium. Extending the bounds of the classroom across international borders allows students novel opportunities to deepen and expand their understandings of issues relating to predefined social issues and to critically examine associated social work practices. The paper opens with a presentation of the social work course. Specifically, the authors will outline their adaptation of a pedagogy of problem-based learning integrating transnational exchange in the design and implementation of the course. Returning to hooks’ notion of transgression in teaching, the paper offers a preliminary analysis of how and with what effect the course provides opportunities to transgress hierarchical student-teacher relationships; transgress conventional modes of learning to explore diverse sources of knowledge and transgress the walls of the university to engage with and learn from local and global partners. The paper concludes with a consideration of the potential influence of such transgressions in teaching for students’ development of critical thinking in their practice of social work in global context.

Keywords: active learning, critical pedagogy, social work intervention, transnational learning

Procedia PDF Downloads 152
28399 The Role of Vocabulary in Task-based Language Teaching in International and Iranian Contexts

Authors: Parima Fasih

Abstract:

The present review of literature explored the role of vocabulary in task-based language teaching (TBLT). The first focus of the present paper is to explain different aspects of vocabulary knowledge, and it continues with an introduction to TBLT. Second, the role of vocabulary and vocabulary tasks in TBLT is explained. Next, an overview of the recent empirical studies about task-based vocabulary teaching in international and Iranian contexts context is presented to address the research question concerning the effect of task-based vocabulary teaching on EFL learners' vocabulary learning. Based on the conclusions that are drawn from the previous studies, the implications reveal how the findings influence students' vocabulary learning and teachers' vocabulary teaching methods.

Keywords: vocabulary, task, task-based, task-based language teaching, vocabulary learning, vocabulary teaching

Procedia PDF Downloads 106
28398 Use of Fine Marble in Concrete Based On Sand Dune

Authors: M. Belachia, R. Djebien

Abstract:

In the development that our country has in all areas and especially in the field of Building and Construction, the development of new building materials is a current problem where researchers are trying to find the right materials for each region and returning cheapest countries. Enhancement of crushed sand and sand dunes and reuse of waste as additions in concrete can help to overcome the deficit in aggregates. This work focuses on the development of concrete made from sand, knowing that our country has huge potential in sand dune. This study is complemented by a review of the possibility of using certain recycled wastes in concrete sand, including the effect of fines (marble powders) on the rheological and mechanical properties of concrete and sand to the outcome optimal formulation. After the characterization phase of basic materials, we proceeded to carry out the experimental program was to search the optimum characteristics by adding different percentages of fines. The aim is to show that the possibility of using local materials (sand dune) for the manufacture of concrete and reuse of waste (marble powders) in the implementation of concrete.

Keywords: sand dune, mechanical properties, rheological properties, fine marble

Procedia PDF Downloads 452
28397 Finding Elves in Play Based Learning

Authors: Chloe L. Southern

Abstract:

If play is deemed to fulfill children’s social, emotional, and physical domains, as well as satisfy their natural curiosity and promote self-reflexivity, it is difficult to understand why play is not prioritized to the same extent for older children. This paper explores and discusses the importance of play-based learning as well as the preliminary implications beyond the realm of kindergarten. To further extend the inquiry, discussions pertaining to play-based learning are looked at through the lens of relevant methodologies and theories. Different education systems are looked at in certain areas of the world that lead to curiosities not only towards their play-based practices and curriculum but what ideologies they have that set them apart.

Keywords: 21ˢᵗ century learning, play-based learning, student-centered learning, transformative learning

Procedia PDF Downloads 64
28396 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 155
28395 The Nigeria Police Force: Human Resources Management Issues and the Community Policing Policy Transfer

Authors: Aminu Musa Audu

Abstract:

This paper examines the human resources management issues of the Nigeria Police and how it is impacting the community policing policy transfer. Nigeria Police Force is the organisation in the country with the constitutional responsibility of maintaining law and order. The high level of crime and other forms of insecurity called for the introduction of ‘police-community partnership’ strategy in 2003. The trend of events has suggested that the effort is not yielding result, partly because the police in Nigeria are facing human resources management challenges. For instance, the prospective candidates for the police jobs are usually not vetted a situation which provides the possibility of recruiting persons of low academic background and questionable character, or even criminal records. Moreover, the existing training, development infrastructure and other logistics for the job of policing are not in good condition. Consequently, the implementation of the ‘community policing’ policy for crime prevention and control in Nigeria stands to suffer setbacks. Adopting qualitative methods and with focus groups discussions and individual in-depth interviews for data collections, the findings from the views and perspectives of the participants were suggestive of poor handlings of human resources management of the Nigeria police organisation and with negative effect on the implementation of community policing policy. The paper therefore recommends that a total overhaul of the human resources component of the police organisation is necessary in the community policing policy transfer process for crime prevention and control in Nigeria.

