Search results for: threat modelling
2567 An Information-Based Approach for Preference Method in Multi-Attribute Decision Making
Authors: Serhat Tuzun, Tufan Demirel
Abstract:
Multi-Criteria Decision Making (MCDM) is the modelling of real-life to solve problems we encounter. It is a discipline that aids decision makers who are faced with conflicting alternatives to make an optimal decision. MCDM problems can be classified into two main categories: Multi-Attribute Decision Making (MADM) and Multi-Objective Decision Making (MODM), based on the different purposes and different data types. Although various MADM techniques were developed for the problems encountered, their methodology is limited in modelling real-life. Moreover, objective results are hard to obtain, and the findings are generally derived from subjective data. Although, new and modified techniques are developed by presenting new approaches such as fuzzy logic; comprehensive techniques, even though they are better in modelling real-life, could not find a place in real world applications for being hard to apply due to its complex structure. These constraints restrict the development of MADM. This study aims to conduct a comprehensive analysis of preference methods in MADM and propose an approach based on information. For this purpose, a detailed literature review has been conducted, current approaches with their advantages and disadvantages have been analyzed. Then, the approach has been introduced. In this approach, performance values of the criteria are calculated in two steps: first by determining the distribution of each attribute and standardizing them, then calculating the information of each attribute as informational energy.Keywords: literature review, multi-attribute decision making, operations research, preference method, informational energy
Procedia PDF Downloads 2242566 Effect of Infill Density and Pattern on the Compressive Strength of Parts Produced by Polylactic Acid Filament Using Fused Deposition Modelling
Authors: G. K. Awari, Vishwajeet V. Ambade, S. W. Rajurkar
Abstract:
The field of additive manufacturing is growing, and discoveries are being made. 3D printing machines are also being developed to accommodate a wider range of 3D printing materials, including plastics, metals (metal AM powders), composites, filaments, and other materials. There are numerous printing materials available for industrial additive manufacturing. Such materials have their unique characteristics, advantages, and disadvantages. In order to avoid errors in additive manufacturing, key elements such as 3D printing material type, texture, cost, printing technique and procedure, and so on must be examined. It can be complex to select the best material for a particular job. Polylactic acid (PLA) is made from sugar cane or cornstarch, both of which are renewable resources. "Black plastic" is another name for it. Because it is safe to use and print, it is frequently used in primary and secondary schools. This is also how FDM screen printing is done. PLA is simple to print because of its low warping impact. It's also possible to print it on a cold surface. When opposed to ABS, it allows for sharper edges and features to be printed. This material comes in a wide range of colours. Polylactic acid (PLA) is the most common material used in fused deposition modelling (FDM). PLA can be used to print a wide range of components, including medical implants, household items, and mechanical parts. The mechanical behaviour of the printed item is affected by variations in infill patterns that are subjected to compressive tests in the current investigation to examine their behaviour under compressive stresses.Keywords: fused deposition modelling, polylactic acid, infill density, infill pattern, compressive strength
Procedia PDF Downloads 742565 Forecasting Future Society to Explore Promising Security Technologies
Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim
Abstract:
Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.Keywords: future society, information and communication technology, security technology, technology forecasting
Procedia PDF Downloads 4682564 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes
Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana
Abstract:
The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes
Procedia PDF Downloads 2462563 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria
Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba
Abstract:
As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.Keywords: food, accessibility, availability, security
Procedia PDF Downloads 3762562 Two-Channels Thermal Energy Storage Tank: Experiments and Short-Cut Modelling
Authors: M. Capocelli, A. Caputo, M. De Falco, D. Mazzei, V. Piemonte
Abstract:
This paper presents the experimental results and the related modeling of a thermal energy storage (TES) facility, ideated and realized by ENEA and realizing the thermocline with an innovative geometry. Firstly, the thermal energy exchange model of an equivalent shell & tube heat exchanger is described and tested to reproduce the performance of the spiral exchanger installed in the TES. Through the regression of the experimental data, a first-order thermocline model was also validated to provide an analytical function of the thermocline, useful for the performance evaluation and the comparison with other systems and implementation in simulations of integrated systems (e.g. power plants). The experimental data obtained from the plant start-up and the short-cut modeling of the system can be useful for the process analysis, for the scale-up of the thermal storage system and to investigate the feasibility of its implementation in actual case-studies.Keywords: CSP plants, thermal energy storage, thermocline, mathematical modelling, experimental data
