Search results for: multiple query optimization
5022 Finite Element Method (FEM) Simulation, design and 3D Print of Novel Highly Integrated PV-TEG Device with Improved Solar Energy Harvest Efficiency
Abstract:
Despite the remarkable advancement of solar cell technology, the challenge of optimizing total solar energy harvest efficiency persists, primarily due to significant heat loss. This excess heat not only diminishes solar panel output efficiency but also curtails its operational lifespan. A promising approach to address this issue is the conversion of surplus heat into electricity. In recent years, there is growing interest in the use of thermoelectric generators (TEG) as a potential solution. The integration of efficient TEG devices holds the promise of augmenting overall energy harvest efficiency while prolonging the longevity of solar panels. While certain research groups have proposed the integration of solar cells and TEG devices, a substantial gap between conceptualization and practical implementation remains, largely attributed to low thermal energy conversion efficiency of TEG devices. To bridge this gap and meet the requisites of practical application, a feasible strategy involves the incorporation of a substantial number of p-n junctions within a confined unit volume. However, the manufacturing of high-density TEG p-n junctions presents a formidable challenge. The prevalent solution often leads to large device sizes to accommodate enough p-n junctions, consequently complicating integration with solar cells. Recently, the adoption of 3D printing technology has emerged as a promising solution to address this challenge by fabricating high-density p-n arrays. Despite this, further developmental efforts are necessary. Presently, the primary focus is on the 3D printing of vertically layered TEG devices, wherein p-n junction density remains constrained by spatial limitations and the constraints of 3D printing techniques. This study proposes a novel device configuration featuring horizontally arrayed p-n junctions of Bi2Te3. The structural design of the device is subjected to simulation through the Finite Element Method (FEM) within COMSOL Multiphysics software. Various device configurations are simulated to identify optimal device structure. Based on the simulation results, a new TEG device is fabricated utilizing 3D Selective laser melting (SLM) printing technology. Fusion 360 facilitates the translation of the COMSOL device structure into a 3D print file. The horizontal design offers a unique advantage, enabling the fabrication of densely packed, three-dimensional p-n junction arrays. The fabrication process entails printing a singular row of horizontal p-n junctions using the 3D SLM printing technique in a single layer. Subsequently, successive rows of p-n junction arrays are printed within the same layer, interconnected by thermally conductive copper. This sequence is replicated across multiple layers, separated by thermal insulating glass. This integration created in a highly compact three-dimensional TEG device with high density p-n junctions. The fabricated TEG device is then attached to the bottom of the solar cell using thermal glue. The whole device is characterized, with output data closely matching with COMSOL simulation results. Future research endeavors will encompass the refinement of thermoelectric materials. This includes the advancement of high-resolution 3D printing techniques tailored to diverse thermoelectric materials, along with the optimization of material microstructures such as porosity and doping. The objective is to achieve an optimal and highly integrated PV-TEG device that can substantially increase the solar energy harvest efficiency.Keywords: thermoelectric, finite element method, 3d print, energy conversion
Procedia PDF Downloads 715021 Impact of Population Size on Symmetric Travelling Salesman Problem Efficiency
Authors: Wafa' Alsharafat, Suhila Farhan Abu-Owida
Abstract:
Genetic algorithm (GA) is a powerful evolutionary searching technique that is used successfully to solve and optimize problems in different research areas. Genetic Algorithm (GA) considered as one of optimization methods used to solve Travel salesman Problem (TSP). The feasibility of GA in finding a TSP solution is dependent on GA operators; encoding method, population size, termination criteria, in general. In specific, crossover and its probability play a significant role in finding possible solutions for Symmetric TSP (STSP). In addition, the crossover should be determined and enhanced in term reaching optimal or at least near optimal. In this paper, we spot the light on using a modified crossover method called modified sequential constructive crossover and its impact on reaching optimal solution. To justify the relevance of a parameter value in solving the TSP, a set comparative analysis conducted on different crossover methods values.Keywords: genetic algorithm, crossover, mutation, TSP
Procedia PDF Downloads 2315020 Improved Artificial Bee Colony Algorithm for Non-Convex Economic Power Dispatch Problem
Authors: Badr M. Alshammari, T. Guesmi
Abstract:
This study presents a modified version of the artificial bee colony (ABC) algorithm by including a local search technique for solving the non-convex economic power dispatch problem. The local search step is incorporated at the end of each iteration. Total system losses, valve-point loading effects and prohibited operating zones have been incorporated in the problem formulation. Thus, the problem becomes highly nonlinear and with discontinuous objective function. The proposed technique is validated using an IEEE benchmark system with ten thermal units. Simulation results demonstrate that the proposed optimization algorithm has better convergence characteristics in comparison with the original ABC algorithm.Keywords: economic power dispatch, artificial bee colony, valve-point loading effects, prohibited operating zones