Keywords: Nigeria Police Force, community policing policy transfer, human resources management, police-community partnership

Procedia PDF Downloads 495
28394 Stability Assessment of Underground Power House Encountering Shear Zone: Sunni Dam Hydroelectric Project (382 MW), India

Authors: Sanjeev Gupta, Ankit Prabhakar, K. Rajkumar Singh

Abstract:

Sunni Dam Hydroelectric Project (382 MW) is a run of river type development with an underground powerhouse, proposed to harness the hydel potential of river Satluj in Himachal Pradesh, India. The project is located in the inner lesser Himalaya between Dhauladhar Range in the south and the higher Himalaya in the north. The project comprises two large underground caverns, a Powerhouse cavern (171m long, 22.5m wide and 51.2m high) and another transformer hall cavern (175m long, 18.7m wide and 27m high) and the rock pillar between the two caverns is 50m. The highly jointed, fractured, anisotropic rock mass is a key challenge in Himalayan geology for an underground structure. The concern for the stability of rock mass increases when weak/shear zones are encountered in the underground structure. In the Sunni Dam project, 1.7m to 2m thick weak/shear zone comprising of deformed, weak material with gauge has been encountered in powerhouse cavern at 70m having dip direction 325 degree and dip amount 38 degree which also intersects transformer hall at initial reach. The rock encountered in the powerhouse area is moderate to highly jointed, pink quartz arenite belonging to the Khaira Formation, a transition zone comprising of alternate grey, pink & white quartz arenite and shale sequence and dolomite at higher reaches. The rock mass is intersected by mainly 3 joint sets excluding bedding joints and a few random joints. The rock class in powerhouse mainly varies from poor class (class IV) to lower order fair class (class III) and in some reaches, very poor rock mass has also been encountered. To study the stability of the underground structure in weak/shear rock mass, a 3D numerical model analysis has been carried out using RS3 software. Field studies have been interpreted and analysed to derive Bieniawski’s RMR, Barton’s “Q” class and Geological Strength Index (GSI). The various material parameters, in-situ characteristics have been determined based on tests conducted by Central Soil and Materials Research Station, New Delhi. The behaviour of the cavern has been studied by assessing the displacement contours, major and minor principal stresses and plastic zones for different stage excavation sequences. For optimisation of the support system, the stability of the powerhouse cavern with different powerhouse orientations has also been studied. The numerical modeling results indicate that cavern will not likely face stress governed by structural instability with the support system to be applied to the crown and side walls.

Keywords: 3D analysis, Himalayan geology, shear zone, underground power house

Procedia PDF Downloads 74
28393 Discussing Concept Gratitude of Muslim Consumers Based on Islamic Law: A Confirmation on the Theory of Consumer Satisfaction through Imam Al-Ghazali's Thought

Authors: Suprihatin Soewarto

Abstract:

The background of writing this paper is to assess the truth of rejection of some Muslim scholars who develop Islamic economics on the concept of consumer satisfaction and replace it with the concept of maslahah. In the perspective of Islamic law, this rejection attitude needs to be verified in order to know the accuracy of the replacement of this concept of satisfaction with maslahah as part of consumer behavior. This is done so that replacement of rejection of the term satisfaction with maslahah is objective. This objective replacement of the term will surely be more enlightening and more just than the subjective substitution. Therefore the writing of this paper aims to get an answer whether the concept of satisfaction needs to be replaced? is it possible for Islamic law to confirm the theory of consumer satisfaction? The method of writing this paper using the method of literature with a critical analysis approach. The results of this study is an explanation of the similarities and differences of consumer satisfaction theory and consumer theory maslahah according to Islamic law. disclosure of the concept of consumer gratitude according to Islamic law and its implementation in Muslim consumer demand theory.

