Search results for: strong password generation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6424

Search results for: strong password generation

6184 The Use of Nuclear Generation to Provide Power System Stability

Authors: Heather Wyman-Pain, Yuankai Bian, Furong Li

Abstract:

The decreasing use of fossil fuel power stations has a negative effect on the stability of the electricity systems in many countries. Nuclear power stations have traditionally provided minimal ancillary services to support the system but this must change in the future as they replace fossil fuel generators. This paper explains the development of the four most popular reactor types still in regular operation across the world which have formed the basis for most reactor development since their commercialisation in the 1950s. The use of nuclear power in four countries with varying levels of capacity provided by nuclear generators is investigated, using the primary frequency response provided by generators as a measure for the electricity networks stability, to assess the need for nuclear generators to provide additional support as their share of the generation capacity increases.

Keywords: frequency control, nuclear power generation, power system stability, system inertia

Procedia PDF Downloads 410
6183 Green Synthesis of Spinach Derived Carbon Dots for Photocatalytic Generation of Hydrogen from Sulfide Wastewater

Authors: Priya Ruban, Thirunavoukkarasu Manikkannan, Sakthivel Ramasamy

Abstract:

Sulfide is one of the major pollutants of tannery effluent which is mainly generated during the process of unhairing. Recovery of Hydrogen green fuel from sulfide wastewater using photocatalysis is a ‘Cleaner Production Method’, since renewable solar energy is utilized. It has triple advantages of the generation of H2, waste minimization and odor or pollution control. Designing of safe and green photocatalysts and developing suitable solar photoreactor is important for promoting this technology to large-scale application. In this study, green photocatalyst i.e., spinach derived carbon dots (SCDs 5 wt % and 10 wt %)/TiO2 nanocomposite was synthesized for generation of H2 from sulfide wastewater using lab-scale solar photocatalytic reactor. The physical characterization of the synthesized solar light responsive nanocomposites were studied by using DRS UV-Vis, XRD, FTIR and FESEM analysis. The absorption edge of TiO2 nanoparticles is extended to visible region by the incorporation of SCDs, which was used for converting noxious pollutant sulfide into eco-friendly solar fuel H2. The SCDs (10 wt%)-TiO2 nanocomposite exhibits enhanced photocatalytic hydrogen production i.e. ~27 mL of H2 (180 min) from simulated sulfide wastewater under LED visible light irradiation which is higher as compared to SCDs. The enhancement in the photocatalytic generation of H2 is attributed to combining of SCDs which increased the charge mobility. This work may provide new insights to usage of naturally available and cheap materials to design novel nanocomposite as a visible light active photocatalyst for the generation of H2 from sulfide containing wastewater.

Keywords: carbon dots, hydrogen fuel, hydrogen sulfide, photocatalysis, sulfide wastewater

Procedia PDF Downloads 361
6182 The Impact of Judeo-Christian Myth and Celtic Myth in Selected Plays of William Shakespeare

Authors: Smriti Mary Gupta

Abstract:

This article intends to show strong facts of ‘Judeo-Christian myth’ and ‘Celtic myth’ in selected plays of William Shakespeare. Giving the vast proliferation of Shakespeare studies we examine the strong impact of Bible in his plays. Inevitably, for instance, the study of Shakespeare and the Bible overlaps the study of Shakespeare and religion, which justify the use of Judeo-Christian myth in his works. There is some evidence that Shakespeare had read and used the ‘Geneva Bible’ in his works. The glimpse of parables and references of Biblical myth can be seen very clearly in Macbeth, King Lear and Measure for Measure. Defining a religion based on myths is difficult because it is built upon a belief of large number of people in the society. The Judeo-Christian myth which is based on the Bible, Celtic religious myth will also be discussed in this paper which had a strong impact on the audience of sixteenth century and it is still continuing at the present time.