Procedia PDF Downloads 2615019 Emergency Condition Discrimination for Single People Using a CO2 Sensor and Body Detectors
Authors: Taiyo Matsumura, Kota Funabashi, Nobumichi Sakai, Takashi Ono
Abstract:
The purpose of this research is to construct a watching system that monitors human activity in a room and detects abnormalities at an early stage to prevent unattended deaths of people living alone. In this article, we propose a method whereby highly urgent abnormal conditions of a person are determined by changes in the concentration of CO2 generated from activity and respiration in a room. We also discussed the effects the amount of activity has on the determination. The results showed that this discrimination method is not dependent on the amount of activity and is effective in judging highly urgent abnormal conditions.Keywords: abnormal conditions, multiple sensors, people living alone, respiratory arrest, unattended death, watching system
Procedia PDF Downloads 1405018 Dynamic Analysis of Offshore 2-HUS/U Parallel Platform
Authors: Xie Kefeng, Zhang He
Abstract:
For the stability and control demand of offshore small floating platform, a 2-HUS/U parallel mechanism was presented as offshore platform. Inverse kinematics was obtained by institutional constraint equation, and the dynamic model of offshore 2-HUS/U parallel platform was derived based on rigid body’s Lagrangian method. The equivalent moment of inertia, damping and driving force/torque variation of offshore 2-HUS/U parallel platform were analyzed. A numerical example shows that, for parallel platform of given motion, system’s equivalent inertia changes 1.25 times maximally. During the movement of platform, they change dramatically with the system configuration and have coupling characteristics. The maximum equivalent drive torque is 800 N. At the same time, the curve of platform’s driving force/torque is smooth and has good sine features. The control system needs to be adjusted according to kinetic equation during stability and control and it provides a basis for the optimization of control system.Keywords: 2-HUS/U platform, dynamics, Lagrange, parallel platform
Procedia PDF Downloads 3505017 Practical Aspects Pertaining to the Selection of Size and Location of Source Substations in an Oil Field
Authors: Yadavalli Venkata Sridhar
Abstract:
Finalization of Substation sizing and location is an important task to be carried out by electrical designers in an oil field. Practical issues influence the selection of size and location of the source substations that feed multiple production facilities are listed. Importance of selection of appropriately rated short circuit level for 11KV switchboards and constraints pertaining to availability of manufacturers are highlighted. Without being lost in the research of absolute optimum solution, under time constraints, the importance of practical approach is brought out. Focus on identifying near optimum solutions by process of elimination of unfeasible substation locations with the support of cost figures, is emphasized through a case study.Keywords: substation, size, location, oil field
Procedia PDF Downloads 6685016 The Predictors of Student Engagement: Instructional Support vs Emotional Support
Authors: Tahani Salman Alangari
Abstract:
Student success can be impacted by internal factors such as their emotional well-being and external factors such as organizational support and instructional support in the classroom. This study is to identify at least one factor that forecasts student engagement. It is a cross-sectional, conducted on 6206 teachers and encompassed three years of data collection and observations of math instruction in approximately 50 schools and 300 classrooms. A multiple linear regression revealed that a model predicting student engagement from emotional support, classroom organization, and instructional support was significant. Four linear regression models were tested using hierarchical regression to examine the effects of independent variables: emotional support was the highest predictor of student engagement while instructional support was the lowest.Keywords: student engagement, emotional support, organizational support, instructional support, well-being
Procedia PDF Downloads 865015 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 1585014 Formulation and Evaluation of Dispersible Tablet of Furosemide for Pediatric Use
Authors: O. Benaziz, A. Dorbane, S. Djeraba
Abstract:
The objective of this work is to formulate a dry dispersible form of furosemide in the context of pediatric dose adjustment. To achieve this, we have produced a set of formulas that will be tested in process and after compression. The formula with the best results will be improved to optimize the final shape of the product. Furosemide is the most widely used pediatric diuretic because of its low toxicity. The manufacturing process was chosen taking into account all the data relating to the active ingredient and the excipients used and complying with the specifications and requirements of dispersible tablets. The process used to prepare these tablets was wet granulation. Different excipients were used: lactose, maize starch, magnesium stearate and two superdisintegrants. The mode of incorporation of super-disintegrant changes with each formula. The use of super-disintegrant in the formula allowed optimization of the disintegration time. Prepared tablets were evaluated for weight, content uniformity, hardness, disintegration time, friability and in vitro dissolution test.Keywords: formulation, dispersible tablets, wet granulation, superdisintegrants, disintegration