Procedia PDF Downloads 3292561 Deep Foundations: Analysis of the Lateral Response of Closed Ended Steel Tubular Piles Embedded in Sandy Soil Using P-Y Curves
Authors: Ameer A. Jebur, William Atherton, Rafid M. Alkhaddar, Edward Loffill
Abstract:
Understanding the behaviour of the piles under the action of the independent lateral loads and the precise prediction of the capacity of piles subjected to different lateral loads are vital topics in foundation design and analysis. Moreover, the laterally loaded behaviour of deep foundations penetrated in cohesive and non-cohesive soils is basically analysed by the Winkler Model (beam on elastic foundation), in which the interaction between the pile embedded depth and contacted soil is simulated by nonlinear p–y curves. The presence of many approaches to interpret the behaviour of soil-pile interaction has resulted in numerous outputs and indicates that no general approach has yet been adopted. The current study presents the result of numerical modelling of the behaviour of steel tubular piles (25.4mm) outside diameter with various embedment depth-to-diameter ratios (L/d) embedded in a sand calibrated chamber of known relative density. The study revealed that the shear strength parameters of the sand specimens and the (L/d) ratios are the most significant factor influencing the response of the pile and its capacity while taking into consideration the complex interaction between the pile and soil. Good agreement has been achieved when comparing the application of this modelling approach with experimental physical modelling carried out by another researcher.Keywords: deep foundations, slenderness ratio, soil-pile interaction, winkler model (beam on elastic foundation), non-cohesive soil
Procedia PDF Downloads 2992560 Unveiling the Domino Effect: Barriers and Strategies in the Adoption of Telecommuting as a Post-Pandemic Workspace
Authors: Divnesh Lingam, Devi Rengamani Seenivasagam, Prashant Chand, Caleb Yee, John Chief, Rajeshkannan Ananthanarayanan
Abstract:
Telecommuting Post-Pandemic: Barriers, Solutions, and Strategies. Amidst the COVID-19 outbreak in 2020, remote work emerged as a vital business continuity measure. This study investigates telecommuting’s modern work model, exploring its benefits and obstacles. Utilizing Interpretive Structural Modelling uncovers barriers hindering telecommuting adoption. A validated set of thirteen barriers is examined through departmental surveys, revealing interrelationships. The resulting model highlights interactions and dependencies, forming a foundational framework. By addressing dominant barriers, a domino effect on subservient barriers is demonstrated. This research fosters further exploration, proposing management strategies for successful telecommuting adoption and reshaping the traditional workspace.Keywords: barriers, interpretive structural modelling, post-pandemic, telecommuting
Procedia PDF Downloads 932559 Investigation of Software Integration for Simulations of Buoyancy-Driven Heat Transfer in a Vehicle Underhood during Thermal Soak
Authors: R. Yuan, S. Sivasankaran, N. Dutta, K. Ebrahimi
Abstract:
This paper investigates the software capability and computer-aided engineering (CAE) method of modelling transient heat transfer process occurred in the vehicle underhood region during vehicle thermal soak phase. The heat retention from the soak period will be beneficial to the cold start with reduced friction loss for the second 14°C worldwide harmonized light-duty vehicle test procedure (WLTP) cycle, therefore provides benefits on both CO₂ emission reduction and fuel economy. When vehicle undergoes soak stage, the airflow and the associated convective heat transfer around and inside the engine bay is driven by the buoyancy effect. This effect along with thermal radiation and conduction are the key factors to the thermal simulation of the engine bay to obtain the accurate fluids and metal temperature cool-down trajectories and to predict the temperatures at the end of the soak period. Method development has been investigated in this study on a light-duty passenger vehicle using coupled aerodynamic-heat transfer thermal transient modelling method for the full vehicle under 9 hours of thermal soak. The 3D underhood flow dynamics were solved inherently transient by the Lattice-Boltzmann Method (LBM) method using the PowerFlow software. This was further coupled with heat transfer modelling using the PowerTHERM software provided by Exa Corporation. The particle-based LBM method was capable of accurately handling extremely complicated transient flow behavior on complex surface geometries. The detailed thermal modelling, including heat conduction, radiation, and buoyancy-driven heat convection, were integrated solved by PowerTHERM. The 9 hours cool-down period was simulated and compared with the vehicle testing data of the key fluid (coolant, oil) and metal temperatures. The developed CAE method was able to predict the cool-down behaviour of the key fluids and components in agreement