Keywords: Celtic myth, Geneva Bible, Judeo-Christian myth, Shakespearean plays

Procedia PDF Downloads 411
6181 Optimal Tracking Control of a Hydroelectric Power Plant Incorporating Neural Forecasting for Uncertain Input Disturbances

Authors: Marlene Perez Villalpando, Kelly Joel Gurubel Tun

Abstract:

In this paper, we propose an optimal control strategy for a hydroelectric power plant subject to input disturbances like meteorological phenomena. The engineering characteristics of the system are described by a nonlinear model. The random availability of renewable sources is predicted by a high-order neural network trained with an extended Kalman filter, whereas the power generation is regulated by the optimal control law. The main advantage of the system is the stabilization of the amount of power generated in the plant. A control supervisor maintains stability and availability in hydropower reservoirs water levels for power generation. The proposed approach demonstrated a good performance to stabilize the reservoir level and the power generation along their desired trajectories in the presence of disturbances.

Keywords: hydropower, high order neural network, Kalman filter, optimal control

Procedia PDF Downloads 272
6180 Evolution of Floating Photovoltaic System Technology and Future Prospect

Authors: Young-Kwan Choi, Han-Sang Jeong

Abstract:

Floating photovoltaic system is a technology that combines photovoltaic power generation with floating structure. However, since floating technology has not been utilized in photovoltaic generation, there are no standardized criteria. It is separately developed and used by different installation bodies. This paper aims to discuss the change of floating photovoltaic system technology based on examples of floating photovoltaic systems installed in Korea.

Keywords: floating photovoltaic system, floating PV installation, ocean floating photovoltaic system, tracking type floating photovoltaic system

Procedia PDF Downloads 537
6179 Performance Analysis in 5th Generation Massive Multiple-Input-Multiple-Output Systems

Authors: Jihad S. Daba, Jean-Pierre Dubois, Georges El Soury

Abstract:

Fifth generation wireless networks guarantee significant capacity enhancement to suit more clients and services at higher information rates with better reliability while consuming less power. The deployment of massive multiple-input-multiple-output technology guarantees broadband wireless networks with the use of base station antenna arrays to serve a large number of users on the same frequency and time-slot channels. In this work, we evaluate the performance of massive multiple-input-multiple-output systems (MIMO) systems in 5th generation cellular networks in terms of capacity and bit error rate. Several cases were considered and analyzed to compare the performance of massive MIMO systems while varying the number of antennas at both transmitting and receiving ends. We found that, unlike classical MIMO systems, reducing the number of transmit antennas while increasing the number of antennas at the receiver end provides a better solution to performance enhancement. In addition, enhanced orthogonal frequency division multiplexing and beam division multiple access schemes further improve the performance of massive MIMO systems and make them more reliable.

Keywords: beam division multiple access, D2D communication, enhanced OFDM, fifth generation broadband, massive MIMO

Procedia PDF Downloads 236
6178 Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success

Authors: Haydar Teymourlouei

Abstract:

Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system.

Keywords: awareness, competition, cybersecurity, laboratories, workforce

Procedia PDF Downloads 309
6177 Variants of Mathematical Induction as Strong Proof Techniques in Theory of Computing

Authors: Ahmed Tarek, Ahmed Alveed

Abstract:

In the theory of computing, there are a wide variety of direct and indirect proof techniques. However, mathematical induction (MI) stands out to be one of the most powerful proof techniques for proving hypotheses, theorems, and new results. There are variations of mathematical induction-based proof techniques, which are broadly classified into three categories, such as structural induction (SI), weak induction (WI), and strong induction (SI). In this expository paper, several different variants of the mathematical induction techniques are explored, and the specific scenarios are discussed where a specific induction technique stands out to be more advantageous as compared to other induction strategies. Also, the essential difference among the variants of mathematical induction are explored. The points of separation among mathematical induction, recursion, and logical deduction are precisely analyzed, and the relationship among variations of recurrence relations, and mathematical induction are being explored. In this context, the application of recurrence relations, and mathematical inductions are considered together in a single framework for codewords over a given alphabet.

