Search results for: Hill Cipher
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 166

Search results for: Hill Cipher

106 Vegetation Assessment Under the Influence of Environmental Variables; A Case Study from the Yakhtangay Hill of Himalayan Range, Pakistan

Authors: Hameed Ullah, Shujaul Mulk Khan, Zahid Ullah, Zeeshan Ahmad Sadia Jahangir, Abdullah, Amin Ur Rahman, Muhammad Suliman, Dost Muhammad

Abstract:

The interrelationship between vegetation and abiotic variables inside an ecosystem is one of the main jobs of plant scientists. This study was designed to investigate the vegetation structure and species diversity along with the environmental variables in the Yakhtangay hill district Shangla of the Himalayan Mountain series Pakistan by using multivariate statistical analysis. Quadrat’s method was used and a total of 171 Quadrats were laid down 57 for Tree, Shrubs and Herbs, respectively, to analyze the phytosociological attributes of the vegetation. The vegetation of the selected area was classified into different Life and leaf-forms according to Raunkiaer classification, while PCORD software version 5 was used to classify the vegetation into different plants communities by Two-way indicator species Analysis (TWINSPAN). The CANOCCO version 4.5 was used for DCA and CCA analysis to find out variation directories of vegetation with different environmental variables. A total of 114 plants species belonging to 45 different families was investigated inside the area. The Rosaceae (12 species) was the dominant family followed by Poaceae (10 species) and then Asteraceae (7 species). Monocots were more dominant than Dicots and Angiosperms were more dominant than Gymnosperms. Among the life forms the Hemicryptophytes and Nanophanerophytes were dominant, followed by Therophytes, while among the leaf forms Microphylls were dominant, followed by Leptophylls. It is concluded that among the edaphic factors such as soil pH, the concentration of soil organic matter, Calcium Carbonates concentration in soil, soil EC, soil TDS, and physiographic factors such as Altitude and slope are affecting the structure of vegetation, species composition and species diversity at the significant level with p-value ≤0.05. The Vegetation of the selected area was classified into four major plants communities and the indicator species for each community was recorded. Classification of plants into 4 different communities based upon edaphic gradients favors the individualistic hypothesis. Indicator Species Analysis (ISA) shows the indicators of the study area are mostly indicators to the Himalayan or moist temperate ecosystem, furthermore, these indicators could be considered for micro-habitat conservation and respective ecosystem management plans.

Keywords: species richness, edaphic gradients, canonical correspondence analysis (CCA), TWCA

Procedia PDF Downloads 115
105 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher

Authors: M. F. Haroun, T. A. Gulliver

Abstract:

In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.

Keywords: chaotic systems, image encryption, non-autonomous modulation, FPGA

Procedia PDF Downloads 482
104 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 658
103 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography

Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo

Abstract:

Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.

Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding

Procedia PDF Downloads 172
102 Some Aspects on Formation Initialization and Its Maintenance of Leo Satellites

Authors: Y. Johnson

Abstract:

Study of multi-satellite formation flight systems has drawn wide attention recently due to so many potential advantages. The present work aims to model the relative motion dynamics in terms of change in classical orbital parameters between the two satellites-chief and deputy- under Earth’s oblateness effect. The required impulsive thrust control is calculated to minimize these orbital parameter changes. The formation configuration is initialized by selecting a set of orbital parameters for the chief and deputy satellites such that bounded motion is maintained for a long time in a J_2-invariant relative non-circular orbit between the satellites. The solution of J_2-modified Hill’s equations is also derived in this paper.

Keywords: satellite, formation flight, j2 effect, control

Procedia PDF Downloads 246
101 Social Media Use and Exercise Behaviors

Authors: Justin M. Swanson, Anna Nelson, Daniel Handysides, Patti Herring, Christopher Hill

Abstract:

Not only may social media use have a psychological impact, but increased use may be tied to decreases in physical activity and influencing sedentary behaviors. Social media can be used to share physically active lifestyles and possibly influence others to participate. In contrast, social media use may have adverse effects by decreasing participation in exercise. This study used a qualitative design to examine the relationship between social media use and exercise patterns. Participants were asked questions about their social media habits and how it might impact their physical activity behaviors. Self-reported exercise seemed to increase after viewing others engage in relatable activities or viewing someone that has overcame challenges. To increase the likelihood of engaging in exercise, exercise related posts should be low in difficulty, require few materials, or displayed progress from the individual posting.