with the experimental data and also visualised the air leakage paths and thermal retention around the engine bay. The cool-down trajectories of the key components obtained for the 9 hours thermal soak period provide vital information and a basis for the further development of reduced-order modelling studies in future work. This allows a fast-running model to be developed and be further imbedded with the holistic study of vehicle energy modelling and thermal management. It is also found that the buoyancy effect plays an important part at the first stage of the 9 hours soak and the flow development during this stage is vital to accurately predict the heat transfer coefficients for the heat retention modelling. The developed method has demonstrated the software integration for simulating buoyancy-driven heat transfer in a vehicle underhood region during thermal soak with satisfying accuracy and efficient computing time. The CAE method developed will allow integration of the design of engine encapsulations for improving fuel consumption and reducing CO₂ emissions in a timely and robust manner, aiding the development of low-carbon transport technologies.Keywords: ATCT/WLTC driving cycle, buoyancy-driven heat transfer, CAE method, heat retention, underhood modeling, vehicle thermal soak
Procedia PDF Downloads 1532558 Analysis of the Dynamics of Transmission of Microsporidia MB Inside the Population of Anopheles Mosquitoes
Authors: Charlene N. T. Mfangnia, Henri Tonnang, Berge Tsanou, Jeremy Herren
Abstract:
The Microsporidia MB found in the populations of anopheles is a recently discovered symbiont responsible for the Plasmodium transmission blocking. From early studies, it was established that the symbiont can be transmitted vertically and horizontally. The present study uses compartmental mathematical modelling approach to investigate the dynamics of Microsporidia transmission in the mosquito population with the mindset of establishing a mechanism for use to control malaria. Data and information obtained from laboratory experiments are used to estimate the model parameters with and without temperature dependency of mosquito traits. We carry out the mathematical analysis focusing on the equilibria states and their stability for the autonomous model. Through the modelling experiments, we are able to assess and confirm the contribution of vertical and horizontal transmission in the proliferation of Microsporidia MB in the mosquito population. In addition, the basic and target reproductions are computed, and some long-term behaviours of the model, such as the local (and global) stability of equilibrium points, are rigorously analysed and illustrated numerically. We establish the conditions responsible for the low prevalence of the symbiont-infected mosquitoes observed in nature. Moreover, we identify the male death rate, the mating rate and the attractiveness of MB-positive mosquitoes as mosquito traits that significantly influence the spread of Microsporidia MB. Furthermore, we highlight the influence of temperature in the establishment and persistence of MB-infected mosquitoes in a given area.Keywords: microsporidia MB, vertical transmission, horizontal transmission, compartmental modelling approach, temperature-dependent mosquito traits, malaria, plasmodium-transmission blocking
Procedia PDF Downloads 1302557 Numerical Modelling of Immiscible Fluids Flow in Oil Reservoir Rocks during Enhanced Oil Recovery Processes
Authors: Zahreddine Hafsi, Manoranjan Mishra , Sami Elaoud
Abstract:
Ensuring the maximum recovery rate of oil from reservoir rocks is a challenging task that requires preliminary numerical analysis of different techniques used to enhance the recovery process. After conventional oil recovery processes and in order to retrieve oil left behind after the primary recovery phase, water flooding in one of several techniques used for enhanced oil recovery (EOR). In this research work, EOR via water flooding is numerically modeled, and hydrodynamic instabilities resulted from immiscible oil-water flow in reservoir rocks are investigated. An oil reservoir is a porous medium consisted of many fractures of tiny dimensions. For modeling purposes, the oil reservoir is considered as a collection of capillary tubes which provides useful insights into how fluids behave in the reservoir pore spaces. Equations governing oil-water flow in oil reservoir rocks are developed and numerically solved following a finite element scheme. Numerical results are obtained using Comsol Multiphysics software. The two phase Darcy module of COMSOL Multiphysics allows modelling the imbibition process by the injection of water (as wetting phase) into an oil reservoir. Van Genuchten, Brooks Corey and Levrett models were considered as retention models and obtained flow configurations are compared, and the governing parameters are discussed. For the considered retention models it was found that onset of instabilities viz. fingering phenomenon is highly dependent on the capillary pressure as well as the boundary conditions, i.e., the inlet pressure and the injection velocity.Keywords: capillary pressure, EOR process, immiscible flow, numerical modelling
Procedia PDF Downloads 1312556 Modelling Optimal Control of Diabetes in the Workplace
Authors: Eunice Christabel Chukwu
Abstract:
Introduction: Diabetes is a chronic medical condition which is characterized by high levels of glucose in the blood and urine; it is usually diagnosed by means of a glucose tolerance test (GTT). Diabetes can cause a range of health problems if left unmanaged, as it can lead to serious complications. It is essential to manage the condition effectively, particularly in the workplace where the impact on work productivity can be significant. This paper discusses the modelling of optimal control of diabetes in the workplace using a control theory approach. Background: Diabetes mellitus is a condition caused by too much glucose in the blood. Insulin, a hormone produced by the pancreas, controls the blood sugar level by regulating the production and storage of glucose. In diabetes, there may be a decrease in the body’s ability to respond to insulin or a decrease in insulin produced by the pancreas which will lead to abnormalities in the metabolism of carbohydrates, proteins, and fats. In addition to the health implications, the condition can also have a significant impact on work productivity, as employees with uncontrolled diabetes are at risk of absenteeism, reduced performance, and increased healthcare costs. While several interventions are available to manage diabetes, the most effective approach is to control blood glucose levels through a combination of lifestyle modifications and medication. Methodology: The control theory approach involves modelling the dynamics of the system and designing a controller that can regulate the system to achieve optimal performance. In the case of diabetes, the system dynamics can be modelled using a mathematical model that describes the relationship between insulin, glucose, and other variables. The controller can then be designed to regulate the glucose levels to maintain them within a healthy range. Results: The modelling of optimal control of diabetes in the workplace using a control theory approach has shown promising results. The model has been able to predict the optimal dose of insulin required to maintain glucose levels within a healthy range, taking into account the individual’s lifestyle, medication regimen, and other relevant factors. The approach has also been used to design interventions that can improve diabetes management in the workplace, such as regular glucose monitoring and education programs. Conclusion: The modelling of optimal control of diabetes in the workplace using a control theory approach has significant potential to improve diabetes management and work productivity. By using a mathematical model and a controller to regulate glucose levels, the approach can help individuals with diabetes to achieve optimal health outcomes while minimizing the impact of the condition on their work performance. Further research is needed to validate the model and develop interventions that can be implemented in the workplace.Keywords: mathematical model, blood, insulin, pancreas, model, glucose
Procedia PDF Downloads 612555 Identifying Barriers of Implementing Building Information Modelling in Construction
Authors: Kasra HosseinMostofi, Mohamadamin Oyar Hossein, Reza Mehdizadeh Anvigh
Abstract:
BIM is an innovative concept for the majority of firms operating in industry. BIM offers a new paradigm to design, construct, operate, and maintain a facility. However, even with the most conscientious use, stakeholders can run into trouble during its implementation on a project or within an organization. At times, project stakeholders are unaware of the challenges that they can face with the implementation at the project level or an organizational level. Therefore, the study aimed to identify and compile barriers associated with the BIM implementation at the project and organizational level, as per the literature. Despite the fact that innumerable advantageous involved in exploiting BIM, there are some barriers to implement it properly. These barriers have been proved as impediments for academicians and members of construction team project to take the maximum advantage of its utilization. Although some research has been conducted to identify these barriers regarding BIM implementation in construction industry, more research is needed to be carried out among academicians to identify these barriers in institutions, and most importantly, to make suggestions for eliminating these obstacles.Keywords: building information modelling, construction, design and construction, designers
Procedia PDF Downloads 1842554 Scaling Strategy of a New Experimental Rig for Wheel-Rail Contact
Authors: Meysam Naeimi, Zili Li, Rolf Dollevoet
Abstract:
A new small–scale test rig developed for rolling contact fatigue (RCF) investigations in wheel–rail material. This paper presents the scaling strategy of the rig based on dimensional analysis and mechanical modelling. The new experimental rig is indeed a spinning frame structure with multiple wheel components over a fixed rail-track ring, capable of simulating continuous wheel-rail contact in a laboratory scale. This paper describes the dimensional design of the rig, to derive its overall scaling strategy and to determine the key elements’ specifications. Finite element (FE) modelling is used to simulate the mechanical behavior of the rig with two sample scale factors of 1/5 and 1/7. The results of FE models are compared with the actual railway system to observe the effectiveness of the chosen scales. The mechanical properties of the components and variables of the system are finally determined through the design process.Keywords: new test rig, rolling contact fatigue, rail, small scale