Keywords: alphabet, codeword, deduction, mathematical, induction, recurrence relation, strong induction, structural induction, weak induction

Procedia PDF Downloads 142
6176 Modeling of Virtual Power Plant

Authors: Muhammad Fanseem E. M., Rama Satya Satish Kumar, Indrajeet Bhausaheb Bhavar, Deepak M.

Abstract:

Keeping the right balance of electricity between the supply and demand sides of the grid is one of the most important objectives of electrical grid operation. Power generation and demand forecasting are the core of power management and generation scheduling. Large, centralized producing units were used in the construction of conventional power systems in the past. A certain level of balance was possible since the generation kept up with the power demand. However, integrating renewable energy sources into power networks has proven to be a difficult challenge due to its intermittent nature. The power imbalance caused by rising demands and peak loads is negatively affecting power quality and dependability. Demand side management and demand response were one of the solutions, keeping generation the same but altering or rescheduling or shedding completely the load or demand. However, shedding the load or rescheduling is not an efficient way. There comes the significance of virtual power plants. The virtual power plant integrates distributed generation, dispatchable load, and distributed energy storage organically by using complementing control approaches and communication technologies. This would eventually increase the utilization rate and financial advantages of distributed energy resources. Most of the writing on virtual power plant models ignored technical limitations, and modeling was done in favor of a financial or commercial viewpoint. Therefore, this paper aims to address the modeling intricacies of VPPs and their technical limitations, shedding light on a holistic understanding of this innovative power management approach.

Keywords: cost optimization, distributed energy resources, dynamic modeling, model quality tests, power system modeling

Procedia PDF Downloads 32
6175 Energy System Analysis Using Data-Driven Modelling and Bayesian Methods

Authors: Paul Rowley, Adam Thirkill, Nick Doylend, Philip Leicester, Becky Gough

Abstract:

The dynamic performance of all energy generation technologies is impacted to varying degrees by the stochastic properties of the wider system within which the generation technology is located. This stochasticity can include the varying nature of ambient renewable energy resources such as wind or solar radiation, or unpredicted changes in energy demand which impact upon the operational behaviour of thermal generation technologies. An understanding of these stochastic impacts are especially important in contexts such as highly distributed (or embedded) generation, where an understanding of issues affecting the individual or aggregated performance of high numbers of relatively small generators is especially important, such as in ESCO projects. Probabilistic evaluation of monitored or simulated performance data is one technique which can provide an insight into the dynamic performance characteristics of generating systems, both in a prognostic sense (such as the prediction of future performance at the project’s design stage) as well as in a diagnostic sense (such as in the real-time analysis of underperforming systems). In this work, we describe the development, application and outcomes of a new approach to the acquisition of datasets suitable for use in the subsequent performance and impact analysis (including the use of Bayesian approaches) for a number of distributed generation technologies. The application of the approach is illustrated using a number of case studies involving domestic and small commercial scale photovoltaic, solar thermal and natural gas boiler installations, and the results as presented show that the methodology offers significant advantages in terms of plant efficiency prediction or diagnosis, along with allied environmental and social impacts such as greenhouse gas emission reduction or fuel affordability.

Keywords: renewable energy, dynamic performance simulation, Bayesian analysis, distributed generation

Procedia PDF Downloads 471
6174 The Physics of Turbulence Generation in a Fluid: Numerical Investigation Using a 1D Damped-MNLS Equation

Authors: Praveen Kumar, R. Uma, R. P. Sharma

Abstract:

This study investigates the generation of turbulence in a deep-fluid environment using a damped 1D-modified nonlinear Schrödinger equation model. The well-known damped modified nonlinear Schrödinger equation (d-MNLS) is solved using numerical methods. Artificial damping is added to the MNLS equation, and turbulence generation is investigated through a numerical simulation. The numerical simulation employs a finite difference method for temporal evolution and a pseudo-spectral approach to characterize spatial patterns. The results reveal a recurring periodic pattern in both space and time when the nonlinear Schrödinger equation is considered. Additionally, the study shows that the modified nonlinear Schrödinger equation disrupts the localization of structure and the recurrence of the Fermi-Pasta-Ulam (FPU) phenomenon. The energy spectrum exhibits a power-law behavior, closely following Kolmogorov's spectra steeper than k⁻⁵/³ in the inertial sub-range.