Keywords: social media, exercise, physical activity, adults

Procedia PDF Downloads 224
100 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 404
99 Impact of Boundary Conditions on the Behavior of Thin-Walled Laminated Column with L-Profile under Uniform Shortening

Authors: Jaroslaw Gawryluk, Andrzej Teter

Abstract:

Simply supported angle columns subjected to uniform shortening are tested. The experimental studies are conducted on a testing machine using additional Aramis and the acoustic emission system. The laminate samples are subjected to axial uniform shortening. The tested columns are loaded with the force values from zero to the maximal load destroying the L-shaped column, which allowed one to observe the column post-buckling behavior until its collapse. Laboratory tests are performed at a constant velocity of the cross-bar equal to 1 mm/min. In order to eliminate stress concentrations between sample and support, flexible pads are used. Analyzed samples are made with carbon-epoxy laminate using the autoclave method. The configurations of laminate layers are: [60,0₂,-60₂,60₃,-60₂,0₃,-60₂,0,60₂]T, where direction 0 is along the length of the profile. Material parameters of laminate are: Young’s modulus along the fiber direction - 170GPa, Young’s modulus along the fiber transverse direction - 7.6GPa, shear modulus in-plane - 3.52GPa, Poisson’s ratio in-plane - 0.36. The dimensions of all columns are: length-300 mm, thickness-0.81mm, width of the flanges-40mm. Next, two numerical models of the column with and without flexible pads are developed using the finite element method in Abaqus software. The L-profile laminate column is modeled using the S8R shell elements. The layup-ply technique is used to define the sequence of the laminate layers. However, the model of grips is made of the R3D4 discrete rigid elements. The flexible pad is consists of the C3D20R type solid elements. In order to estimate the moment of the first laminate layer damage, the following initiation criteria were applied: maximum stress criterion, Tsai-Hill, Tsai-Wu, Azzi-Tsai-Hill, and Hashin criteria. The best compliance of results was observed for the Hashin criterion. It was found that the use of the pad in the numerical model significantly influences the damage mechanism. The model without pads characterized a much more stiffness, as evidenced by a greater bifurcation load and damage initiation load in all analyzed criteria, lower shortening, and less deflection of the column in its center than the model with flexible pads. Acknowledgment: The project/research was financed in the framework of the project Lublin University of Technology-Regional Excellence Initiative, funded by the Polish Ministry of Science and Higher Education (contract no. 030/RID/2018/19).

Keywords: angle column, compression, experiment, FEM

Procedia PDF Downloads 179
98 Evaluation of Photovoltaic System with Different Research Methods of Maximum Power Point Tracking

Authors: Mehdi Ameur, Ahmed Essadki, Tamou Nasser

Abstract:

The purpose of this paper is the evaluation of photovoltaic system with MPPT techniques. This system is developed by combining the models of established solar module and DC-DC converter with the algorithms of perturbing and observing (P&O), incremental conductance (INC) and fuzzy logic controller (FLC). The system is simulated under different climate conditions and MPPT algorithms to determine the influence of these conditions on characteristic power-voltage of PV system. According to the comparisons of the simulation results, the photovoltaic system can extract the maximum power with precision and rapidity using the MPPT algorithms discussed in this paper.

Keywords: fuzzy logic controller, FLC, hill climbing, HC, incremental conductance (INC), perturb and observe (P&O), maximum power point, MPP, maximum power point tracking, MPPT

Procedia PDF Downloads 485
97 Development of a Human Vibration Model Considering Muscles and Stiffness of Intervertebral Discs

Authors: Young Nam Jo, Moon Jeong Kang, Hong Hee Yoo

Abstract:

Most human vibration models have been modeled as a multibody system consisting of some rigid bodies and spring-dampers. These models are developed for certain posture and conditions. So, the models cannot be used in vibration analysis in various posture and conditions. The purpose of this study is to develop a human vibration model that represent human vibration characteristics under various conditions by employing a musculoskeletal model. To do this, the human vibration model is developed based on biomechanical models. In addition, muscle models are employed instead of spring-dampers. Activations of muscles are controlled by PD controller to maintain body posture under vertical vibration is applied. Each gain value of the controller is obtained to minimize the difference of apparent mass and acceleration transmissibility between experim ent and analysis by using an optimization method.

