Search results for: fiber optic communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5417

Search results for: fiber optic communication

2567 Investigating the Successes of in vitro Embryogenesis

Authors: Zelikha Labbani

Abstract:

The in vitro isolated microspore culture is the most powerful androgenic pathway to produce doubled haploid plants in the short time. To deviate a microspore toward embryogenesis, a number of factors, different for each species, must concur at the same time and place. Once induced, the microspore undergoes numerous changes at different levels, from overall morphology to gene expression. Induction of microspore embryogenesis not only implies the expression of an embryogenic program, but also a stress-related cellular response and a repression of the gametophytic program to revert the microspore to a totipotent status. As haploid single cells, microspore became a strategy to achieve various objectives particularly in genetic engineering. In this communication we would show the most recent advances in the producing haploid embryos via in vitro isolated microspore culture.

Keywords: in vitro isolated microspore culture, success, haploid cells, bioinformatics, biomedicine

Procedia PDF Downloads 471
2566 Governance in the Age of Artificial intelligence and E- Government

Authors: Mernoosh Abouzari, Shahrokh Sahraei

Abstract:

Electronic government is a way for governments to use new technology that provides people with the necessary facilities for proper access to government information and services, improving the quality of services and providing broad opportunities to participate in democratic processes and institutions. That leads to providing the possibility of easy use of information technology in order to distribute government services to the customer without holidays, which increases people's satisfaction and participation in political and economic activities. The expansion of e-government services and its movement towards intelligentization has the ability to re-establish the relationship between the government and citizens and the elements and components of the government. Electronic government is the result of the use of information and communication technology (ICT), which by implementing it at the government level, in terms of the efficiency and effectiveness of government systems and the way of providing services, tremendous commercial changes are created, which brings people's satisfaction at the wide level will follow. The main level of electronic government services has become objectified today with the presence of artificial intelligence systems, which recent advances in artificial intelligence represent a revolution in the use of machines to support predictive decision-making and Classification of data. With the use of deep learning tools, artificial intelligence can mean a significant improvement in the delivery of services to citizens and uplift the work of public service professionals while also inspiring a new generation of technocrats to enter government. This smart revolution may put aside some functions of the government, change its components, and concepts such as governance, policymaking or democracy will change in front of artificial intelligence technology, and the top-down position in governance may face serious changes, and If governments delay in using artificial intelligence, the balance of power will change and private companies will monopolize everything with their pioneering in this field, and the world order will also depend on rich multinational companies and in fact, Algorithmic systems will become the ruling systems of the world. It can be said that currently, the revolution in information technology and biotechnology has been started by engineers, large economic companies, and scientists who are rarely aware of the political complexities of their decisions and certainly do not represent anyone. Therefore, it seems that if liberalism, nationalism, or any other religion wants to organize the world of 2050, it should not only rationalize the concept of artificial intelligence and complex data algorithm but also mix them in a new and meaningful narrative. Therefore, the changes caused by artificial intelligence in the political and economic order will lead to a major change in the way all countries deal with the phenomenon of digital globalization. In this paper, while debating the role and performance of e-government, we will discuss the efficiency and application of artificial intelligence in e-government, and we will consider the developments resulting from it in the new world and the concepts of governance.

Keywords: electronic government, artificial intelligence, information and communication technology., system

Procedia PDF Downloads 93
2565 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 504
2564 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 166
2563 Mechanical Behavior of Hybrid Hemp/Jute Fibers Reinforced Polymer Composites at Liquid Nitrogen Temperature

Authors: B. Vinod, L. Jsudev

Abstract:

Natural fibers as reinforcement in polymer matrix material is gaining lot of attention in recent years, as they are light in weight, less in cost, and ecologically advanced surrogate material to glass and carbon fibers in composites. Natural fibers like jute, sisal, coir, hemp, banana etc. have attracted substantial importance as a potential structural material because of its attractive features along with its good mechanical properties. Cryogenic applications of natural fiber reinforced polymer composites like cryogenic wind tunnels, cryogenic transport vessels, support structures in space shuttles and rockets are gaining importance. In these unique cryogenic applications, the requirements of polymer composites are extremely severe and complicated. These materials need to possess good mechanical and physical properties at cryogenic temperatures such as liquid helium (4.2 K), liquid hydrogen (20 K), liquid nitrogen (77 K), and liquid oxygen (90 K) temperatures, etc., to meet the high requirements by the cryogenic engineering applications. The objective of this work is to investigate the mechanical behavior of hybrid hemp/jute fibers reinforced epoxy composite material at liquid nitrogen temperature. Hemp and Jute fibers are used as reinforcement material as they have high specific strength, stiffness and good adhering property and has the potential to replace the synthetic fibers. Hybrid hemp/jute fibers reinforced polymer composite is prepared by hand lay-up method and test specimens are cut according to ASTM standards. These test specimens are dipped in liquid nitrogen for different time durations. The tensile properties, flexural properties and impact strength of the specimen are tested immediately after the specimens are removed from liquid nitrogen container. The experimental results indicate that the cryogenic treatment of the polymer composite has a significant effect on the mechanical properties of this material. The tensile properties and flexural properties of the hybrid hemp/jute fibers epoxy composite at liquid nitrogen temperature is higher than at room temperature. The impact strength of the material decreased after subjecting it to liquid nitrogen temperature.