Procedia PDF Downloads 4842553 Numerical Modelling of Dry Stone Masonry Structures Based on Finite-Discrete Element Method
Authors: Ž. Nikolić, H. Smoljanović, N. Živaljić
Abstract:
This paper presents numerical model based on finite-discrete element method for analysis of the structural response of dry stone masonry structures under static and dynamic loads. More precisely, each discrete stone block is discretized by finite elements. Material non-linearity including fracture and fragmentation of discrete elements as well as cyclic behavior during dynamic load are considered through contact elements which are implemented within a finite element mesh. The application of the model was conducted on several examples of these structures. The performed analysis shows high accuracy of the numerical results in comparison with the experimental ones and demonstrates the potential of the finite-discrete element method for modelling of the response of dry stone masonry structures.Keywords: dry stone masonry structures, dynamic load, finite-discrete element method, static load
Procedia PDF Downloads 4142552 Modelling of Rate-Dependent Hysteresis of Polypyrrole Dual Sensing-Actuators for Precise Position Control
Authors: Johanna Schumacher, Toribio F. Otero, Victor H. Pascual
Abstract:
Bending dual sensing-actuators based on electroactive polymers are faradaic motors meaning the consumed charge determines the actuator’s tip position. During actuation, consumed charges during oxidation and reduction result in different tip positions showing dynamic hysteresis effects with errors up to 25%. For a precise position control of these actuators, the characterization of the hysteresis effect due to irreversible reactions is crucial. Here, the investigation and modelling of dynamic hysteresis effects of polypyrrole-dodezylbenzenesulfonate (PPyDBS) actuators under ambient working conditions are presented. The hysteresis effect is studied for charge consumption at different frequencies and a rate-dependent hysteresis model is derived. The hysteresis model is implemented as closed loop system and is verified experimentally.Keywords: dual sensing-actuator, electroactive polymers, hysteresis, position control
Procedia PDF Downloads 3862551 Assessing the Imapact of Climate Change on Biodiversity Hotspots: A Multidisciplinary Study
Authors: Reet Bishnoi
Abstract:
Climate change poses a pressing global challenge, with far-reaching consequences for the planet's ecosystems and biodiversity. This abstract introduces the research topic, "Assessing the Impact of Climate Change on Biodiversity Hotspots: A Multidisciplinary Study," which delves into the intricate relationship between climate change and biodiversity in the world's most ecologically diverse regions. Biodiversity hotspots, characterized by their exceptionally high species richness and endemism, are under increasing threat due to rising global temperatures, altered precipitation patterns, and other climate-related factors. This research employs a multidisciplinary approach, incorporating ecological, climatological, and conservationist methodologies to comprehensively analyze the effects of climate change on these vital regions. Through a combination of field research, climate modelling, and ecological assessments, this study aims to elucidate the vulnerabilities of biodiversity hotspots and understand how changes in temperature and precipitation are affecting the diverse species and ecosystems that inhabit these areas. The research seeks to identify potential tipping points, assess the resilience of native species, and propose conservation strategies that can mitigate the adverse impacts of climate change on these critical regions. By illuminating the complex interplay between climate change and biodiversity hotspots, this research not only contributes to our scientific understanding of these issues but also informs policymakers, conservationists, and the public about the urgent need for coordinated efforts to safeguard our planet's ecological treasures. The outcomes of this multidisciplinary study are expected to play a pivotal role in shaping future climate policies and conservation practices, emphasizing the importance of protecting biodiversity hotspots for the well-being of the planet and future generations.Keywords: climate change, biodiversity hotspots, ecological diversity, conservation, multidisciplinary study
Procedia PDF Downloads 742550 2D RF ICP Torch Modelling with Fluid Plasma
Authors: Mokhtar Labiod, Nabil Ikhlef, Keltoum Bouherine, Olivier Leroy
Abstract:
A numerical model for the radio-frequency (RF) Argon discharge chamber is developed to simulate the low pressure low temperature inductively coupled plasma. This model will be of fundamental importance in the design of the plasma magnetic control system. Electric and magnetic fields inside the discharge chamber are evaluated by solving a magnetic vector potential equation. To start with, the equations of the ideal magnetohydrodynamics theory will be presented describing the basic behaviour of magnetically confined plasma and equations are discretized with finite element method in cylindrical coordinates. The discharge chamber is assumed to be axially symmetric and the plasma is treated as a compressible gas. Plasma generation due to ionization is added to the continuity equation. Magnetic vector potential equation is solved for the electromagnetic fields. A strong dependence of the plasma properties on the discharge conditions and the gas temperature is obtained.Keywords: direct-coupled model, magnetohydrodynamic, modelling, plasma torch simulation