Keywords: human vibration analysis, hill type muscle model, PD control, whole-body vibration

Procedia PDF Downloads 423
96 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security

Authors: James Andrew Fitzjohn

Abstract:

This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.

Keywords: quantum computing, encryption, RSA, roadmap, real world

Procedia PDF Downloads 96
95 Neutral Sugar Contents of Laurel-leaved and Cryptomeria japonica Forests

Authors: Ayuko Itsuki, Sachiyo Aburatani

Abstract:

Soil neutral sugar contents in Kasuga-yama Hill Primeval Forest (Nara, Japan) were examined using the Waksman’s approximation analysis to clarify relations with the neutral sugar constituted the soil organic matter and the microbial biomass. Samples were selected from the soil surrounding laurel-leaved (BB-1) and Carpinus japonica (BB-2) trees for analysis. The water and HCl soluble neutral sugars increased microbial biomass of the laurel-leaved forest soil. Arabinose, xylose, and galactose of the HCl soluble fraction were used immediately in comparison with other neutral sugars. Rhamnose, glucose, and fructose of the HCl soluble fraction were re-composed by the microbes.

Keywords: forest soil, neutral sugaras, soil organic matter, Waksman’s approximation analysis

Procedia PDF Downloads 281
94 Analysis and Modeling of Photovoltaic System with Different Research Methods of Maximum Power Point Tracking

Authors: Mehdi Ameur, Ahmed Essakdi, Tamou Nasser

Abstract:

The purpose of this paper is the analysis and modeling of the photovoltaic system with MPPT techniques. This system is developed by combining the models of established solar module and DC-DC converter with the algorithms of perturb and observe (P&O), incremental conductance (INC) and fuzzy logic controller(FLC). The system is simulated under different climate conditions and MPPT algorithms to determine the influence of these conditions on characteristic power-voltage of PV system. According to the comparisons of the simulation results, the photovoltaic system can extract the maximum power with precision and rapidity using the MPPT algorithms discussed in this paper.

Keywords: photovoltaic array, maximum power point tracking, MPPT, perturb and observe, P&O, incremental conductance, INC, hill climbing, HC, fuzzy logic controller, FLC

Procedia PDF Downloads 399
93 Soil Respiration Rate of Laurel-Leaved and Cryptomeria japonica Forests

Authors: Ayuko Itsuki, Sachiyo Aburatani

Abstract:

We assessed the ecology of the organic and mineral soil layers of laurel-leaved (BB-1) and Cryptomeria japonica (BB-2 and Pw) forests in the Kasugayama Hill Primeval Forest (Nara, Japan). The soil respiration rate was higher in the deeper horizons (F and H) of organic layers than in those of mineral soil layers, suggesting organic layers may be where active microbial metabolism occurs. Respiration rates in the soil of BB-1, BB-2 and Pw forests were closely similar at 5 and 10°C. However, the soil respiration rate increased in proportion to temperatures of 15°C or above. We therefore consider the activity of soil microorganisms to markedly decrease at temperatures below 10°C. At a temperature of 15°C or above, the soil respiration rate in the BB-1 organic layers was higher than in those of the BB-2 and Pw organic layers, due to differences in forest vegetation that appeared to influence several salient soil properties, particularly pH and the carbon (C) and nitrogen (N) content of the F and H horizons.

Keywords: forest soil, mineralization rate, heterotroph, soil respiration rate

Procedia PDF Downloads 305
92 Comparative Analysis of Soil Enzyme Activities between Laurel-Leaved and Cryptomeria japonica Forests

Authors: Ayuko Itsuki, Sachiyo Aburatani

Abstract:

Soil enzyme activities in Kasuga-yama Hill Primeval Forest (Nara, Japan) were examined to determine levels of mineralization and metabolism. Samples were selected from the soil surrounding laurel-leaved (BB-1) and Carpinus japonica (BB-2 and Pw) trees for analysis. Cellulase, β-xylosidase, and protease activities were higher in BB-1 samples those in BB-2 samples. These activity levels corresponded to the distribution of cellulose and hemicellulose in the soil horizons. Cellulase, β-xylosidase, and chymotrypsin activities were higher in soil from the Pw forest than in that from the BB-2 forest. The relationships between the soil enzymes calculated by Spearman’s rank correlation indicate that the interactions between enzymes in BB-2 samples were more complex than those in Pw samples.