Keywords: liquid nitrogen temperature, polymer composite, tensile properties, flexural properties

Procedia PDF Downloads 337
2562 New Recipes of Communication in the New Linguistic World Order: End of Road for Aged Pragmatics

Authors: Shailendra Kumar Singh

Abstract:

With the rise of New Linguistic World Order in the 21st century, the Aged Pragmatics is palpitating on the edge of theoretical irrelevance. What appears to be a new sociolinguistic reality is that the enlightening combination of alternative west, inclusive globalization and techno-revolution is adding novel recipes to communicative actions, style and gain among new linguistic breed which is being neither dominated nor powered by the western supremacy. The paper has the following main, interrelated, aims: it is intended to introduce the concept of alternative pragmatics that can offer what exactly is needed for our emerging societal realities; it asserts as to how the basic pillar of linguistic success in the new linguistic world order rests upon linguistic temptation and calibration of all; and it also reviews an inevitability of emerging economies in shaping the communication trends at a time when the western world is struggling to maintain the same control on the others exercised in the past. In particular, the paper seeks answers for the following questions: (a) Do we need an alternative pragmatics, one with alternativist leaning in an era of inclusive globalization and alternative west? (b) What are the pulses of shift which are encapsulating emergence of new communicative behavior among the new linguistic breed by breaking yesterday’s linguistic rigidity? (c) Or, what are those shifts which are making linguistic shift more perceptible? (d) Is New Linguistic World Order succeeding in reversing linguistic priorities of `who speaks, what language, where, how, why, to whom and in which condition’ with no parallel in the history? (e) What is explicit about the contemporary world of 21st century which makes linguistic world all exciting and widely celebrative phenomenon and that is also forced into our vision? (f) What factors will hold key to the future of yesterday’s `influential languages’ and today’s `emerging languages’ as world is in the paradigm transition? (g) Is the collapse of Aged Pragmatics good for the 21st century for understanding the difference between pragmatism of old linguistic world and new linguistic world order? New Linguistic world Order today, unlike in the past, is about a branding of new world with liberal world view for a particular form of ideal to be imagined in the 21st century. At this time without question it is hope that a new set of ideals with popular vocabulary will become the implicit pragmatic model as one of benign majoritarianism in all aspects of sociolinguistic reality. It appears to be a reality that we live in an extraordinary linguistic world with no parallel in the past. In particular, the paper also highlights the paradigm shifts: Demographic, Social-psychological, technological and power. These shifts are impacting linguistic shift which is unique in itself. The paper will highlight linguistic shift in details in which alternative west plays a major role without challenging the west because it is an era of inclusive globalization in which almost everyone takes equal responsibility.

Keywords: inclusive globalization, new linguistic world order, linguistic shift, world order

Procedia PDF Downloads 340
2561 Assessing Acceptability and Preference of Printed Posters on COVID-19 Related Stigma: A Post-Test Study Among HIV-Focused Health Workers in Greater Accra Region of Ghana

Authors: Jerry Fiave, Dacosta Aboagye, Stephen Ayisi-Addo, Mabel Kissiwah Asafo, Felix Osei-Sarpong, Ebenezer Kye-Mensah, Renee Opare-Otoo

Abstract:

Background: Acceptability and preference of social and behaviour change (SBC) materials by target audiences is an important determinant of effective health communication outcomes. In Ghana, however, pre-test and post-test studies on acceptability and preference of specific SBC materials for specific audiences are rare. The aim of this study was therefore to assess the acceptability and preference of printed posters on COVID-19 related stigma as suitable SBC materials for health workers to influence behaviours that promote uptake of HIV-focused services. Methods: A total of 218 health workers who provide HIV-focused services were purposively sampled in 16 polyclinics where the posters were distributed in the Greater Accra region of Ghana. Data was collected in March 2021 using an adapted self-administered questionnaire in Google forms deployed via WhatsApp to participants. The data were imported into SPSS version 27 where chi-square test and regression analyses were performed to establish association as well as strength of association between variables respectively. Results: A total of 142 participants (physicians, nurses, midwives, lab scientists, health promoters, diseases control officers) made up of 85(60%) females and 57(40%) males responded to the questionnaire, giving a response rate of 65.14%. Only 88 (61.97%) of the respondents were exposed to the posters. The majority of those exposed said the posters were informative [82(93.18%)], relevant [85(96.59%)] and attractive [83(94.32%)]. They [82(93.20%)] also rated the material as acceptable with no statistically significant association between category of health worker and acceptability of the posters (X =1.631, df=5, p=0.898). However, participants’ most preferred forms of material on COVID-19 related stigma were social media [38(26.76%)], television [33(23.24%)], SMS [19(13.38%)], and radio [18(12.70%)]. Clinical health workers were 4.88 times more likely to prefer online or electronic versions of SBC materials than nonclinical health workers [AOR= 4.88 (95% CI= 0.31-0.98), p=0.034]. Conclusions: Printed posters on COVID-19 related stigma are acceptable SBC materials in communicating behaviour change messages that target health workers in promoting uptake of HIV-focused services. Posters are however, not among the most preferred materials for health workers. It is therefore recommended that material assessment studies are conducted to inform the development of acceptable and preferred materials for target audiences.