Keywords: consumer's gratitude, islamic law, confirmation, satisfaction consumer's

Procedia PDF Downloads 187
28392 Development of an Optimised, Automated Multidimensional Model for Supply Chains

Authors: Safaa H. Sindi, Michael Roe

Abstract:

This project divides supply chain (SC) models into seven Eras, according to the evolution of the market’s needs throughout time. The five earliest Eras describe the emergence of supply chains, while the last two Eras are to be created. Research objectives: The aim is to generate the two latest Eras with their respective models that focus on the consumable goods. Era Six contains the Optimal Multidimensional Matrix (OMM) that incorporates most characteristics of the SC and allocates them into four quarters (Agile, Lean, Leagile, and Basic SC). This will help companies, especially (SMEs) plan their optimal SC route. Era Seven creates an Automated Multidimensional Model (AMM) which upgrades the matrix of Era six, as it accounts for all the supply chain factors (i.e. Offshoring, sourcing, risk) into an interactive system with Heuristic Learning that helps larger companies and industries to select the best SC model for their market. Methodologies: The data collection is based on a Fuzzy-Delphi study that analyses statements using Fuzzy Logic. The first round of Delphi study will contain statements (fuzzy rules) about the matrix of Era six. The second round of Delphi contains the feedback given from the first round and so on. Preliminary findings: both models are applicable, Matrix of Era six reduces the complexity of choosing the best SC model for SMEs by helping them identify the best strategy of Basic SC, Lean, Agile and Leagile SC; that’s tailored to their needs. The interactive heuristic learning in the AMM of Era seven will help mitigate error and aid large companies to identify and re-strategize the best SC model and distribution system for their market and commodity, hence increasing efficiency. Potential contributions to the literature: The problematic issue facing many companies is to decide which SC model or strategy to incorporate, due to the many models and definitions developed over the years. This research simplifies this by putting most definition in a template and most models in the Matrix of era six. This research is original as the division of SC into Eras, the Matrix of Era six (OMM) with Fuzzy-Delphi and Heuristic Learning in the AMM of Era seven provides a synergy of tools that were not combined before in the area of SC. Additionally the OMM of Era six is unique as it combines most characteristics of the SC, which is an original concept in itself.

Keywords: Leagile, automation, heuristic learning, supply chain models

Procedia PDF Downloads 380
28391 Artificial Intelligence in Bioscience: The Next Frontier

Authors: Parthiban Srinivasan

Abstract:

With recent advances in computational power and access to enough data in biosciences, artificial intelligence methods are increasingly being used in drug discovery research. These methods are essentially a series of advanced statistics based exercises that review the past to indicate the likely future. Our goal is to develop a model that accurately predicts biological activity and toxicity parameters for novel compounds. We have compiled a robust library of over 150,000 chemical compounds with different pharmacological properties from literature and public domain databases. The compounds are stored in simplified molecular-input line-entry system (SMILES), a commonly used text encoding for organic molecules. We utilize an automated process to generate an array of numerical descriptors (features) for each molecule. Redundant and irrelevant descriptors are eliminated iteratively. Our prediction engine is based on a portfolio of machine learning algorithms. We found Random Forest algorithm to be a better choice for this analysis. We captured non-linear relationship in the data and formed a prediction model with reasonable accuracy by averaging across a large number of randomized decision trees. Our next step is to apply deep neural network (DNN) algorithm to predict the biological activity and toxicity properties. We expect the DNN algorithm to give better results and improve the accuracy of the prediction. This presentation will review all these prominent machine learning and deep learning methods, our implementation protocols and discuss these techniques for their usefulness in biomedical and health informatics.

Keywords: deep learning, drug discovery, health informatics, machine learning, toxicity prediction

Procedia PDF Downloads 346
28390 Analyze of Nanoscale Materials and Devices for Future Communication and Telecom Networks in the Gas Refinery

Authors: Mohamad Bagher Heidari, Hefzollah Mohammadian

Abstract:

New discoveries in materials on the nanometer-length scale are expected to play an important role in addressing ongoing and future challenges in the field of communication. Devices and systems for ultra-high speed short and long range communication links, portable and power efficient computing devices, high-density memory and logics, ultra-fast interconnects, and autonomous and robust energy scavenging devices for accessing ambient intelligence and needed information will critically depend on the success of next-generation emerging nonmaterials and devices. This article presents some exciting recent developments in nonmaterials that have the potential to play a critical role in the development and transformation of future intelligent communication and telecom networks in the gas refinery. The industry is benefiting from nanotechnology advances with numerous applications including those in smarter sensors, logic elements, computer chips, memory storage devices, optoelectronics.