Procedia PDF Downloads 3485013 Addressing the Oracle Problem: Decentralized Authentication in Blockchain-Based Green Hydrogen Certification
Authors: Volker Wannack
Abstract:
The aim of this paper is to present a concept for addressing the Oracle Problem in the context of hydrogen production using renewable energy sources. The proposed approach relies on the authentication of the electricity used for hydrogen production by multiple surrounding actors with similar electricity generation facilities, which attest to the authenticity of the electricity production. The concept introduces an Authenticity Score assigned to each certificate, as well as a Trust Score assigned to each witness. Each certificate must be attested by different actors with a sufficient Trust Score to achieve an Authenticity Score above a predefined threshold, thereby demonstrating that the produced hydrogen is indeed "green."Keywords: hydrogen, blockchain, sustainability, structural change
Procedia PDF Downloads 705012 Adaptive Few-Shot Deep Metric Learning
Authors: Wentian Shi, Daming Shi, Maysam Orouskhani, Feng Tian
Abstract:
Whereas currently the most prevalent deep learning methods require a large amount of data for training, few-shot learning tries to learn a model from limited data without extensive retraining. In this paper, we present a loss function based on triplet loss for solving few-shot problem using metric based learning. Instead of setting the margin distance in triplet loss as a constant number empirically, we propose an adaptive margin distance strategy to obtain the appropriate margin distance automatically. We implement the strategy in the deep siamese network for deep metric embedding, by utilizing an optimization approach by penalizing the worst case and rewarding the best. Our experiments on image recognition and co-segmentation model demonstrate that using our proposed triplet loss with adaptive margin distance can significantly improve the performance.Keywords: few-shot learning, triplet network, adaptive margin, deep learning
Procedia PDF Downloads 1745011 Planning for Location and Distribution of Regional Facilities Using Central Place Theory and Location-Allocation Model
Authors: Danjuma Bawa
Abstract:
This paper aimed at exploring the capabilities of Location-Allocation model in complementing the strides of the existing physical planning models in the location and distribution of facilities for regional consumption. The paper was designed to provide a blueprint to the Nigerian government and other donor agencies especially the Fertilizer Distribution Initiative (FDI) by the federal government for the revitalization of the terrorism ravaged regions. Theoretical underpinnings of central place theory related to spatial distribution, interrelationships, and threshold prerequisites were reviewed. The study showcased how Location-Allocation Model (L-AM) alongside Central Place Theory (CPT) was applied in Geographic Information System (GIS) environment to; map and analyze the spatial distribution of settlements; exploit their physical and economic interrelationships, and to explore their hierarchical and opportunistic influences. The study was purely spatial qualitative research which largely used secondary data such as; spatial location and distribution of settlements, population figures of settlements, network of roads linking them and other landform features. These were sourced from government ministries and open source consortium. GIS was used as a tool for processing and analyzing such spatial features within the dictum of CPT and L-AM to produce a comprehensive spatial digital plan for equitable and judicious location and distribution of fertilizer deports in the study area in an optimal way. Population threshold was used as yardstick for selecting suitable settlements that could stand as service centers to other hinterlands; this was accomplished using the query syntax in ArcMapTM. ArcGISTM’ network analyst was used in conducting location-allocation analysis for apportioning of groups of settlements around such service centers within a given threshold distance. Most of the techniques and models ever used by utility planners have been centered on straight distance to settlements using Euclidean distances. Such models neglect impedance cutoffs and the routing capabilities of networks. CPT and L-AM take into consideration both the influential characteristics of settlements and their routing connectivity. The study was undertaken in two terrorism ravaged Local Government Areas of Adamawa state. Four (4) existing depots in the study area were identified. 20 more depots in 20 villages were proposed using suitability analysis. Out of the 300 settlements mapped in the study area about 280 of such settlements where optimally grouped and allocated to the selected service centers respectfully within 2km impedance cutoff. This study complements the giant strides by the federal government of Nigeria by providing a blueprint for ensuring proper distribution of these public goods in the spirit of bringing succor to these terrorism ravaged populace. This will ardently at the same time help in boosting agricultural activities thereby lowering food shortage and raising per capita income as espoused by the government.Keywords: central place theory, GIS, location-allocation, network analysis, urban and regional planning, welfare economics