Keywords: acceptability, AIDS, HIV, posters, preference, SBC, stigma, social and behaviour change communication

Procedia PDF Downloads 98
2560 Intelligent IT Infrastructure in the Gas and Oil Industry

Authors: Ahmad Fahad Alotaibi, Khalid Hamed Hajri, Humoud Hudiban Rashidi

Abstract:

Intelligent information technology infrastructure is considered one of the enablers to enhance digital transformation in the gas and oil fields to optimize IT infrastructure reliability by supporting operations and maintenance in a safe and secure method to optimize resources. Smart IT buildings, communication rooms and shelters with intelligent technologies can strengthen the performance and profitability of gas and oil companies by ensuring business continuity. This paper describes the advantages of deploying intelligent IT infrastructure in the oil and gas industry by illustrating its positive impacts on some development aspects, for instance, operations, maintenance, safety, security and resource optimization. Moreover, it highlights the challenges and difficulties of providing smart IT services in a remote area and proposes solutions to overcome such difficulties.

Keywords: intelligent IT infrastructure, remote areas, oil and gas field, digitalization

Procedia PDF Downloads 54
2559 Steady Conjugate Heat Transfer of Two Connected Thermal Systems

Authors: Mohamed El-Sayed Mosaad

Abstract:

An analytic approach is obtained for the steady heat transfer problem of two fluid systems, in thermal communication via heat conduction across a solid wall separating them. The two free convection layers created on wall sides are assumed to be in parallel flow. Fluid-solid interface temperature on wall sides is not prescribed in analysis in advance; rather, determined from conjugate solution among other unknown parameters. The analysis highlights the main conjugation parameters controlling thermal interaction process of involved heat transfer modes. Heat transfer results of engineering importance are obtained.

Keywords: conjugate heat transfer, boundary layer, convection, thermal systems

Procedia PDF Downloads 374
2558 The Principle of a Thought Formation: The Biological Base for a Thought

Authors: Ludmila Vucolova

Abstract:

The thought is a process that underlies consciousness and cognition and understanding its origin and processes is a longstanding goal of many academic disciplines. By integrating over twenty novel ideas and hypotheses of this theoretical proposal, we can speculate that thought is an emergent property of coded neural events, translating the electro-chemical interactions of the body with its environment—the objects of sensory stimulation, X, and Y. The latter is a self- generated feedback entity, resulting from the arbitrary pattern of the motion of a body’s motor repertory (M). A culmination of these neural events gives rise to a thought: a state of identity between an observed object X and a symbol Y. It manifests as a “state of awareness” or “state of knowing” and forms our perception of the physical world. The values of the variables of a construct—X (object), S1 (sense for the perception of X), Y (object), S2 (sense for perception of Y), and M (motor repertory that produces Y)—will specify the particular conscious percept at any given time. The proposed principle of interaction between the elements of a construct (X, Y, S1, S2, M) is universal and applies for all modes of communication (normal, deaf, blind, deaf and blind people) and for various language systems (Chinese, Italian, English, etc.). The particular arrangement of modalities of each of the three modules S1 (5 of 5), S2 (1 of 3), and M (3 of 3) defines a specific mode of communication. This multifaceted paradigm demonstrates a predetermined pattern of relationships between X, Y, and M that passes from generation to generation. The presented analysis of a cognitive experience encompasses the key elements of embodied cognition theories and unequivocally accords with the scientific interpretation of cognition as the mental action or process of acquiring knowledge and understanding through thought, experience, and the senses, and cognition means thinking and awareness. By assembling the novel ideas presented in twelve sections, we can reveal that in the invisible “chaos”, there is an order, a structure with landmarks and principles of operations and mental processes (thoughts) are physical and have a biological basis. This innovative proposal explains the phenomenon of mental imagery; give the first insight into the relationship between mental states and brain states, and support the notion that mind and body are inseparably connected. The findings of this theoretical proposal are supported by the current scientific data and are substantiated by the records of the evolution of language and human intelligence.

Keywords: agent, awareness, cognitive, element, experience, feedback, first person, imagery, language, mental, motor, object, sensory, symbol, thought

Procedia PDF Downloads 376
2557 How Virtualization, Decentralization, and Network-Building Change the Manufacturing Landscape: An Industry 4.0 Perspective

Authors: Malte Brettel, Niklas Friederichsen, Michael Keller, Marius Rosenberg

Abstract:

The German manufacturing industry has to withstand an increasing global competition on product quality and production costs. As labor costs are high, several industries have suffered severely under the relocation of production facilities towards aspiring countries, which have managed to close the productivity and quality gap substantially. Established manufacturing companies have recognized that customers are not willing to pay large price premiums for incremental quality improvements. As a consequence, many companies from the German manufacturing industry adjust their production focusing on customized products and fast time to market. Leveraging the advantages of novel production strategies such as Agile Manufacturing and Mass Customization, manufacturing companies transform into integrated networks, in which companies unite their core competencies. Hereby, virtualization of the process- and supply-chain ensures smooth inter-company operations providing real-time access to relevant product and production information for all participating entities. Boundaries of companies deteriorate, as autonomous systems exchange data, gained by embedded systems throughout the entire value chain. By including Cyber-Physical-Systems, advanced communication between machines is tantamount to their dialogue with humans. The increasing utilization of information and communication technology allows digital engineering of products and production processes alike. Modular simulation and modeling techniques allow decentralized units to flexibly alter products and thereby enable rapid product innovation. The present article describes the developments of Industry 4.0 within the literature and reviews the associated research streams. Hereby, we analyze eight scientific journals with regards to the following research fields: Individualized production, end-to-end engineering in a virtual process chain and production networks. We employ cluster analysis to assign sub-topics into the respective research field. To assess the practical implications, we conducted face-to-face interviews with managers from the industry as well as from the consulting business using a structured interview guideline. The results reveal reasons for the adaption and refusal of Industry 4.0 practices from a managerial point of view. Our findings contribute to the upcoming research stream of Industry 4.0 and support decision-makers to assess their need for transformation towards Industry 4.0 practices.