Keywords: nonmaterial, intelligent communication, nanoscale, nanophotonic, telecom

Procedia PDF Downloads 319
28389 A Wireless Feedback Control System as a Base of Bio-Inspired Structure System to Mitigate Vibration in Structures

Authors: Gwanghee Heo, Geonhyeok Bang, Chunggil Kim, Chinok Lee

Abstract:

This paper attempts to develop a wireless feedback control system as a primary step eventually toward a bio-inspired structure system where inanimate structure behaves like a life form autonomously. It is a standalone wireless control system which is supposed to measure externally caused structural responses, analyze structural state from acquired data, and take its own action on the basis of the analysis with an embedded logic. For an experimental examination of its effectiveness, we applied it on a model of two-span bridge and performed a wireless control test. Experimental tests have been conducted for comparison on both the wireless and the wired system under the conditions of Un-control, Passive-off, Passive-on, and Lyapunov control algorithm. By proving the congruence of the test result of the wireless feedback control system with the wired control system, its control performance was proven to be effective. Besides, it was found to be economical in energy consumption and also autonomous by means of a command algorithm embedded into it, which proves its basic capacity as a bio-inspired system.

Keywords: structural vibration control, wireless system, MR damper, feedback control, embedded system

Procedia PDF Downloads 201
28388 Developing a Model of Teaching Writing Based On Reading Approach through Reflection Strategy for EFL Students of STKIP YPUP

Authors: Eny Syatriana, Ardiansyah

Abstract:

The purpose of recent study was to develop a learning model on writing, based on the reading texts which will be read by the students using reflection strategy. The strategy would allow the students to read the text and then they would write back the main idea and to develop the text by using their own sentences. So, the writing practice was begun by reading an interesting text, then the students would develop the text which has been read into their writing. The problem questions are (1) what kind of learning model that can develop the students writing ability? (2) what is the achievement of the students of STKIP YPUP through reflection strategy? (3) is the using of the strategy effective to develop students competence In writing? (4) in what level are the students interest toward the using of a strategy In writing subject? This development research consisted of some steps, they are (1) need analysis (2) model design (3) implementation (4) model evaluation. The need analysis was applied through discussion among the writing lecturers to create a learning model for writing subject. To see the effectiveness of the model, an experiment would be delivered for one class. The instrument and learning material would be validated by the experts. In every steps of material development, there was a learning process, where would be validated by an expert. The research used development design. These Principles and procedures or research design and development .This study, researcher would do need analysis, creating prototype, content validation, and limited empiric experiment to the sample. In each steps, there should be an assessment and revision to the drafts before continue to the next steps. The second year, the prototype would be tested empirically to four classes in STKIP YPUP for English department. Implementing the test greatly was done through the action research and followed by evaluation and validation from the experts.

Keywords: learning model, reflection, strategy, reading, writing, development

Procedia PDF Downloads 352
28387 Single Event Transient Tolerance Analysis in 8051 Microprocessor Using Scan Chain

Authors: Jun Sung Go, Jong Kang Park, Jong Tae Kim

Abstract:

As semi-conductor manufacturing technology evolves; the single event transient problem becomes more significant issue. Single event transient has a critical impact on both combinational and sequential logic circuits, so it is important to evaluate the soft error tolerance of the circuits at the design stage. In this paper, we present a soft error detecting simulation using scan chain. The simulation model generates a single event transient randomly in the circuit, and detects the soft error during the execution of the test patterns. We verified this model by inserting a scan chain in an 8051 microprocessor using 65 nm CMOS technology. While the test patterns generated by ATPG program are passing through the scan chain, we insert a single event transient and detect the number of soft errors per sub-module. The experiments show that the soft error rates per cell area of the SFR module is 277% larger than other modules.

Keywords: scan chain, single event transient, soft error, 8051 processor

Procedia PDF Downloads 330
28386 Designing an MTB-MLE for Linguistically Heterogenous Contexts: A Practitioner’s Perspective

Authors: Ajay Pinjani, Minha Khan, Ayesha Mehkeri, Anum Iftikhar

Abstract:

There is much research available on the benefits of adopting mother tongue-based multilingual education (MTB MLE) in primary school classrooms, but there is limited guidance available on how to design such programs for low-resource and linguistically diverse contexts. This paper is an effort to bridge the gap between theory and practice by offering a practitioner’s perspective on designing an MTB MLE program for linguistically heterogeneous contexts. The research compounds findings from current academic literature on MTB MLE, the study of global MTB MLE programs, interviews with practitioners, policy-makers, and academics worldwide, and a socio-linguistic survey carried out in parts of Tharparkar, Pakistan, the area selected for envisioned pilot implementation. These findings enabled the creation of ‘guiding principles’ which provide structure for the development of a contextualized and holistic MTB-MLE program. The guiding principles direct the creation of teaching and learning materials, creating effective teaching and learning environment, community engagement, and program evaluation. Additionally, the paper demonstrates the development of a context-specific language ladder framework which outlines the language journey of a child’s education, beginning with the mother tongue/ most familiar language in the early years and then gradually transitioning into other languages. Both the guiding principles and language ladder can be adapted to any multilingual context. Thus, this research provides MTB MLE practitioners with assistance in developing an MTB MLE model, which is best suited for their context.