Keywords: comparative analysis, enzyme activities, forest soil, Spearman's rank correlation

Procedia PDF Downloads 562
91 Statistical Randomness Testing of Some Second Round Candidate Algorithms of CAESAR Competition

Authors: Fatih Sulak, Betül A. Özdemir, Beyza Bozdemir

Abstract:

In order to improve symmetric key research, several competitions had been arranged by organizations like National Institute of Standards and Technology (NIST) and International Association for Cryptologic Research (IACR). In recent years, the importance of authenticated encryption has rapidly increased because of the necessity of simultaneously enabling integrity, confidentiality and authenticity. Therefore, at January 2013, IACR announced the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR Competition) which will select secure and efficient algorithms for authenticated encryption. Cryptographic algorithms are anticipated to behave like random mappings; hence, it is important to apply statistical randomness tests to the outputs of the algorithms. In this work, the statistical randomness tests in the NIST Test Suite and the other recently designed randomness tests are applied to six second round algorithms of the CAESAR Competition. It is observed that AEGIS achieves randomness after 3 rounds, Ascon permutation function achieves randomness after 1 round, Joltik encryption function achieves randomness after 9 rounds, Morus state update function achieves randomness after 3 rounds, Pi-cipher achieves randomness after 1 round, and Tiaoxin achieves randomness after 1 round.

Keywords: authenticated encryption, CAESAR competition, NIST test suite, statistical randomness tests

Procedia PDF Downloads 293
90 An Authentic Algorithm for Ciphering and Deciphering Called Latin Djokovic

Authors: Diogen Babuc

Abstract:

The question that is a motivation of writing is how many devote themselves to discovering something in the world of science where much is discerned and revealed, but at the same time, much is unknown. Methods: The insightful elements of this algorithm are the ciphering and deciphering algorithms of Playfair, Caesar, and Vigenère. Only a few of their main properties are taken and modified, with the aim of forming a specific functionality of the algorithm called Latin Djokovic. Specifically, a string is entered as input data. A key k is given, with a random value between the values a and b = a+3. The obtained value is stored in a variable with the aim of being constant during the run of the algorithm. In correlation to the given key, the string is divided into several groups of substrings, and each substring has a length of k characters. The next step involves encoding each substring from the list of existing substrings. Encoding is performed using the basis of Caesar algorithm, i.e., shifting with k characters. However, that k is incremented by 1 when moving to the next substring in that list. When the value of k becomes greater than b+1, it’ll return to its initial value. The algorithm is executed, following the same procedure, until the last substring in the list is traversed. Results: Using this polyalphabetic method, ciphering and deciphering of strings are achieved. The algorithm also works for a 100-character string. The x character isn’t used when the number of characters in a substring is incompatible with the expected length. The algorithm is simple to implement, but it’s questionable if it works better than the other methods from the point of view of execution time and storage space.

Keywords: ciphering, deciphering, authentic, algorithm, polyalphabetic cipher, random key, methods comparison

Procedia PDF Downloads 78
89 Analysis and Prediction of the Behavior of the Landslide at Ain El Hammam, Algeria Based on the Second Order Work Criterion

Authors: Zerarka Hizia, Akchiche Mustapha, Prunier Florent

Abstract:

The landslide of Ain El Hammam (AEH) is characterized by a complex geology and a high hydrogeology hazard. AEH's perpetual reactivation compels us to look closely at its triggers and to better understand the mechanisms of its evolution in mass and in depth. This study builds a numerical model to simulate the influencing factors such as precipitation, non-saturation, and pore pressure fluctuations, using Plaxis software. For a finer analysis of instabilities, we use Hill's criterion, based on the sign of the second order work, which is the most appropriate material stability criterion for non-associated elastoplastic materials. The results of this type of calculation allow us, in theory, to predict the shape and position of the slip surface(s) which are liable to ground movements of the slope, before reaching the rupture given by the plastic limit of Mohr Coulomb. To validate the numerical model, an analysis of inclinometer measures is performed to confirm the direction of movement and kinematic of the sliding mechanism of AEH’s slope.