Keywords: Industry 4.0., mass customization, production networks, virtual process-chain

Procedia PDF Downloads 273
2556 Evaluating 8D Reports Using Text-Mining

Authors: Benjamin Kuester, Bjoern Eilert, Malte Stonis, Ludger Overmeyer

Abstract:

Increasing quality requirements make reliable and effective quality management indispensable. This includes the complaint handling in which the 8D method is widely used. The 8D report as a written documentation of the 8D method is one of the key quality documents as it internally secures the quality standards and acts as a communication medium to the customer. In practice, however, the 8D report is mostly faulty and of poor quality. There is no quality control of 8D reports today. This paper describes the use of natural language processing for the automated evaluation of 8D reports. Based on semantic analysis and text-mining algorithms the presented system is able to uncover content and formal quality deficiencies and thus increases the quality of the complaint processing in the long term.

Keywords: 8D report, complaint management, evaluation system, text-mining

Procedia PDF Downloads 306
2555 Care: A Cluster Based Approach for Reliable and Efficient Routing Protocol in Wireless Sensor Networks

Authors: K. Prasanth, S. Hafeezullah Khan, B. Haribalakrishnan, D. Arun, S. Jayapriya, S. Dhivya, N. Vijayarangan

Abstract:

The main goal of our approach is to find the optimum positions for the sensor nodes, reinforcing the communications in points where certain lack of connectivity is found. Routing is the major problem in sensor network’s data transfer between nodes. We are going to provide an efficient routing technique to make data signal transfer to reach the base station soon without any interruption. Clustering and routing are the two important key factors to be considered in case of WSN. To carry out the communication from the nodes to their cluster head, we propose a parameterizable protocol so that the developer can indicate if the routing has to be sensitive to either the link quality of the nodes or the their battery levels.

Keywords: clusters, routing, wireless sensor networks, three phases, sensor networks

Procedia PDF Downloads 502
2554 OSEME: A Smart Learning Environment for Music Education

Authors: Konstantinos Sofianos, Michael Stefanidakis

Abstract:

Nowadays, advances in information and communication technologies offer a range of opportunities for new approaches, methods, and tools in the field of education and training. Teacher-centered learning has changed to student-centered learning. E-learning has now matured and enables the design and construction of intelligent learning systems. A smart learning system fully adapts to a student's needs and provides them with an education based on their preferences, learning styles, and learning backgrounds. It is a wise friend and available at any time, in any place, and with any digital device. In this paper, we propose an intelligent learning system, which includes an ontology with all elements of the learning process (learning objects, learning activities) and a massive open online course (MOOC) system. This intelligent learning system can be used in music education.

Keywords: intelligent learning systems, e-learning, music education, ontology, semantic web

Procedia PDF Downloads 307
2553 Ultra-Low Loss Dielectric Properties of (Mg1-xNix)2(Ti0.95Sn0.05)O4 Microwave Ceramics

Authors: Bing-Jing Li, Sih-Yin Wang, Tse-Chun Yeh, Yuan-Bin Chen

Abstract:

Microwave dielectric ceramic materials of (Mg1-xNix)2(Ti0.95Sn0.05)O4 for x = 0.01, 0.03, 0.05, 0.07 and 0.09 were prepared and sintered at 1250–1400ºC. The microstructure and microwave dielectric properties of the ceramic materials were examined and measured. The observations shows that the content of Ni2+ ions has little effect on the crystal structure, dielectric constant, temperature coefficient of resonant frequency (τf) and sintering temperatures of the ceramics. However, the quality values (Q×f) are greatly improved due to the addition of Ni2+ ions. The present study showed that the ceramic material prepared for x = 0.05 and sintered at 1325ºC had the best Q×f value of 392,000 GHz, about 23% improvement compared with that of Mg2(Ti0.95Sn0.05)O4.

Keywords: (Mg1-xNix)2(Ti0.95Sn0.05)O4, microwave dielectric ceramics, high quality factor, high frequency wireless communication

Procedia PDF Downloads 482
2552 Flexible Integration of Airbag Weakening Lines in Interior Components: Airbag Weakening with Jenoptik Laser Technology

Authors: Markus Remm, Sebastian Dienert

Abstract:

Vehicle interiors are not only changing in terms of design and functionality but also due to new driving situations in which, for example, autonomous operating modes are possible. Flexible seating positions are changing the requirements for passive safety system behavior and location in the interior of a vehicle. With fully autonomous driving, the driver can, for example, leave the position behind the steering wheel and take a seated position facing backward. Since autonomous and non-autonomous vehicles will share the same road network for the foreseeable future, accidents cannot be avoided, which makes the use of passive safety systems indispensable. With JENOPTIK-VOTAN® A technology, the trend towards flexible predetermined airbag weakening lines is enabled. With the help of laser beams, the predetermined weakening lines are introduced from the backside of the components so that they are absolutely invisible. This machining process is sensor-controlled and guarantees that a small residual wall thickness remains for the best quality and reliability for airbag weakening lines. Due to the wide processing range of the laser, the processing of almost all materials is possible. A CO₂ laser is used for many plastics, natural fiber materials, foams, foils and material composites. A femtosecond laser is used for natural materials and textiles that are very heat-sensitive. This laser type has extremely short laser pulses with very high energy densities. Supported by a high-precision and fast movement of the laser beam by a laser scanner system, the so-called cold ablation is enabled to predetermine weakening lines layer by layer until the desired residual wall thickness remains. In that way, for example, genuine leather can be processed in a material-friendly and process-reliable manner without design implications to the components A-Side. Passive safety in the vehicle is increased through the interaction of modern airbag technology and high-precision laser airbag weakening. The JENOPTIK-VOTAN® A product family has been representing this for more than 25 years and is pointing the way to the future with new and innovative technologies.

Keywords: design freedom, interior material processing, laser technology, passive safety

Procedia PDF Downloads 115
2551 Expanding the Atelier: Design Lead Academic Project Using Immersive User-Generated Mobile Images and Augmented Reality

Authors: David Sinfield, Thomas Cochrane, Marcos Steagall

Abstract:

While there is much hype around the potential and development of mobile virtual reality (VR), the two key critical success factors are the ease of user experience and the development of a simple user-generated content ecosystem. Educational technology history is littered with the debris of over-hyped revolutionary new technologies that failed to gain mainstream adoption or were quickly superseded. Examples include 3D television, interactive CDROMs, Second Life, and Google Glasses. However, we argue that this is the result of curriculum design that substitutes new technologies into pre-existing pedagogical strategies that are focused upon teacher-delivered content rather than exploring new pedagogical strategies that enable student-determined learning or heutagogy. Visual Communication design based learning such as Graphic Design, Illustration, Photography and Design process is heavily based on the traditional forms of the classroom environment whereby student interaction takes place both at peer level and indeed teacher based feedback. In doing so, this makes for a healthy creative learning environment, but does raise other issue in terms of student to teacher learning ratios and reduced contact time. Such issues arise when students are away from the classroom and cannot interact with their peers and teachers and thus we see a decline in creative work from the student. Using AR and VR as a means of stimulating the students and to think beyond the limitation of the studio based classroom this paper will discuss the outcomes of a student project considering the virtual classroom and the techniques involved. The Atelier learning environment is especially suited to the Visual Communication model as it deals with the creative processing of ideas that needs to be shared in a collaborative manner. This has proven to have been a successful model over the years, in the traditional form of design education, but has more recently seen a shift in thinking as we move into a more digital model of learning and indeed away from the classical classroom structure. This study focuses on the outcomes of a student design project that employed Augmented Reality and Virtual Reality technologies in order to expand the dimensions of the classroom beyond its physical limits. Augmented Reality when integrated into the learning experience can improve the learning motivation and engagement of students. This paper will outline some of the processes used and the findings from the semester-long project that took place.

Keywords: augmented reality, blogging, design in community, enhanced learning and teaching, graphic design, new technologies, virtual reality, visual communications

Procedia PDF Downloads 237
2550 Non-Linear Finite Element Investigation on the Behavior of CFRP Strengthened Steel Square HSS Columns under Eccentric Loading

Authors: Tasnuba Binte Jamal, Khan Mahmud Amanat

Abstract:

Carbon Fiber-Reinforced Polymer (CFRP) composite materials have proven to have valuable properties and suitability to be used in the construction of new buildings and in upgrading the existing ones due to its effectiveness, ease of implementation and many more. In the present study, a numerical finite element investigation has been conducted using ANSYS 18.1 to study the behavior of square HSS AISC sections under eccentric compressive loading strengthened with CFRP materials. A three-dimensional finite element model for square HSS section using shell element was developed. Application of CFRP strengthening was incorporated in the finite element model by adding an additional layer of shell elements. Both material and geometric nonlinearities were incorporated in the model. The developed finite element model was applied to simulate experimental studies done by past researchers and it was found that good agreement exists between the current analysis and past experimental results, which established the acceptability and validity of the developed finite element model to carry out further investigation. Study was then focused on some selected non-compact AISC square HSS columns and the effects of number of CFRP layers, amount of eccentricities and cross-sectional geometry on the strength gain of those columns were observed. Load was applied at a distance equal to the column dimension and twice that of column dimension. It was observed that CFRP strengthening is comparatively effective for smaller eccentricities. For medium sized sections, strengthening tends to be effective at smaller eccentricities as well. For relatively large AISC square HSS columns, with increasing number of CFRP layers (from 1 to 3 layers) the gain in strength is approximately 1 to 38% to that of unstrengthened section for smaller eccentricities and slenderness ratio ranging from 27 to 54. For medium sized square HSS sections, effectiveness of CFRP strengthening increases approximately by about 12 to 162%. The findings of the present study provide a better understanding of the behavior of HSS sections strengthened with CFRP subjected to eccentric compressive load.