Procedia PDF Downloads 1505010 Machine Learning Approach for Lateralization of Temporal Lobe Epilepsy
Authors: Samira-Sadat JamaliDinan, Haidar Almohri, Mohammad-Reza Nazem-Zadeh
Abstract:
Lateralization of temporal lobe epilepsy (TLE) is very important for positive surgical outcomes. We propose a machine learning framework to ultimately identify the epileptogenic hemisphere for temporal lobe epilepsy (TLE) cases using magnetoencephalography (MEG) coherence source imaging (CSI) and diffusion tensor imaging (DTI). Unlike most studies that use classification algorithms, we propose an effective clustering approach to distinguish between normal and TLE cases. We apply the famous Minkowski weighted K-Means (MWK-Means) technique as the clustering framework. To overcome the problem of poor initialization of K-Means, we use particle swarm optimization (PSO) to effectively select the initial centroids of clusters prior to applying MWK-Means. We demonstrate that compared to K-means and MWK-means independently, this approach is able to improve the result of a benchmark data set.Keywords: temporal lobe epilepsy, machine learning, clustering, magnetoencephalography
Procedia PDF Downloads 1625009 The Russian Preposition 'за': A Cognitive Linguistic Approach
Authors: M. Kalyuga
Abstract:
Prepositions have long been considered to be one of the major challenges for second language learners, since they have multiple uses that differ greatly from one language to another. The traditional approach to second language teaching supplies students with a list of uses of a preposition that they have to memorise and no explanation is provided. Contrary to the traditional grammar approach, the cognitive linguistic approach offers an explanation for the use of prepositions and provides strategies to comprehend and learn prepositions that would be otherwise seem obscure. The present paper demonstrates the use of the cognitive approach for the explanation of prepositions through the example of the Russian preposition 'за'. The paper demonstrates how various spatial and non-spatial uses of this preposition are linked together through metaphorical and metonymical mapping. The diversity of expressions with за is explained by the range of spatial scenes this preposition is associated with.Keywords: language teaching, Russian, preposition 'за', cognitive approach
Procedia PDF Downloads 4585008 Using Multi-Arm Bandits to Optimize Game Play Metrics and Effective Game Design
Authors: Kenny Raharjo, Ramon Lawrence
Abstract:
Game designers have the challenging task of building games that engage players to spend their time and money on the game. There are an infinite number of game variations and design choices, and it is hard to systematically determine game design choices that will have positive experiences for players. In this work, we demonstrate how multi-arm bandits can be used to automatically explore game design variations to achieve improved player metrics. The advantage of multi-arm bandits is that they allow for continuous experimentation and variation, intrinsically converge to the best solution, and require no special infrastructure to use beyond allowing minor game variations to be deployed to users for evaluation. A user study confirms that applying multi-arm bandits was successful in determining the preferred game variation with highest play time metrics and can be a useful technique in a game designer's toolkit.Keywords: game design, multi-arm bandit, design exploration and data mining, player metric optimization and analytics
Procedia PDF Downloads 5145007 Evaluation of Reliability, Availability and Maintainability for Automotive Manufacturing Process
Authors: Hamzeh Soltanali, Abbas Rohani, A. H. S. Garmabaki, Mohammad Hossein Abbaspour-Fard, Adithya Thaduri
Abstract:
Toward continuous innovation and high complexity of technological systems, the automotive manufacturing industry is also under pressure to implement adequate management strategies regarding availability and productivity. In this context, evaluation of system’s performance by considering reliability, availability and maintainability (RAM) methodologies can constitute for resilient operation, identifying the bottlenecks of manufacturing process and optimization of maintenance actions. In this paper, RAM parameters are evaluated for improving the operational performance of the fluid filling process. To evaluate the RAM factors through the behavior of states defined for such process, a systematic decision framework was developed. The results of RAM analysis revealed that that the improving reliability and maintainability of main bottlenecks for each filling workstation need to be considered as a priority. The results could be useful to improve operational performance and sustainability of production process.Keywords: automotive, performance, reliability, RAM, fluid filling process
Procedia PDF Downloads 3575006 Effectiveness of Traditional Chinese Medicine in the Treatment of Eczema: A Systematic Review and Meta-Analysis Based on Eczema Area and Severity Index Score
Authors: Oliver Chunho Ma, Tszying Chang
Abstract:
Background: Traditional Chinese Medicine (TCM) has been widely used in the treatment of eczema. However, there is currently a lack of comprehensive research on the overall effectiveness of TCM in treating eczema, particularly using the Eczema Area and Severity Index (EASI) score as an evaluation tool. Meta-analysis can integrate the results of multiple studies to provide more convincing evidence. Objective: To conduct a systematic review and meta-analysis based on the EASI score to evaluate the overall effectiveness of TCM in the treatment of eczema. Specifically, the study will review and analyze published clinical studies that investigate TCM treatments for eczema and use the EASI score as an outcome measure, comparing the differences in improving the severity of eczema between TCM and other treatment modalities, such as conventional Western medicine treatments. Methods: Relevant studies, including randomized controlled trials (RCTs) and non-randomized controlled trials, that involve TCM treatment for eczema and use the EASI score as an outcome measure will be searched in medical literature databases such as PubMed, CNKI, etc. Relevant data will be extracted from the selected studies, including study design, sample size, treatment methods, improvement in EASI score, etc. The methodological quality and risk of bias of the included studies will be assessed using appropriate evaluation tools (such as the Cochrane Handbook). The results of the selected studies will be statistically analyzed, including pooling effect sizes (such as standardized mean differences, relative risks, etc.), subgroup analysis (e.g., different TCM syndromes, different treatment modalities), and sensitivity analysis (e.g., excluding low-quality studies). Based on the results of the statistical analysis and quality assessment, the overall effectiveness of TCM in improving the severity of eczema will be interpreted. Expected outcomes: By integrating the results of multiple studies, we expect to provide more convincing evidence regarding the specific effects of TCM in improving the severity of eczema. Additionally, subgroup analysis and sensitivity analysis can further elucidate whether the effectiveness of TCM treatment is influenced by different factors. Besides, we will compare the results of the meta-analysis with the clinical data from our clinic. For both the clinical data and the meta-analysis results, we will perform descriptive statistics such as means, standard deviations, percentages, etc. and compare the differences between the two using statistical tests such as independent samples t-test or non-parametric tests to assess the statistical differences between them.Keywords: Eczema, traditional Chinese medicine, EASI, systematic review, meta-analysis
Procedia PDF Downloads 625005 The Performance of Modern Eugenics: Ballroom of the Skies as a Method of Understanding American Social Eugenics
Authors: Michael Stokes
Abstract:
Using a disability studies approach, this paper analyzes the American science fiction novel Ballroom of the Skies as way to address and access narratives of American exceptionalism in relation to global struggle. Combined with a critical race studies analysis of identity and cultural practice, this essay seeks to find parallels between the treatment of disability and the treatment of the racialized body in literature to forcibly reread potential for multiple assemblages of identity in the speculated futures of science fiction. Thinking through this relationship, the essay constructs a thematic understanding of social eugenics as practiced in American culture.Keywords: disability studies, science fiction, eugenics, cultural studies
Procedia PDF Downloads 2555004 ACBM: Attention-Based CNN and Bi-LSTM Model for Continuous Identity Authentication
Authors: Rui Mao, Heming Ji, Xiaoyu Wang
Abstract:
Keystroke dynamics are widely used in identity recognition. It has the advantage that the individual typing rhythm is difficult to imitate. It also supports continuous authentication through the keyboard without extra devices. The existing keystroke dynamics authentication methods based on machine learning have a drawback in supporting relatively complex scenarios with massive data. There are drawbacks to both feature extraction and model optimization in these methods. To overcome the above weakness, an authentication model of keystroke dynamics based on deep learning is proposed. The model uses feature vectors formed by keystroke content and keystroke time. It ensures efficient continuous authentication by cooperating attention mechanisms with the combination of CNN and Bi-LSTM. The model has been tested with Open Data Buffalo dataset, and the result shows that the FRR is 3.09%, FAR is 3.03%, and EER is 4.23%. This proves that the model is efficient and accurate on continuous authentication.Keywords: keystroke dynamics, identity authentication, deep learning, CNN, LSTM
Procedia PDF Downloads 1625003 Buckling Analysis of Composite Shells under Compression and Torsional Loads: Numerical and Analytical Study
Authors: Güneş Aydın, Razi Kalantari Osgouei, Murat Emre Öztürk, Ahmad Partovi Meran, Ekrem Tüfekçi
Abstract:
Advanced lightweight laminated composite shells are increasingly being used in all types of modern structures, for enhancing their structural efficiency and performance. Such thin-walled structures are susceptible to buckling when subjected to various loading. This paper focuses on the buckling of cylindrical shells under axial compression and torsional loads. Effects of fiber orientation on the maximum buckling load of carbon fiber reinforced polymer (CFRP) shells are optimized. Optimum fiber angles have been calculated analytically by using MATLAB program. Numerical models have been carried out by using Finite Element Method program ABAQUS. Results from analytical and numerical analyses are also compared.Keywords: buckling, composite, cylindrical shell, finite element, compression, torsion, MATLAB, optimization