Procedia PDF Downloads 4332549 Application of Terminal Sliding Mode Control to the Stabilization of the Indoor Temperature in Buildings
Authors: Pawel Skruch, Marek Dlugosz
Abstract:
The paper starts with a general model of the temperature dynamics in buildings. The modelling approach relies on thermodynamics, in particular heat transfer, principles. The model considers heat loses by conduction and ventilation and internal heat gains. The parameters of the model can be determined uniquely from the geometry of the building and from thermal properties of construction materials. The model is presented using state space notation and this form is used in the control design procedure. A sliding surface is defined by the system output and the desired trajectory. The control law is designed to force the trajectory of the system from any initial condition to the sliding surface in finite time. The trajectory of the system after reaching the sliding surface remains on it. A simulation example is included to verify the approach and to demonstrate the achievable performance improvement by the proposed solution in the temperature control in buildings.Keywords: modelling, building, temperature dynamics, sliding-mode control, sliding surface
Procedia PDF Downloads 5492548 Pakistan Nuclear Security: Threats from Non-State Actors
Authors: Jennifer Wright
Abstract:
The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism
Procedia PDF Downloads 2262547 Choral Singers' Preference for Expressive Priming Techniques
Authors: Shawn Michael Condon
Abstract:
Current research on teaching expressivity mainly involves instrumentalists. This study focuses on choral singers’ preference of priming techniques based on four methods for teaching expressivity. 112 choral singers answered the survey about their preferred methods for priming expressivity (vocal modelling, using metaphor, tapping into felt emotions, and drawing on past experiences) in three conditions (active, passive, and instructor). Analysis revealed higher preference for drawing on past experience among more experienced singers. The most preferred technique in the passive and instructor roles was vocal modelling, with metaphors and tapping into felt emotions favoured in an active role. Priming techniques are often used in combination with other methods to enhance singing technique or expressivity and are dependent upon the situation, repertoire, and the preferences of the instructor and performer.Keywords: emotion, expressivity, performance, singing, teaching
Procedia PDF Downloads 1552546 Modelling and Simulation Efforts in Scale-Up and Characterization of Semi-Solid Dosage Forms
Authors: Saurav S. Rath, Birendra K. David
Abstract:
Generic pharmaceutical industry has to operate in strict timelines of product development and scale-up from lab to plant. Hence, detailed product & process understanding and implementation of appropriate mechanistic modelling and Quality-by-design (QbD) approaches are imperative in the product life cycle. This work provides example cases of such efforts in topical dosage products. Topical products are typically in the form of emulsions, gels, thick suspensions or even simple solutions. The efficacy of such products is determined by characteristics like rheology and morphology. Defining, and scaling up the right manufacturing process with a given set of ingredients, to achieve the right product characteristics presents as a challenge to the process engineer. For example, the non-Newtonian rheology varies not only with CPPs and CMAs but also is an implicit function of globule size (CQA). Hence, this calls for various mechanistic models, to help predict the product behaviour. This paper focusses on such models obtained from computational fluid dynamics (CFD) coupled with population balance modelling (PBM) and constitutive models (like shear, energy density). In a special case of the use of high shear homogenisers (HSHs) for the manufacture of thick emulsions/gels, this work presents some findings on (i) scale-up algorithm for HSH using shear strain, a novel scale-up parameter for estimating mixing parameters, (ii) non-linear relationship between viscosity and shear imparted into the system, (iii) effect of hold time on rheology of product. Specific examples of how this approach enabled scale-up across 1L, 10L, 200L, 500L and 1000L scales will be discussed.Keywords: computational fluid dynamics, morphology, quality-by-design, rheology
Procedia PDF Downloads 2692545 Universality as Opportunity Domain behind the Threats and Challenges of Natural Disasters
Authors: Kunto Wibowo Agung Prodjonoto
Abstract:
Occasionally, opportunities occur not due to chances but threats. This, however, is often not realized because a greater threat is perceived to be anything that threatens, endangers, or harms, resulting in bad impacts that are also part of the risk and consequence. As a result, more focus tends to direct towards the bad impacts. Risk, in this case, shall be seen rather as something challenging, which can turn to be an opportunity to tackle an obstacle. Therefore, it does not seem exaggerating if later, risk can be considered as a challenge that presents an opportunity. So as in the context of the threat of natural disasters which gives an idea that opportunities exist. Nature referred to in a fashion as 'natural disasters' captured an expression to picture the 'threats' aspect, which instructively implying a chance of opportunity. This is quite logical, as SWOT (strengths, weaknesses, opportunities, threats) analysis can evaluate the situation at hand related to the analysis of various factors in formulating strategies to deal with natural disaster situations. The analytical method created by Albert Humphrey is indeed not an analytical tool to provide solutions, but certainly 'opportunities and challenges' are discussed therein on a vertical line, where opportunities are posited on the positive axis, and threats are posed on the negative axis. Observing this dynamism, the challenges and threats of disasters are having opportunity relevance to moralizing opportunities, that by quality poses universalism populist characteristics, universalism characteristics, and regional characteristics. Here, universalism appears as an opportunity domain underneath the threats and challenges of natural disasters.Keywords: universality, opportunities, threats, challenges of natural disasters
Procedia PDF Downloads 1512544 Modelling of Moisture Loss and Oil Uptake during Deep-Fat Frying of Plantain
Authors: James A. Adeyanju, John O. Olajide, Akinbode A. Adedeji
Abstract:
A predictive mathematical model based on the fundamental principles of mass transfer was developed to simulate the moisture content and oil content during Deep-Fat Frying (DFF) process of dodo. The resulting governing equation, that is, partial differential equation that describes rate of moisture loss and oil uptake was solved numerically using explicit Finite Difference Technique (FDT). Computer codes were written in MATLAB environment for the implementation of FDT at different frying conditions and moisture loss as well as oil uptake simulation during DFF of dodo. Plantain samples were sliced into 5 mm thickness and fried at different frying oil temperatures (150, 160 and 170 ⁰C) for periods varying from 2 to 4 min. The comparison between the predicted results and experimental data for the validation of the model showed reasonable agreement. The correlation coefficients between the predicted and experimental values of moisture and oil transfer models ranging from 0.912 to 0.947 and 0.895 to 0.957, respectively. The predicted results could be further used for the design, control and optimization of deep-fat frying process.Keywords: frying, moisture loss, modelling, oil uptake
Procedia PDF Downloads 4472543 Improving Our Understanding of the in vivo Modelling of Psychotic Disorders
Authors: Zsanett Bahor, Cristina Nunes-Fonseca, Gillian L. Currie, Emily S. Sena, Lindsay D.G. Thomson, Malcolm R. Macleod
Abstract:
Psychosis is ranked as the third most disabling medical condition in the world by the World Health Organization. Despite a substantial amount of research in recent years, available treatments are not universally effective and have a wide range of adverse side effects. Since many clinical drug candidates are identified through in vivo modelling, a deeper understanding of these models, and their strengths and limitations, might help us understand reasons for difficulties in psychosis drug development. To provide an unbiased summary of the preclinical psychosis literature we performed a systematic electronic search of PubMed for publications modelling a psychotic disorder in vivo, identifying 14,721 relevant studies. Double screening of 11,000 publications from this dataset so far established 2403 animal studies of psychosis, with the most common model being schizophrenia (95%). 61% of these models are induced using pharmacological agents. For all the models only 56% of publications test a therapeutic treatment. We propose a systematic review of these studies to assess the prevalence of reporting of measures to reduce risk of bias, and a meta-analysis to assess the internal and external validity of these animal models. Our findings are likely to be relevant to future preclinical studies of psychosis as this generation of strong empirical evidence has the potential to identify weaknesses, areas for improvement and make suggestions on refinement of experimental design. Such a detailed understanding of the data which inform what we think we know will help improve the current attrition rate between bench and bedside in psychosis research.Keywords: animal models, psychosis, systematic review, schizophrenia
Procedia PDF Downloads 2902542 A Design of an Augmented Reality Based Virtual Heritage Application
Authors: Stephen Barnes, Ian Mills, Frances Cleary
Abstract:
Augmented and virtual reality-based applications offer many benefits for the heritage and tourism sector. This technology provides a platform to showcase the regions of interest to people without the need for them to be physically present, which has had a positive impact on enticing tourists to visit those locations. However, the technology also provides the opportunity to present historical artefacts in a form that accurately represents their original, intended appearance. Three sites of interest were identified in the Lingaun Valley in South East Ireland, wherein virtual representations of site-specific artefacts of interest were created via a multidisciplinary team encompassing archaeology, art history, 3D modelling, design, and software development. The collated information has been presented to users via an augmented reality mobile-based application that provides information in an engaging manner that encourages an interest in history as well as visits to the sites in the Lingaun Valley.Keywords: augmented reality, virtual heritage, 3D modelling, archaeology, virtual representation