Keywords: CFRP strengthening, eccentricity, finite element model, square hollow section

Procedia PDF Downloads 140
2549 Testing of Electronic Control Unit Communication Interface

Authors: Petr Šimek, Kamil Kostruk

Abstract:

This paper deals with the problem of testing the Electronic Control Unit (ECU) for the specified function validation. Modern ECUs have many functions which need to be tested. This process requires tracking between the test and the specification. The technique discussed in this paper explores the system for automating this process. The paper focuses in its chapter IV on the introduction to the problem in general, then it describes the proposed test system concept and its principle. It looks at how the process of the ECU interface specification file for automated interface testing and test tracking works. In the end, the future possible development of the project is discussed.

Keywords: electronic control unit testing, embedded system, test generate, test automation, process automation, CAN bus, ethernet

Procedia PDF Downloads 107
2548 Direct Laser Fabrication and Characterization of Cu-Al-Ni Shape Memory Alloy for Seismic Damping Applications

Authors: Gonzalo Reyes, Magdalena Walczak, Esteban Ramos-Moore, Jorge Ramos-Grez

Abstract:

Metal additive manufacture technologies have gained strong support and acceptance as a promising and alternative method to manufacture high performance complex geometry products. The main purpose of the present work is to study the microstructure and phase transformation temperatures of Cu-Al-Ni shape memory alloys fabricated from a direct laser additive process using metallic powders as precursors. The potential application is to manufacture self-centering seismic dampers for earthquake protection of buildings out of a copper based alloy by an additive process. In this process, the Cu-Al-Ni alloy is melted, inside of a high temperature and vacuum chamber with the aid of a high power fiber laser under inert atmosphere. The laser provides the energy to melt the alloy powder layer. The process allows fabricating fully dense, oxygen-free Cu-Al-Ni specimens using different laser power levels, laser powder interaction times, furnace ambient temperatures, and cooling rates as well as modifying concentration of the alloying elements. Two sets of specimens were fabricated with a nominal composition of Cu-13Al-3Ni and Cu-13Al-4Ni in wt.%, however, semi-quantitative chemical analysis using EDX examination showed that the specimens’ resulting composition was closer to Cu-12Al-5Ni and Cu-11Al-8Ni, respectively. In spite of that fact, it is expected that the specimens should still possess shape memory behavior. To confirm this hypothesis, phase transformation temperatures will be measured using DSC technique, to look for martensitic and austenitic phase transformations at 150°C. So far, metallographic analysis of the specimens showed defined martensitic microstructures. Moreover, XRD technique revealed diffraction peaks corresponding to (0 0 18) and (1 2 8) planes, which are too associated with the presence of martensitic phase. We conclude that it would be possible to obtain fully dense Cu-Al-Ni alloys having shape memory effect behavior by direct laser fabrication process, and to advance into fabrication of self centering seismic dampers by a controllable metal additive manufacturing process.

Keywords: Cu-Al-Ni alloys, direct laser fabrication, shape memory alloy, self-centering seismic dampers

Procedia PDF Downloads 514
2547 Towards a Conscious Design in AI by Overcoming Dark Patterns

Authors: Ayse Arslan

Abstract:

One of the important elements underpinning a conscious design is the degree of toxicity in communication. This study explores the mechanisms and strategies for identifying toxic content by avoiding dark patterns. Given the breadth of hate and harassment attacks, this study explores a threat model and taxonomy to assist in reasoning about strategies for detection, prevention, mitigation, and recovery. In addition to identifying some relevant techniques such as nudges, automatic detection, or human-ranking, the study suggests the use of major metrics such as the overhead and friction of solutions on platforms and users or balancing false positives (e.g., incorrectly penalizing legitimate users) against false negatives (e.g., users exposed to hate and harassment) to maintain a conscious design towards fairness.

Keywords: AI, ML, algorithms, policy, system design

Procedia PDF Downloads 117
2546 Numerical Buckling of Composite Cylindrical Shells under Axial Compression Using Asymmetric Meshing Technique (AMT)

Authors: Zia R. Tahir, P. Mandal

Abstract:

This paper presents the details of a numerical study of buckling and post buckling behaviour of laminated carbon fiber reinforced plastic (CFRP) thin-walled cylindrical shell under axial compression using asymmetric meshing technique (AMT) by ABAQUS. AMT is considered to be a new perturbation method to introduce disturbance without changing geometry, boundary conditions or loading conditions. Asymmetric meshing affects both predicted buckling load and buckling mode shapes. Cylindrical shell having lay-up orientation [0°/+45°/-45°/0°] with radius to thickness ratio (R/t) equal to 265 and length to radius ratio (L/R) equal to 1.5 is analysed numerically. A series of numerical simulations (experiments) are carried out with symmetric and asymmetric meshing to study the effect of asymmetric meshing on predicted buckling behaviour. Asymmetric meshing technique is employed in both axial direction and circumferential direction separately using two different methods, first by changing the shell element size and varying the total number elements, and second by varying the shell element size and keeping total number of elements constant. The results of linear analysis (Eigenvalue analysis) and non-linear analysis (Riks analysis) using symmetric meshing agree well with analytical results. The results of numerical analysis are presented in form of non-dimensional load factor, which is the ratio of buckling load using asymmetric meshing technique to buckling load using symmetric meshing technique. Using AMT, load factor has about 2% variation for linear eigenvalue analysis and about 2% variation for non-linear Riks analysis. The behaviour of load end-shortening curve for pre-buckling is same for both symmetric and asymmetric meshing but for asymmetric meshing curve behaviour in post-buckling becomes extraordinarily complex. The major conclusions are: different methods of AMT have small influence on predicted buckling load and significant influence on load displacement curve behaviour in post buckling; AMT in axial direction and AMT in circumferential direction have different influence on buckling load and load displacement curve in post-buckling.