Keywords: landslide, second order work, precipitation, inclinometers

Procedia PDF Downloads 146
88 Slope Stability Considering the Top Building Load

Authors: Micke Didit, Xiwen Zhang, Weidong Zhu

Abstract:

Slope stability is one of the most important subjects of geotechnics. The slope top-loading plays a key role in the stability of slopes in hill slope areas. Therefore, it is of great importance to study the relationship between the load and the stability of the slope. This study aims to analyze the influence of the building load applied on the top of the slope and deduces its effect on the slope stability. For this purpose, a three-dimensional slope model under different building loads with different distances to the slope shoulder was established using the finite-difference analysis software Flac3D. The results show that the loads applied at different distances on the top of the slope have different effects on the slope stability. The slope factor of safety (fos) increases with the increase of the distance between the top-loading and the slope shoulder, resulting in the decrease of the coincidence area between the load-deformation and the potential sliding surface. The slope is no longer affected by the potential risk of sliding at approximately 20 m away from the slope shoulder.

Keywords: building load, finite-difference analysis, FLAC3D software, slope factor of safety, slope stability

Procedia PDF Downloads 147
87 The School Threshold's Identity as a Place for Interaction: Research Project with the Participation of Elementary-School Children

Authors: Natalia Bazaiou

Abstract:

The school entrance is one of the most important places in the everyday lives of children. As an intersection between school and public realm of the city, it is characterized by gradations of porous and rigid boundaries. Depending on its function, it can serve as a threshold or as a boundary. Additionally, it is a spatial condition that facilitates a dialogue between the school and the city and draws content from both. School thresholds are important in supporting the role of the school as an important node in the city and a bridge between children's various everyday life dynamics by demonstrating prominent usage and meaning as a place that is open to the community as well as to possibilities and physical interaction. In this research, we examine the role of the "realm of the in-between" between school and city through the architecture workshops for children at Hill Memorial School in Athens, in which we explore children's perceptions, wishes, and ideas related to their familiar everyday places of transition from school to city and vice versa. Also discussed in the presentation are the writings of Herman Hertzberger, Aldo Van Eyck, Jaap Bakema and others.

Keywords: threshold, city, play, identity, cinematic tools, children, school architecture

Procedia PDF Downloads 37
86 Mathematical Model for Interaction Energy of Toroidal Molecules and Other Nanostructures

Authors: Pakhapoom Sarapat, James M. Hill, Duangkamon Baowan

Abstract:

Carbon nanotori provide several properties such as high tensile strength and heat resistance. They are promised to be ideal structures for encapsulation, and their encapsulation ability can be determined by the interaction energy between the carbon nanotori and the encapsulated nanostructures. Such interaction energy is evaluated using Lennard-Jones potential and continuum approximation. Here, four problems relating to toroidal molecules are determined in order to find the most stable configuration. Firstly, the interaction energy between a carbon nanotorus and an atom is examined. The second problem relates to the energy of a fullerene encapsulated inside a carbon nanotorus. Next, the interaction energy between two symmetrically situated and parallel nanotori is considered. Finally, the classical mechanics is applied to model the interaction energy between the toroidal structure of cyclodextrin and the spherical DNA molecules. These mathematical models might be exploited to study a number of promising devices for future developments in bio and nanotechnology.

Keywords: carbon nanotori, continuum approximation, interaction energy, Lennard-Jones potential, nanotechnology

Procedia PDF Downloads 118
85 Ab Initio Calculation of Fundamental Properties of CaxMg1-xA (a = Se and Te) Alloys in the Rock-Salt Structure

Authors: M. A. Ghebouli, H. Choutri, B. Ghebouli , M. Fatmi, L. Louail

Abstract:

We employed the density-functional perturbation theory (DFPT) within the generalized gradient approximation (GGA), the local density approximation (LDA) and the virtual-crystal approximation (VCA) to study the effect of composition on the structure, stability, energy gaps, electron effective mass, the dynamic effective charge, optical and acoustical phonon frequencies and static and high dielectric constants of the rock-salt CaxMg1-xSe and CaxMg1-xTe alloys. The computed equilibrium lattice constant and bulk modulus show an important deviation from the linear concentration. From the Voigt-Reuss-Hill approximation, CaxMg1-xSe and CaxMg1-xTe present lower stiffness and lateral expansion. For Ca content ranging between 0.25-0.75, the elastic constants, energy gaps, electron effective mass and dynamic effective charge are predictions. The elastic constants and computed phonon dispersion curves indicate that these alloys are mechanically stable.