Procedia PDF Downloads 5915002 An Unusual Case of Extensive, Unilateral, Idiopathic Dental Resorption
Authors: Ceri McIntosh
Abstract:
A 25-year-old male was referred to the Maxillofacial department by his general dental practitioner with a complaint of mobile teeth. Medically he was well though he took mirtazapine for anxiety. He was found to have had previous extractions of the lower right second premolar and first molar, with grade 2 mobility of the upper right first and second molars and lower right lateral incisor. Radiographically there was significant external root resorption of these teeth, which were subsequently extracted. Over the next 18 months, the resorption continued around multiple teeth on the right side, and when the mobile teeth were removed, they showed no remaining root, including loss of coronal dentine, leaving only an enamel shell. No cause has been identified either histologically or in the patient’s blood work. A review of relevant literature will be included in this case report.Keywords: case report, idiopathic resorption, idiopathic root resorption, external resorption
Procedia PDF Downloads 835001 Substrate Coupling in Millimeter Wave Frequencies
Authors: Vasileios Gerakis, Fontounasios Christos, Alkis Hatzopoulos
Abstract:
A study of the impact of metal guard rings on the coupling between two square metal pads is presented. The structure is designed over a bulk silicon substrate with epitaxial layer, so the coupling through the substrate is also involved. A lightly doped profile is adopted and is simulated by means of an electromagnetic simulator for various pad distances and different metal layers, assuming a 65 nm bulk CMOS technology. The impact of various guard ring design (geometrical) parameters is examined. Furthermore, the increase of isolation (resulting in reduction of the noise coupling) between the pads by cutting the ring, or by using multiple rings, is also analyzed. S parameters are used to compare the various structures.Keywords: guard rings, metal pad coupling, millimeter wave frequencies, substrate noise,
Procedia PDF Downloads 5455000 The Unique Journeys from Different Pasts to Multiple Presents in the Work of the Pritzker Prize Laureates of 2010-2020
Authors: Christakis Chatzichristou Kyriakos Miltiadou, Konstantinos Gounaridis
Abstract:
The paper discusses how the Pritzker Prize Laureates of the last decade themselves identify the various ways different aspects or interpretations of the past have influenced their design methodologies. As the recipients of what is considered to be the most prestigious award in architecture, these architects are worth examining not only because of their exemplary work but also because of the strong influence they have on architectural culture in general. Rather than attempting to interpret their projects, the methodology chosen focuses on what the architects themselves have to say on the subject. The research aims at, and, as the tabular form of the findings shows, also succeeds in revealing the numerous and diverse ways different aspects of what is termed as the Past can potentially enrich contemporary design practices.Keywords: design methodology, Pritzker Prize Laureates, past, culture, tradition
Procedia PDF Downloads 514999 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 414998 Trauma inside and Out: A Descriptive Cross-Sectional Study of Family, Community and Psychological Wellbeing amongst Pediatric Victims of Interpersonal Violence
Authors: Mary Bernardin, Margie Batek, Joseph Moen, David Schnadower
Abstract:
Background: Exposure to violence not only has negative psychological impact on children but is a risk factor for children becoming recurrent victims of violence. However, little is known regarding the degree to which child victims of violence are exposed to trauma at home and in their community, or its association with specific psychological diagnoses. Objective: The aims of this study were to perform in-depth characterizations of family, community and psychological wellness amongst pediatric victims of interpersonal violence. Methods: As standard of care at the Saint Louis Children’s Hospital pediatric emergency department (ED), social workers perform in-depth interviews with all children presenting due to violent interpersonal encounters. In this retrospective cross-sectional study, we collected data from social work interviews on family structure, exposure to violence in the community and the home, as well as history of psychological diagnoses amongst children ages 8-19 years who presented to the ED for injuries related to interpersonal violence from 2014-2017. Results: A total of 407 patients presenting to the ED for an interpersonal violent encounter were analyzed. The average age of studied youths was 14.7 years (SD 2.5). Youths were 97.5% African American ethnicity and 66.6% male. 67.8% described their home having a nonnuclear family structure, 50% of which reported living with a single mother. Of the 21% who reported having incarcerated family members, 56.3% reported their father being incarcerated, 15% reported their mother being incarcerated, and 12.5% reported multiple family members being incarcerated. 