Keywords: CFRP composite cylindrical shell, asymmetric meshing technique, primary buckling, secondary buckling, linear eigenvalue analysis, non-linear riks analysis

Procedia PDF Downloads 348
2545 Modelling the Physicochemical Properties of Papaya Based-Cookies Using Response Surface Methodology

Authors: Mayowa Saheed Sanusi A, Musiliu Olushola Sunmonua, Abdulquadri Alakab Owolabi Raheema, Adeyemi Ikimot Adejokea

Abstract:

The development of healthy cookies for health-conscious consumers cannot be overemphasized in the present global health crisis. This study was aimed to evaluate and model the influence of ripeness levels of papaya puree (unripe, ripe and overripe), oven temperature (130°C, 150°C and 170°C) and oven rack speed (stationary, 10 and 20 rpm) on physicochemical properties of papaya-based cookies using Response Surface Methodology (RSM). The physicochemical properties (baking time, cookies mass, cookies thickness, spread ratio, proximate composition, Calcium, Vitamin C and Total Phenolic Content) were determined using standard procedures. The data obtained were statistically analysed at p≤0.05 using ANOVA. The polynomial regression model of response surface methodology was used to model the physicochemical properties. The adequacy of the models was determined using the coefficient of determination (R²) and the response optimizer of RSM was used to determine the optimum physicochemical properties for the papaya-based cookies. Cookies produced from overripe papaya puree were observed to have the shortest baking time; ripe papaya puree favors cookies spread ratio, while the unripe papaya puree gives cookies with the highest mass and thickness. The highest crude protein content, fiber content, calcium content, Vitamin C and Total Phenolic Content (TPC) were observed in papaya based-cookies produced from overripe puree. The models for baking time, cookies mass, cookies thickness, spread ratio, moisture content, crude protein and TPC were significant, with R2 ranging from 0.73 – 0.95. The optimum condition for producing papaya based-cookies with desirable physicochemical properties was obtained at 149°C oven temperature, 17 rpm oven rack speed and with the use of overripe papaya puree. The Information on the use of puree from unripe, ripe and overripe papaya can help to increase the use of underutilized unripe or overripe papaya and also serve as a strategic means of obtaining a fat substitute to produce new products with lower production cost and health benefit.

Keywords: papaya based-cookies, modeling, response surface methodology, physicochemical properties

Procedia PDF Downloads 161
2544 Gas Chromatography and Mass Spectrometry in Honey Fingerprinting: The Occurrence of 3,4-dihydro-3-oxoedulan and (E)-4-(r-1',t-2',c-4'-trihydroxy-3',6',6'-trimethylcyclohexyl)-but-3-en-2-one

Authors: Igor Jerkovic

Abstract:

Owing to the attractive sensory properties and low odour thresholds, norisoprenoids (degraded carotenoid-like structures with 3,5,5-trimethylcyclohex-2-enoic unit) have been identified as aroma contributors in a number of different matrices. C₁₃-Norisoprenoids have been found among volatile organic compounds of various honey types as well as C₉//C₁₀-norisoprenoids or C₁₄/C₁₅-norisoprenoids. Besides degradation of abscisic acid (which produces, e.g., dehydrovomifoliol, vomifoliol, others), the cleavage of the C(9)=C(10) bond of other carotenoid precursors directly generates nonspecific C₁₃-norisoprenoids such as trans-β-damascenone, 3-hydroxy-trans-β-damascone, 3-oxo-α-ionol, 3-oxo-α-ionone, β-ionone found in various honey types. β-Damascenone and β-ionone smelling like honey, exhibit the lowest odour threshold values of all C₁₃-norisoprenoids. The presentation is targeted on two uncommon C₁₃-norisoprenoids in the honey flavor that could be used as specific or nonspecific chemical markers of the botanical origin. Namely, after screening of different honey types, the focus was directed on Centaruea cyanus L. and Allium ursinum L. honey. The samples were extracted by headspace solid-phase microextraction (HS-SPME) and ultrasonic solvent extraction (USE) and the extracts were analysed by gas chromatography and mass spectrometry (GC-MS). SPME fiber with divinylbenzene/carboxen/polydimethylsiloxane (DVB/CAR/PDMS) coating was applied for the research of C. cyanus honey headspace and predominant identified compound was 3,4-dihydro-3-oxoedulan (2,5,5,8a-tetramethyl-2,3,5,6,8,8a-hexahydro-7H-chromen-7-one also known as 2,3,5,6,8,8a-hexahydro-2,5,5,8a-tetramethyl-7H-1-benzo-pyran-7-one). The oxoedulan structure contains epoxide and it is more volatile in comparison with its hydroxylated precursors. This compound has not been found in other honey types and can be considered specific for C. cyanus honey. The dichloromethane extract of A. ursinum honey contained abundant (E)-4-(r-1',t-2',c-4'-trihydroxy-3',6',6'-trimethylcyclohexyl)-but-3-en-2-one that was previously isolated as dominant substance from the ether extracts of New Zealand thyme honey. Although a wide variety of degraded carotenoid-like substances have been identified from different honey types, this appears to be rare situation where 3,4-dihydro-3-oxoedulan and (E)-4-(r-1',t-2',c-4'-trihydroxy-3',6',6'-trimethylcyclohexyl)-but-3-en-2-one have been found that is of great importance for chemical fingerprinting and identification of the chemical biomarkers that can complement the pollen analysis as the major method for the honey classification.