Keywords: water waves, modulation instability, hydrodynamics, nonlinear Schrödinger's equation

Procedia PDF Downloads 39
6173 Current Status and a Forecasting Model of Community Household Waste Generation: A Case Study on Ward 24 (Nirala), Khulna, Bangladesh

Authors: Md. Nazmul Haque, Mahinur Rahman

Abstract:

The objective of the research is to determine the quantity of household waste generated and forecast the future condition of Ward No 24 (Nirala). For performing that, three core issues are focused: (i) the capacity and service area of the dumping stations; (ii) the present waste generation amount per capita per day; (iii) the responsibility of the local authority in the household waste collection. This research relied on field survey-based data collection from all stakeholders and GIS-based secondary analysis of waste collection points and their coverage. However, these studies are mostly based on the inherent forecasting approaches, cannot predict the amount of waste correctly. The findings of this study suggest that Nirala is a formal residential area introducing a better approach to the waste collection - self-controlled and collection system. Here, a forecasting model proposed for waste generation as Y = -2250387 + 1146.1 * X, where X = year.

Keywords: eco-friendly environment, household waste, linear regression, waste management

Procedia PDF Downloads 265
6172 Status of Hazardous Waste Generation and Its Impacts on Environment and Human Health: A Study in West Bengal

Authors: Sk Ajim Ali

Abstract:

The present study is an attempt to overview on the major environmental and health impacts due to hazardous waste generation and poor management. In present scenario, not only hazardous waste, but as a common term ‘Waste’ is one of the acceptable and thinkable environmental issues. With excessive increasing population, industrialization and standardization of human’s life style heap in extra waste generation which is directly or indirectly related with hazardous waste generation. Urbanization and population growth are solely responsible for establishing industrial sector and generating various Hazardous Waste (HW) and concomitantly poor management practice arising adverse effect on environment and human health. As compare to other Indian state, West Bengal is not too much former in HW generation. West Bengal makes a rank of 7th in HW generation followed by Maharashtra, Gujarat, Tamil Nadu, U.P, Punjab and Andhra Pradesh. During the last 30 years, the industrial sectors in W.B have quadrupled in size, during 1995 there were only 440 HW generating Units in West Bengal which produced 129826 MTA hazardous waste but in 2011, it rose up into 609 units and it produced about 259777 MTA hazardous waste. So, the notable thing is that during a 15 year interval there increased 169 waste generating units but it produced about 129951 MTA of hazardous waste. Major chemical industries are the main sources of HW and causes of adverse effect on the environment and human health. HW from industrial sectors contains heavy metals, cyanides, pesticides, complex aromatic compounds (i.e. PCB) and other chemical which are toxic, flammable, reactive, and corrosive and have explosive properties which highly affect the surrounding environment and human health in and around he disposal sites. The main objective of present study is to highlight on the sources and components of hazardous waste in West Bengal and impacts of improper HW management on health and environment. This study is carried out based on a secondary source of data and qualitative method of research. The secondary data has been collected annual report of WBPCB, WHO’s report, research paper, article, books and so on. It has been found that excessive HW generation from various sources and communities has serious health hazards that lead to the spreading of infectious disease and environmental change.