11.3% reported witnessing domestic violence in their home. 12.8% of youths reported some form of child abuse. The type of child abuse was not specified in 29.3% of cases, but physical abuse (32.8%) followed by sexual abuse (22.4%) were the most commonly reported. 14.5% had history of placement in foster care and/or adoption. 64% reported having witnessed violence in their community. 30.2% reported having lost friends or family due to violence, and of those, 26.4% reported the loss of a cousin, 18.9% the loss of a friend, 16% the loss of their father, and 12.3% the loss of their brother due to violence. Of the 22.4% youths with psychiatric diagnose(s), 48.4% had multiple diagnoses, the most common of which were ADD/ADHD (62.6%), followed by depression (31.9%), bipolar disorder (27.5%) and anxiety (15.4%). Conclusions: A remarkable proportion of children presenting to EDs due to interpersonal violence have a history of exposure to instability and violence in their homes and communities. Additionally, psychological diagnoses are frequent among pediatric victims of violence. More research is needed to better understand the association between trauma exposure, psychological health and violent victimization amongst children.Keywords: community violence, emergency department, pediatric interpersonal violence, pediatric trauma, psychological effects of trauma
Procedia PDF Downloads 2404997 A Data Envelopment Analysis Model in a Multi-Objective Optimization with Fuzzy Environment
Authors: Michael Gidey Gebru
Abstract:
Most of Data Envelopment Analysis models operate in a static environment with input and output parameters that are chosen by deterministic data. However, due to ambiguity brought on shifting market conditions, input and output data are not always precisely gathered in real-world scenarios. Fuzzy numbers can be used to address this kind of ambiguity in input and output data. Therefore, this work aims to expand crisp Data Envelopment Analysis into Data Envelopment Analysis with fuzzy environment. In this study, the input and output data are regarded as fuzzy triangular numbers. Then, the Data Envelopment Analysis model with fuzzy environment is solved using a multi-objective method to gauge the Decision Making Units' efficiency. Finally, the developed Data Envelopment Analysis model is illustrated with an application on real data 50 educational institutions.Keywords: efficiency, Data Envelopment Analysis, fuzzy, higher education, input, output
Procedia PDF Downloads 684996 Examining the Mediating and Moderating Role of Relationships in the Association between Poverty and Children’s Subjective Well-Being
Authors: Esther Yin-Nei Cho
Abstract:
There is inconsistency among studies about whether there is an association between poverty and the subjective wellbeing of children. Some have found a positive association, though its magnitude could be limited, others have shown no association. One possible explanation for this inconsistency is that household income, an often-adopted measure of child poverty, may not accurately and stably reflect the actual life experience of children. Some studies have suggested, however, that material deprivation covering various dimensions of children’s lives could be a better measure of child poverty. Another possible explanation for the inconsistency is that the link between poverty and subjective wellbeing of children may not be that straightforward, as there could be underlying mechanisms, such as mediation and moderation, influencing its direction or strength. While a mediator refers to the mechanism through which an independent variable affects a dependent variable, a moderator changes the direction or strength of the relationship between an independent variable and a dependent variable. As suggested by empirical evidence, family relationships and friendships could be potential mediators or moderators of the link between poverty and subjective well-being: poverty affects relationships; relationships are an important element in children’s subjective well-being; and economic status affects child outcomes, though not necessarily subjective wellbeing, through relationships. Since the potential links have not been adequately understood, this study fills this gap by examining the possible role of family relationships and friendships as mediators or moderators between poverty (using child-derived material deprivation as measure) and the subjective wellbeing of children. Improving subjective wellbeing is increasingly considered as a policy goal. The finding of no or a limited association between poverty and subjective wellbeing of children could be a justification for less effort to improve poverty in this regard. But if the observed magnitude of that association is due to some underlying mechanisms at work, the effect of poverty may be underestimated and the potentially useful strategies that take into account both poverty and other mediators or moderators for improving children’s subjective well-being may be overlooked. Multiple mediation, and multiple moderation models, based on regression analyses, are performed to a sample of approximately 1,600 children, who are aged 10 to 15, from the wellbeing survey conducted by The Children’s Society in England from 2010 to 2011. Results show that the effect of children’s material deprivation on their subjective well-being is mediated by their family relationships and friendships. Moreover, family relationships are a significant moderator. It is found that the negative impact of child deprivation on subjective wellbeing could be exacerbated if family relationships are not going well, while good family relationships may prevent the further decline in subjective well-being. Policy implications of the findings are discussed. In particular, policy measures that focus on strengthening the family relationships or nurturing home environment through supporting household’s economic security and parental time with children could promote the subjective wellbeing of children.Keywords: child poverty, mediation, moderation, subjective well-being of children