Keywords: 3, 4-dihydro-3-oxoedulan, (E)-4-(r-1', t-2', c-4'-trihydroxy-3', 6', 6'-trimethylcyclohexyl)-but-3-en-2-one, honey flavour, C₁₃-norisoprenoids

Procedia PDF Downloads 321
2543 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data

Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju

Abstract:

Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.

Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding

Procedia PDF Downloads 409
2542 Ecosystem Services and Human Well-Being: Case Study of Tiriya Village, Bastar India

Authors: S. Vaibhav Kant Sahu, Surabhi Bipin Seth

Abstract:

Human well-being has multiple constituents including the basic material for a good life, freedom and choice, health, good social relations, and security. Poverty is also multidimensional and has been defined as the pronounced deprivation of well-being. Dhurwa tribe of Bastar (India) have symbiotic relation with nature, it provisions ecosystem service such as food, fuel and fiber; regulating services such as climate regulation and non-material benefits such as spiritual or aesthetic benefits and they are managing their forest from ages. The demand for ecosystem services is now so great that trade-off among services become rule. Aim of study to explore evidences for linkages between ecosystem services and well-being of indigenous community, how much it helps them in poverty reduction and interaction between them. Objective of study was to find drivers of change and evidence concerning link between ecosystem, human development and sustainability, evidence in decision making does it opt for multi sectoral objectives. Which means human well-being as the central focus for assessment, while recognizing that biodiversity and ecosystems also have intrinsic value. Ecosystem changes that may have little impact on human well-being over days or weeks may have pronounced impacts over years or decades; so assessments needed to be conducted at spatial and temporal scales under social, political, economic scales to have high-resolution data. Researcher used framework developed by Millennium ecosystem assessment; since human action now directly or unknowingly virtually alter ecosystem. Researcher used ethnography study to get primary qualitative data, secondary data collected from panchayat office. The responses were transcribed and translated into English, as interview held in Hindi and local indigenous language. Focus group discussion were held with group of 10 women at Tiriya village. Researcher concluded with well-being is not just gap between ecosystem service supply but also increases vulnerability. Decision can have consequences external to the decision framework these consequences are called externalities because they are not part of the decision-making calculus.

Keywords: Bastar, Dhurwa tribe, ecosystem services, millennium ecosystem assessment, sustainability

Procedia PDF Downloads 298
2541 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 224
2540 A High Quality Factor Filter Based on Quasi- Periodic Photonic Structure

Authors: Hamed Alipour-Banaei, Farhad Mehdizadeh

Abstract:

We report the design and characterization of ultra high quality factor filter based on one-dimensional photonic-crystal Thue-Morse sequence structure. The behavior of aperiodic array of photonic crystal structure is numerically investigated and we show that by changing the angle of incident wave, desired wavelengths could be tuned and a tunable filter is realized. Also it is shown that high quality factor filter be achieved in the telecommunication window around 1550 nm, with a device based on Thue-Morse structure. Simulation results show that the proposed structure has a quality factor more than 100000 and it is suitable for DWDM communication applications.

Keywords: Thue-Morse, filter, quality factor, photonic

Procedia PDF Downloads 563
2539 The Parallelization of Algorithm Based on Partition Principle for Association Rules Discovery

Authors: Khadidja Belbachir, Hafida Belbachir

Abstract:

subsequently the expansion of the physical supports storage and the needs ceaseless to accumulate several data, the sequential algorithms of associations’ rules research proved to be ineffective. Thus the introduction of the new parallel versions is imperative. We propose in this paper, a parallel version of a sequential algorithm “Partition”. This last is fundamentally different from the other sequential algorithms, because it scans the data base only twice to generate the significant association rules. By consequence, the parallel approach does not require much communication between the sites. The proposed approach was implemented for an experimental study. The obtained results, shows a great reduction in execution time compared to the sequential version and Count Distributed algorithm.

Keywords: association rules, distributed data mining, partition, parallel algorithms

Procedia PDF Downloads 408
2538 Identification of Autism Spectrum Disorders in Day-Care Centres

Authors: Kenneth Larsen, Astrid Aasland, Synnve Schjølberg, Trond Diseth

Abstract:

Autism Spectrum Disorders (ASD) are neurodevelopmental disorders emerging in early development characterized by impairment in social communication skills and a restricted, repetitive and stereotyped patterns of behavior and interests. Early identification and interventions potentially improve development and quality of life of children with ASD. Symptoms of ASD are apparent through the second year of life, yet diagnostic age are still around 4 years of age. This study explored whether symptoms associated with ASD are possible to identify in typical Norwegian day-care centers in the second year of life. Results of this study clearly indicates that most described symptoms also are identifiable by day-care staff, and that a short observation list of 5 symptoms clearly identify children with ASD from a sample of normal developing peers.

Keywords: autism, early identification, day-care, screening

Procedia PDF Downloads 389