Keywords: environmental impacts, existing HW generation and management practice, hazardous waste (HW), health impacts, recommendation and planning

Procedia PDF Downloads 256
6171 Age-Stereotypes of Emerging Adults within the South African Work Environment

Authors: Bronwyn Bell, Lizelle Brink

Abstract:

Workplaces of today are populated by employees from different generations; emerging adults being the most recent demographic group entering the workplace. These individuals form part of Generation Y and are between the ages of 18 to 25. Emerging adults bring unique and different characteristics to the workplace. These individuals also differ from other generations with regards to their employment desires and ways of working. Age-stereotypes of emerging adults is, therefore, a common occurrence within workplaces. The general objective of the study was therefore to explore age-related stereotypes experienced regarding emerging adults within the South African work context and to determine the influences thereof. A qualitative research design from the social constructivism paradigm was employed in order to reach the objectives of this research study. A phenomenological approach using a combination of purposive and snowball sampling was employed within this study. A sample of 25 employees (N = 25) from various South African organisations were interviewed for the purpose of this study and formed part of three generations namely Generation Y, Generation X and Baby Boomers. In order to analyse the collected data, the steps of thematic analysis were used. The main findings of this study indicated that emerging adults experience various positive and negative stereotypes within the workplace. Results further indicated that these stereotypes influence emerging adults in a behavioural, cognitive and emotional manner. These stereotypes also influence the way emerging adults are treated by older employees within the workplace. Recommendations based on the results of this study were made for future research and practice. This study creates awareness within organisations regarding age-stereotypes of emerging adults. By being aware, employees can manage the influences thereof within the workplace.

Keywords: age-stereotypes, baby boomers, emerging adults, generation x, generation y, South African work environment, stereotypes

Procedia PDF Downloads 278
6170 A Constitutional Theory of the American Presidency

Authors: Elvin Lim

Abstract:

This article integrates the debate about presidential powers with the debate about federalism, arguing that there are two ways of exercising presidential powers, one working in tandem with expanding federal powers, and the other working against it. Alexander Hamilton and Thomas Jefferson—the former a Federalist and the latter echoing the views of many Anti-Federalists—disagreed not only on the constitutional basis of prerogative, but also on the ends for which it should be deployed. This tension has always existed in American politics, and is reproduced today. Modern Democrats and Republicans both want a strong executive, but the Democrats who want a strong executive to pass legislation to expand the reach of the federal government; naturally, they must rely on an equally empowered Congress to do so. Republicans generally do not want an intrusive federal government, which is why their defense of a strong presidency does not come alongside a call for a strong Congress. This distinction cannot be explained without recourse to foundational yet opposing views about the appropriate role of federal power. When we bring federalism back in, we see that there are indeed two presidencies; one neo-Federalist, in favor of moderate presidential prerogative alongside a robust Congress directed collectively to a national state-building agenda and expanding the federal prerogative; another, neo-Anti-Federalist, in favor of expansive presidential prerogative and an ideologically sympathetic Congress equally suspicious of federal power to retard or roll back national state-building in favour of states rights.

Keywords: US presidency, federalism, prerogative, anti-federalism

Procedia PDF Downloads 92
6169 Preliminary Treatment in Wastewater Treatment Plants: Operation and Maintenance Aspects

Authors: Priscila M. Lima, Corine A. P. de Almeida, Muriele R. de Lima, Fernando J. C. Magalhães Filho

Abstract:

This work characterized the preliminary treatment in WWTPs in the state of Mato Grosso Do Sul (Brazil) and analyzed aspects of operation and maintenance of solid waste retained, and was evaluated the interference of this step in treatment efficiency beyond the relationship between solid waste generation with rainfall and seasonality in the region of each WTPs. The results shown that the standard setting in the preliminary treatment consists of grid along with Sand Trap, followed by Parshall that is used in 94.12% of WWTPs analyzed, and in 5.88% of WWTPs it was added the air-lift to the Sand Trap. Was concluded that the influence of rainfall, flow and seasonality associated with the rate of waste generation in the preliminary treatment, had little relation to the operation and maintenance of the primary treatment. But in some cases, precipitation data showed increased rainfall converging with increased flow and solid waste generation.