Procedia PDF Downloads 3334995 Women's Contemporary Dystopias: Feminist Protagonists Taking Back Control
Authors: Natalia Fontes De Oliveira
Abstract:
The Canadian author Margaret Atwood deconstructs the tainted dichotomies between women and men by embracing the disorder throughout her dystopias. In Atwood’s The Testaments, nature can be seen as a background to the story as well as a metaphorical expression of the characters’ state of mind, nevertheless, the protagonists’ nature writing portrays conveys a curiosity to the pre-established sanctions of a docile garden, viewing nature as an autonomous entity, especially when they are away from the confinements of Gilead’s regime. The three narrating protagonists, Agnes, Aunt Lydia, and Nicole, use nature writing subversively as a form of rebellion. This paper investigates how the three protagonists narrate nature through an intimist point of view, with sensibility to observe the multiple relationships among humanity, nature, and the impositions of a theocratic ultra conservative patriarchal society.Keywords: contemporary literature, dystopias, feminism, women’s writing
Procedia PDF Downloads 1754994 Meso-Scopic Structural Analysis of Chaura Thrust, Himachal Pradesh, India
Authors: Rajkumar Ghosh
Abstract:
Jhakri Thrust (JT) coeval of Sarahan Thrust (ST) was later considered to be part of Chaura Thrust (CT). The Main Central Thrust (MCT) delimits the southern extreme of Higher Himalaya, whereas the northern boundary defines by South Tibetan Detachment System (STDS). STDS is parallel set of north dipping extensional faults. The activation timing of MCT and STDS. MCT activated in two parts (MCT-L during 15- 0.7 Ma, and MCT-U during 25-14 Ma). Similarly, STDS triggered in two parts (STDS-L during 24-12 Ma, and STDS-U during 19-14 Ma). The activation ages for MBT and MFT. Besides, the MBT occurred during 11-9 Ma, and MFT followed as <2.5 Ma. There are two mylonitised zones (zone of S-C fabric) found under the microscope. Dynamic and bulging recrystallization and sub-grain formation was documented under the optical microscope from samples collected from these zones. The varieties of crenulated schistosity are shown in photomicrographs. In a rare and uncommon case, crenulation cleavage and sigmoid Muscovite were found together side-by-side. Recrystallized quartzo-feldspathic grains exist in between crenulation cleavages. These thin-section studies allow three possible hypotheses for such variations in crenulation cleavages. S/SE verging meso- and micro-scale box folds around Chaura might be a manifestation of some structural upliftment. Near Chaura, kink folds are visible. Prominent asymmetric shear sense indicators in augen mylonite are missing in meso-scale but dominantly present under the microscope. The main foliation became steepest (range of dip ~ 65 – 80 º) at this place. The aim of this section is to characterize the box fold and its signature in the regional geology of Himachal Himalaya. Grain Boundary Migration (GBM) associated temperature range (400–750 ºC) from microstructural studies in grain scale along Jhakri-Wangtu transect documented. Oriented samples were collected from the Jhakri-Chaura transect at a regular interval of ~ 1km for strain analysis. The Higher Himalayan Out-of-Sequence Thrust (OOST) in Himachal Pradesh is documented a decade ago. The OOST in other parts of the Himalayas is represented as a line in between MCTL and MCTU. But In Himachal Pradesh area, OOST activated the MCTL as well as in between a zone located south of MCTU. The expectations for strain variation near the OOST are very obvious. But multiple sets of OOSTs may produce a zigzag pattern of strain accumulation for this area and figure out the overprinting structures for multiple sets of OOSTs.Keywords: Chaura Thrust, out-of-sequence thrust, Main Central Thrust, Sarahan Thrust
Procedia PDF Downloads 824993 Comparison of Acid and Base Pretreatment of Switchgrass (Panicum virgatum L.) for Bioethanol Production
Authors: Mustafa Ümi̇t Ünal, Nafi̇z Çeli̇ktaş, Aysun Şener, Sara Betül Dolgun, Duygu Keser
Abstract:
The aim of this study was to compare acid and base pretreatment of switchgrass for bioethanol production. Switchgrass was pretreated with sulfuric acid and sodium hydroxide at 0.5, 1.0 and 1.5% (v/v) at 120, 140, 180 °C for 10, 60 and 90. Optimization of enzymatic hydrolysis of the pretreated switchgrass samples were carried out using three different enzyme mixtures (22.5 mg cellulase and 75 mg cellobiase /g biomass; 45 mg cellulase and 150 mg cellobiase /g biomass; 90 mg cellulase and 300 mg cellobiase /g biomass). Samples were removed at 24-h interval for fermentable sugar analyses with HPLC. The results showed that use of 90 mg cellulase and 300 mg cellobiase/g biomass resulted in the highest fermentable sugar formation. Furthermore, the highest fermentable sugar yield was obtained by pretreatment at 120 °C for 10 min using 1.0 % sodium hydroxide.Keywords: switchgrass, acid pretreatment, enzymatic hydrolysis, base pretreatment, ethanol production
Procedia PDF Downloads 537