Procedia PDF Downloads 812541 Idea Expropriation, Incentives, and Governance within Organizations
Authors: Gulseren Mutlu, Gurupdesh Pandher
Abstract:
This paper studies the strategic interplay between innovation, incentives, expropriation threat and disputes arising from expropriation from an intra-organization perspective. We present a simple principal-agent model with hidden actions and hidden information in which two employees can choose how much (innovative) effort to exert, whether to expropriate the innovation of the other employee and whether to dispute if innovation is expropriated. The organization maximizes its expected payoff by choosing the optimal reward scheme for both employees as well as whether to encourage or discourage disputes. We analyze two mechanisms under which innovative ideas are not expropriated. First, we show that under a non-contestable mechanism (in which the organization discourages disputes among employees), the organization has to offer a “rent” to the potential expropriator. However, under a contestable mechanism (in which the organization encourages disputes), there is no need for such rent. If the cost of resolving the dispute is negligible, the organization’s expected payoff is higher under a contestable mechanism. Second, we develop a comparable team mechanism in which innovation takes place as a result of the joint efforts of employees and innovation payments are made based on the team outcome. We show that if the innovation value is low and employees have similar productivity, then the organization is better off under a contestable mechanism. On the other hand, if the innovation value is high, the organization is better off under a team mechanism. Our results have important practical implications for the design of innovation reward system for employees, hiring policy and governance for different companies.Keywords: innovation, incentives, expropriation threat, dispute resolution
Procedia PDF Downloads 6172540 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'
Authors: Larry Lai, Evans Leung
Abstract:
Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China
Procedia PDF Downloads 1452539 Software Component Identification from Its Object-Oriented Code: Graph Metrics Based Approach
Authors: Manel Brichni, Abdelhak-Djamel Seriai
Abstract:
Systems are increasingly complex. To reduce their complexity, an abstract view of the system can simplify its development. To overcome this problem, we propose a method to decompose systems into subsystems while reducing their coupling. These subsystems represent components. Consisting of an existing object-oriented systems, the main idea of our approach is based on modelling as graphs all entities of an oriented object source code. Such modelling is easy to handle, so we can apply restructuring algorithms based on graph metrics. The particularity of our approach consists in integrating in addition to standard metrics, such as coupling and cohesion, some graph metrics giving more precision during the components identication. To treat this problem, we relied on the ROMANTIC approach that proposed a component-based software architecture recovery from an object oriented system.Keywords: software reengineering, software component and interfaces, metrics, graphs
Procedia PDF Downloads 5012538 The Role of Celebrities in the Securitization and Desecuritization of Syrian Migrants on Social Media in Turkiye
Authors: Yelda Yenel, Orkut Acele
Abstract:
This research aims to examine the role of celebrities in the securitization and desecuritization of Syrian migrants in Türkiye on social media platforms. Traditionally, the securitization process has been driven by political actors and mainstream media. However, with the rise of social media, celebrities have emerged as influential actors, contributing to these processes. The topic of Syrian migrants, particularly those arriving in Türkiye after 2011, has sparked national debates, framing them both as a security threat and as a humanitarian issue, thereby dividing public opinion.The primary objective of this study is to analyze celebrities’ discourses about migrants on social media and to explore how these narratives contribute to the processes of securitization (presenting migrants as a threat) and desecuritization (framing migrants within a humanitarian context). This research will focus on social media platforms such as Twitter and Instagram, examining celebrities' posts and analyzing the narratives produced through content and discourse analysis techniques.By investigating how celebrities frame the migrant issue and how these frames resonate with the public, this study seeks to explore the impact of celebrity discourse on the securitization and desecuritization processes. Additionally, it will examine the influence of celebrities on social media users, offering a new perspective on how securitization theory is shaped by the role of celebrities in the digital age.Keywords: securitization, desecuritization, celebrities, Syrian migrants, social media discourse
Procedia PDF Downloads 19