Keywords: pretreatment, sewage, solid waste, wastewater

Procedia PDF Downloads 440
6168 The Study of Consumer Behavior towards Online Travel Agents in Purchasing Tourism Related Products and Services

Authors: Punrapha Praditpong, Surangkana Pipatchokchaiyo

Abstract:

The objectives of this study were to study the consumer behavior of the Baby boomers, the X & the Y generation towards Online Travel Agents in purchasing tourism-related products and services. The research methodology of this research used the quantitative study and the sample size consisted of 400 questionnaires in five districts of Bangkok. The data was analyzed by frequency, percentage, mean and SD. Moreover, all the hypotheses were tested by One-Way ANOVA and Pearson-Correlation statistics. The research findings were as follows: 1) There were significant effects to the purchasing decision making process towards purchasing tourism related products and services via OTAs; 2) There were different consumer behaviors from the Baby boomers, the X generation and the Y generation towards purchasing tourism related products and services via OTAs, which are explained in detail in finding. The research offers a discussion and presents some recommendations for the OTA websites.

Keywords: consumer behavior, online travel agent, x generations, y generations

Procedia PDF Downloads 272
6167 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 734
6166 Unsupervised Domain Adaptive Text Retrieval with Query Generation

Authors: Rui Yin, Haojie Wang, Xun Li

Abstract:

Recently, mainstream dense retrieval methods have obtained state-of-the-art results on some datasets and tasks. However, they require large amounts of training data, which is not available in most domains. The severe performance degradation of dense retrievers on new data domains has limited the use of dense retrieval methods to only a few domains with large training datasets. In this paper, we propose an unsupervised domain-adaptive approach based on query generation. First, a generative model is used to generate relevant queries for each passage in the target corpus, and then the generated queries are used for mining negative passages. Finally, the query-passage pairs are labeled with a cross-encoder and used to train a domain-adapted dense retriever. Experiments show that our approach is more robust than previous methods in target domains that require less unlabeled data.

Keywords: dense retrieval, query generation, unsupervised training, text retrieval

Procedia PDF Downloads 43
6165 Unbalanced Distribution Optimal Power Flow to Minimize Losses with Distributed Photovoltaic Plants

Authors: Malinwo Estone Ayikpa

Abstract:

Electric power systems are likely to operate with minimum losses and voltage meeting international standards. This is made possible generally by control actions provide by automatic voltage regulators, capacitors and transformers with on-load tap changer (OLTC). With the development of photovoltaic (PV) systems technology, their integration on distribution networks has increased over the last years to the extent of replacing the above mentioned techniques. The conventional analysis and simulation tools used for electrical networks are no longer able to take into account control actions necessary for studying distributed PV generation impact. This paper presents an unbalanced optimal power flow (OPF) model that minimizes losses with association of active power generation and reactive power control of single-phase and three-phase PV systems. Reactive power can be generated or absorbed using the available capacity and the adjustable power factor of the inverter. The unbalance OPF is formulated by current balance equations and solved by primal-dual interior point method. Several simulation cases have been carried out varying the size and location of PV systems and the results show a detailed view of the impact of PV distributed generation on distribution systems.

Keywords: distribution system, loss, photovoltaic generation, primal-dual interior point method

Procedia PDF Downloads 308
6164 The Droplet Generation and Flow in the T-Shape Microchannel with the Side Wall Fluctuation

Authors: Yan Pang, Xiang Wang, Zhaomiao Liu

Abstract:

Droplet microfluidics, in which nanoliter to picoliter droplets acted as individual compartments, are common to a diverse array of applications such as analytical chemistry, tissue engineering, microbiology and drug discovery. The droplet generation in a simplified two dimension T-shape microchannel with the main channel width of 50 μm and the side channel width of 25 μm, is simulated to investigate effects of the forced fluctuation of the side wall on the droplet generation and flow. The periodic fluctuations are applied on a length of the side wall in the main channel of the T-junction with the deformation shape of the double-clamped beam acted by the uniform force, which varies with the flow time and fluctuation periods, forms and positions. The fluctuations under most of the conditions expand the distribution range of the droplet size but have a little effect on the average size, while the shape of the fixed side wall changes the average droplet size chiefly. Droplet sizes show a periodic pattern along the relative time when the fluctuation is forced on the side wall near the T-junction. The droplet emerging frequency is not varied by the fluctuation of the side wall under the same flow rate and geometry conditions. When the fluctuation period is similar with the droplet emerging period, the droplet size shows a nice stability as the no fluctuation case.