Keywords: mother tongue based multilingual education, education design, language ladder, language issues, heterogeneous contexts

Procedia PDF Downloads 103
28385 Teaching Computer Programming to Diverse Students: A Comparative, Mixed-Methods, Classroom Research Study

Authors: Almudena Konrad, Tomás Galguera

Abstract:

Lack of motivation and interest is a serious obstacle to students’ learning computing skills. A need exists for a knowledge base on effective pedagogy and curricula to teach computer programming. This paper presents results from research evaluating a six-year project designed to teach complex concepts in computer programming collaboratively, while supporting students to continue developing their computer thinking and related coding skills individually. Utilizing a quasi-experimental, mixed methods design, the pedagogical approaches and methods were assessed in two contrasting groups of students with different socioeconomic status, gender, and age composition. Analyses of quantitative data from Likert-scale surveys and an evaluation rubric, combined with qualitative data from reflective writing exercises and semi-structured interviews yielded convincing evidence of the project’s success at both teaching and inspiring students.

Keywords: computational thinking, computing education, computer programming curriculum, logic, teaching methods

Procedia PDF Downloads 302
28384 Sources and Content of Sexual Information among School Going Adolescents in Uganda

Authors: Jonathan Magala

Abstract:

Context: Adolescents in Uganda face significant challenges related to sexual health due to inadequate sexual information. This lack of information puts young people at risk of early pregnancies, sexually transmitted infections, and poverty. Therefore, it is essential to understand the sources, content, and challenges of acquiring sexual information among secondary school-going adolescents in Uganda. Research Aim: The aim of this study was to establish the sources, content, and challenges of acquiring sexual information among secondary school-going adolescents in Luwero Town Council, Uganda. Methodology: This study used a cross-sectional approach with both qualitative and quantitative methods. Questionnaires and in-depth interviews were conducted with 384 school-going adolescents aged between 13-19 years in Luwero Town Council, Uganda. Findings: The results of the study revealed that adolescents receive sexual information from various sources, with schools being the most common source, followed by parents and religious institutions being the least utilized. Adolescents received information on various topics related to sexuality, including puberty and sexual changes, pregnancy and reproduction, STD information, abstinence, and family planning. However, the content of sexual information was inadequate in addressing the challenges facing adolescents, and there were generation gaps, lack of role models, peer influence, and government policies. The male character from all the sources was the least in offering sexual information to adolescents. Theoretical Importance: The study's findings highlight the need for policy implementation to strengthen sexual education in school curriculum, as the sources of sexual information and the content are inadequate. The various topics should be addressed in schools to provide comprehensive education on sexual health for adolescents. Data Collection and Analysis Procedures: Data collection involved questionnaires and in-depth interviews with school-going adolescents. The data gathered were analyzed using descriptive statistics and thematic analysis. Questions Addressed: The study aimed to answer questions about the sources of sexual information among school-going adolescents, the content of sexual information provided, the challenges faced in accessing the information, and the importance of sex education policy implementation. Conclusion: The study concludes that schools are a popular source of sexual information among school-going adolescents in Uganda. However, the content of the information provided is inadequate in addressing the challenges that adolescents face regarding their sexual health. Therefore, policy implementation is essential in strengthening sexual education in the school curriculum and addressing various topics related to sexual health.

Keywords: adolescents, sexual information, schools, reproductive health

Procedia PDF Downloads 63
28383 Effect of Carbon Nanotube Reinforcement in Polymer Composite Plates under Static Loading

Authors: S. Madhu, V. V. Subba Rao

Abstract:

In the implementation of carbon nanotube reinforced polymer matrix composites in structural applications, deflection and stress analysis are important considerations. In the present study, a multi scale analysis of deflection and stress analysis of carbon nanotube (CNT) reinforced polymer composite plates is presented. A micromechanics model based on the Mori-Tanaka method is developed by introducing straight CNTs aligned in one direction. The effect of volume fraction and diameter of CNTs on plate deflection and the stresses are investigated using Classical Laminate Plate Theory (CLPT). The study is primarily conducted with the intention of observing the suitability of CNT reinforced polymer composite plates under static loading for structural applications.

Keywords: carbon nanotube, micromechanics, composite plate, multi-scale analysis, classical laminate plate theory

Procedia PDF Downloads 360