Keywords: CaxMg1-xSe, CaxMg1-xTe, band structure, phonon

Procedia PDF Downloads 511
84 Vibration and Parametric Instability Analysis of Delaminated Composite Beams

Authors: A. Szekrényes

Abstract:

This paper revisits the free vibration problem of delaminated composite beams. It is shown that during the vibration of composite beams the delaminated parts are subjected to the parametric excitation. This can lead to the dynamic buckling during the motion of the structure. The equation of motion includes time-dependent stiffness and so it leads to a system of Mathieu-Hill differential equations. The free vibration analysis of beams is carried out in the usual way by using beam finite elements. The dynamic buckling problem is investigated locally, and the critical buckling forces are determined by the modified harmonic balance method by using an imposed time function of the motion. The stability diagrams are created, and the numerical predictions are compared to experimental results. The most important findings are the critical amplitudes at which delamination buckling takes place, the stability diagrams representing the instability of the system, and the realistic mode shape prediction in contrast with the unrealistic results of models available in the literature.

Keywords: delamination, free vibration, parametric excitation, sweep excitation

Procedia PDF Downloads 318
83 Study of Mechanical Behavior of Unidirectional Composite Laminates According

Authors: Deliou Adel, Saadalah Younes, Belkaid Khmissi, Dehbi Meriem

Abstract:

Composite materials, in the most common sense of the term, are a set of synthetic materials designed and used mainly for structural applications; the mechanical function is dominant. The mechanical behaviors of the composite, as well as the degradation mechanisms leading to its rupture, depend on the nature of the constituents and on the architecture of the fiber preform. The profile is required because it guides the engineer in designing structures with precise properties in relation to the needs. This work is about studying the mechanical behavior of unidirectional composite laminates according to different failure criteria. Varying strength parameter values make it possible to compare the ultimate mechanical characteristics obtained by the criteria of Tsai-Hill, Fisher and maximum stress. The laminate is subjected to uniaxial tensile membrane forces. Estimates of their ultimate strengths and the plotting of the failure envelope constitute the principal axis of this study. Using the theory of maximum stress, we can determine the various modes of damage of the composite. The different components of the deformation are presented for different orientations of fibers.

Keywords: unidirectional kevlar/epoxy composite, failure criterion, membrane stress, deformations, failure envelope

Procedia PDF Downloads 45
82 A Comparison of Bias Among Relaxed Divisor Methods Using 3 Bias Measurements

Authors: Sumachaya Harnsukworapanich, Tetsuo Ichimori

Abstract:

The apportionment method is used by many countries, to calculate the distribution of seats in political bodies. For example, this method is used in the United States (U.S.) to distribute house seats proportionally based on the population of the electoral district. Famous apportionment methods include the divisor methods called the Adams Method, Dean Method, Hill Method, Jefferson Method and Webster Method. Sometimes the results from the implementation of these divisor methods are unfair and include errors. Therefore, it is important to examine the optimization of this method by using a bias measurement to figure out precise and fair results. In this research we investigate the bias of divisor methods in the U.S. Houses of Representatives toward large and small states by applying the Stolarsky Mean Method. We compare the bias of the apportionment method by using two famous bias measurements: The Balinski and Young measurement and the Ernst measurement. Both measurements have a formula for large and small states. The Third measurement however, which was created by the researchers, did not factor in the element of large and small states into the formula. All three measurements are compared and the results show that our measurement produces similar results to the other two famous measurements.

Keywords: apportionment, bias, divisor, fair, measurement

Procedia PDF Downloads 336
81 Growth Pattern Analysis of Khagrachari Pourashava

Authors: Kutub Uddin Chisty, Md. Kamrul Islam, Md. Ashraful Islam

Abstract:

Growth pattern is an important factor for a city because it can help to predict future growth trend and development of a city. Khagrachari District is one of the three hill tracts districts in Bangladesh. It is bordered by the Indian State of Tripura on the north, Rangamati and Chittagong districts on the south, Rangamati district on the east, Chittagong district and the Indian State of Tripura on the west. Khagrachari Pourashava is surrounded by hills and waterways. The Pourashava area is mostly inhibited by non-tribal population, while tribal population lives in hilly regions within and around the Pourashava area. The hilly area growth is different. Based on questioners and expert opinions survey, growth pattern of Khagrachari is evaluated. Different culture, history, tribal people, non-tribal people enrich the hilly heritages. In our study, we analyse the city growth pattern and identify the prominent factors that influence the city growth. Thus, it can help us to identify growth trend of the city.