Keywords: droplet generation, droplet size, flow flied, forced fluctuation

Procedia PDF Downloads 260
6163 Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists

Authors: K. Hołda, D. Śliwa, K. Daniec, A. Nawrat

Abstract:

This article was created as part of the developed master's thesis. It attempts to present a newly developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the following article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.

Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing

Procedia PDF Downloads 99
6162 Processes of Identity Construction for Generation 1.5 Students in Canada

Authors: Timothy Mossman

Abstract:

The number of adolescent children accompanying their immigrant parents to Canada has steadily increased since the 1990s. Much of the applied linguistics literature on these so-called ‘Generation 1.5’ youth has focused on their deficiencies as academic writers in US Rhetoric and Composition and ESL contexts in higher education and the stigma of ESL in US K-12 contexts. However, the literature on Generation 1.5 students and identity in Canadian higher education is limited. This qualitative study investigates the processes of identity construction of three Generation 1.5 students studying at a university in Metro Vancouver to find out what types of identities and representations of self and other they make relevant, the meanings they attribute to their identities, and what motivates them to construct these identities. The study analyzes the accounts and experiences of the participants in interviews, focus groups, and texts and as ‘culture-in-action,’ positing that they constructed identities as social categories associated with the languages and social practices of their countries of birth, in liminal spaces among a continuum between Canada and their countries of birth, and a spectrum of related cultural representations. Ideas and beliefs associated with broader ‘macro’ social structures in Canadian society related to language, culture, legitimacy, immigration, power, distinction, and racism were shown to be transcended in and through their representations of themselves and others. Data suggest that moving to Canada caused participants to experience discontinuities between their cultures, languages, and social practices, and in some cases a conflicting sense of self. The study brings implications for finding ways to understand the complexity of immigrant students, avoid reifying and generalizing about them, and not see them as stuck-in-between or lacking.

Keywords: culture-in-action, generation 1.5, identity, membership categorization analysis

Procedia PDF Downloads 133
6161 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 333
6160 Visual Overloaded on User-Generated Content by the Net Generation: Participatory Cultural Viewpoint

Authors: Hasanah Md. Amin

Abstract:

The existence of cyberspace and its growing contents is real and overwhelming. Visual as one of the properties of cyber contents is increasingly becoming more significant and popular among creator and user. The visual and aesthetic of the content is consistent with many similarities. Aesthetic, although universal, has slight differences across the world. Aesthetic power could impress, influence, and cause bias among the users. The content creator who knows how to manipulate this visuals and aesthetic expression can dominate the scenario and the user who is ‘expressive literate’ will gain much from the scenes. User who understands aesthetic will be rewarded with competence, confidence, and certainly, a personality enhanced experience in carrying out a task when participating in this chaotic but promising cyberworld. The aim of this article is to gain knowledge from related literature and research regarding User-Generated Content (UGC), which focuses on aesthetic expression by the Net generation. The objective of this preliminary study is to analyze the aesthetic expression linked to visual from the participatory cultural viewpoint looking for meaning, value, patterns, and characteristics.

Keywords: visual overloaded, user-generated content, net generation, visual arts

Procedia PDF Downloads 413
6159 Evaluation of Sustainable Business Model Innovation in Increasing the Penetration of Renewable Energy in the Ghana Power Sector

Authors: Victor Birikorang Danquah

Abstract:

Ghana's primary energy supply is heavily reliant on petroleum, biomass, and hydropower. Currently, Ghana gets its energy from hydropower (Akosombo and Bui), thermal power plants powered by crude oil, natural gas, and diesel, solar power, and imports from La Cote d'Ivoire. Until the early 2000s, large hydroelectric dams dominated Ghana's electricity generation. Due to unreliable weather patterns, Ghana increased its reliance on thermal power. However, thermal power contributes the highest percentage in terms of electricity generation in Ghana and is predominantly supplied by Independent Power Producers (IPPs). Ghana's electricity industry operates the corporate utility model as its business model. This model is typically' vertically integrated,' with a single corporation selling the majority of power generated by its generation assets to its retail business, which then sells the electricity to retail market consumers. The corporate utility model has a straightforward value proposition that is based on increasing the number of energy units sold. The unit volume business model drives the entire energy value chain to increase throughput, locking system users into unsustainable practices. This report uses the qualitative research approach to explore the electricity industry in Ghana. There is a need for increasing renewable energy, such as wind and solar, in electricity generation. The research recommends two critical business models for the penetration of renewable energy in Ghana's power sector. The first model is the peer-to-peer electricity trading model, which relies on a software platform to connect consumers and generators in order for them to trade energy directly with one another. The second model is about encouraging local energy generation, incentivizing optimal time-of-use behaviour, and allowing any financial gains to be shared among the community members.

Keywords: business model innovation, electricity generation, renewable energy, solar energy, sustainability, wind energy

Procedia PDF Downloads 149
6158 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 267
6157 Experimental Study on Thermomechanical Properties of New-Generation ODS Alloys

Authors: O. Khalaj, B. Mašek, H. Jirková, J. Svoboda

Abstract:

By using a combination of new technologies together with an unconventional use of different types of materials, specific mechanical properties and structures of the material can be achieved. Some possibilities are enabled by a combination of powder metallurgy in the preparation of a metal matrix with dispersed stable particles achieved by mechanical alloying and hot consolidation. This paper explains the thermomechanical properties of new generation of Oxide Dispersion Strengthened alloys (ODS) within three ranges of temperature with specified deformation profiles. The results show that the mechanical properties of new ODS alloys are significantly affected by the thermomechanical treatment.

Keywords: hot forming, ODS, alloys, thermomechanical, Fe-Al, Al2O3

Procedia PDF Downloads 254
6156 Millennials' Career Expectations: Exploring Attitudes and Individual Differences in Croatia

Authors: Lovorka Galetić, Maja Klindžić, Ivana Načinović Braje

Abstract:

Generation Y individuals or Millennials are known for their unique views, work values and motivational needs which implies that, in order to attract and retain those individuals, activities in the area of career management should be given special attention by HRM managers. After a theoretical background on Millennials’ life and work attitudes, an empirical research on career preferences of Millennials in Croatia was described. Empirical research was conducted among 249 members of generation Y. The data analysis revealed that respondents generally perceive promotion opportunities as the most important career aspect; however, job security and work-life balance are almost as important. Furthermore, it was shown that Generation Y is not necessarily a homogenous group. More precisely, women assign greater importance than men to work-life balance and job security. Therefore, HRM managers should adapt career planning activities not only with respect to generational preferences, but individual characteristics as well.

Keywords: career, individual differences, millennials, work values

Procedia PDF Downloads 377
6155 The Utilization of Big Data in Knowledge Management Creation

Authors: Daniel Brian Thompson, Subarmaniam Kannan

Abstract:

The huge weightage of knowledge in this world and within the repository of organizations has already reached immense capacity and is constantly increasing as time goes by. To accommodate these constraints, Big Data implementation and algorithms are utilized to obtain new or enhanced knowledge for decision-making. With the transition from data to knowledge provides the transformational changes which will provide tangible benefits to the individual implementing these practices. Today, various organization would derive knowledge from observations and intuitions where this information or data will be translated into best practices for knowledge acquisition, generation and sharing. Through the widespread usage of Big Data, the main intention is to provide information that has been cleaned and analyzed to nurture tangible insights for an organization to apply to their knowledge-creation practices based on facts and figures. The translation of data into knowledge will generate value for an organization to make decisive decisions to proceed with the transition of best practices. Without a strong foundation of knowledge and Big Data, businesses are not able to grow and be enhanced within the competitive environment.

Keywords: big data, knowledge management, data driven, knowledge creation

Procedia PDF Downloads 86