Keywords: growth pattern, growth trend, prominent factors, regional development

Procedia PDF Downloads 314
80 Tourism Potential Investment Opportunities in Pakistan: A Critical Analysis

Authors: Khalil Ahmad Khosa

Abstract:

Pakistan is such a diverse region, it is the center of various religions and settlements long before the creation of the nation that exists today. The country's attraction range from the ruin of the Indus Valley Civilization such as Mohenjo-daro, Harappa and Taxila, to the Himalayan hill stations, which attract those interested in winter sports. Pakistan is home to several mountain peaks over 7000 m, which attracts adventurers and mountaineers from around the world, especially K2.[4] The north part of Pakistan has many old fortresses, ancient architecture and the Hunza and Chitral valley, home to small pre-Islamic Animist Kalash people community. The romance of the historic Khyber Pakhtunkhwa province is timeless and legendary, Punjab province has the site of Alexander's battle on the Jhelum River and the historic city Lahore, Pakistan's cultural capital, with many examples of Mughal architecture such as Badshahi Masjid, Shalimar Gardens, Tomb of Jahangir and the Lahore Fort. Tourism is a growing industry in Pakistan. However, till this date, the government has not be able to take the tourism market seriously within Pakistan. Pakistan is home to a diverse number of tourist attractions which have not been funded or protected due to the government giving the tourism market a low priority.

Keywords: architecture, Pakistan, tourism, turist

Procedia PDF Downloads 250
79 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges

Authors: Dalvin D. Hill, Hector M. Castro Garcia

Abstract:

A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).

Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables

Procedia PDF Downloads 96
78 The Use and Safety of Leave from an Acute Inpatient Psychiatry Unit: A Retrospective Review of Pass Outcomes Over Four Years Abstract

Authors: Vasilis C. Hristidis, Ricardo Caceda, Ji Soo Kim, Brian Bronson, Emily A. Hill

Abstract:

Objective: Leave passes to provide authorized leave for hospitalized patients from a psychiatric inpatient unit. Though providing day passes was once a relatively common practice, there is relatively little data describing their safety and efficacy. Methods: This descriptive study examines the use of leave passes in an adult inpatient unit at a university hospital between 2017 and 2021, with attention to reasons for granting the day pass, duration, and outcome of the pass. Results: During the study period, ten patients with primary psychotic or mood disorders received 12 passes for either housing coordination, COVID-19 vaccination, or major family events. There were no fatalities or elopements. One patient experienced severe agitation and engaged in non-suicidal self-injurious behavior. A second patient showed mild, redirectable psychomotor agitation upon return to the unit. The remaining 10 passes were uneventful. Conclusions: Our findings support the view that patients with diverse diagnoses can safely be provided leave from an inpatient setting with adequate planning and support, yielding a low incidence of adverse events.

Keywords: passes, inpatient, psychiatry, inpatient leave, outcome

Procedia PDF Downloads 169
77 Chromite Exploration Using Electrical Resistivity Tomography in Ingessana Hill, Blue Nile State, Sudan

Authors: Mohamed A. Mohamed-Ali, Jannis Simos, Khalid M. Kheiralla

Abstract:

The Ingessana hills in the southern Blue Nile of Sudan are part of the southern sector of the NE-SW trending ophiolithic belt of the Arab-Nubian Shield with mid-neoproterozoic age. The rocks are mainly serpentinized and in parts highly silicified dunites especially towards the contact with the intruding Bau granite. A promising chromite mineralization zones in the area tend to be generally associated with NE-SW trending shear-zones. A detailed geophysical survey employing electrical resistivity tomography (ERT) at 34 lines were carried out over a zone of a known chromite mineralization to test feasibility of detecting and delineating the ore (if exist) and accordingly facilitate the positioning of exploratory drill holes. ERT sections were inverted with smooth constraints inversion code where the contacts between the granite and the ultramafics are showing up clearly. The continuity of mineralization along the contact is not well confirmed. However, the low-resistivity anomalies are probably recognized as potential chromite mineralization zones. These anomalies represent prime targets for further exploration by drilling, trenching or shallow pits. If the results of the drilling or excavations are positive, small open pit exploitations may produce important tonnages of chromite.

Keywords: chromite exploration, ERT, Ingessana Hills, inversion

Procedia PDF Downloads 354