Search results for: exchanged.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 87

Search results for: exchanged.

57 Investigating (Im)Politeness Strategies in Email Communication: The Case Algerian PhD Supervisees and Irish Supervisors

Authors: Zehor Ktitni

Abstract:

In pragmatics, politeness is regarded as a feature of paramount importance to successful interpersonal relationships. On the other hand, emails have recently become one of the indispensable means of communication in educational settings. This research puts email communication at the core of the study and analyses it from a politeness perspective. More specifically, it endeavours to look closely at how the concept of (im)politeness is reflected through students’ emails. To this end, a corpus of Algerian supervisees’ email threads, exchanged with their Irish supervisors, was compiled. Leech’s model of politeness (2014) was selected as the main theoretical framework of this study, in addition to making reference to Brown and Levinson’s model (1987) as it is one of the most influential models in the area of pragmatic politeness. Further, some follow-up interviews are to be conducted with Algerian students to reinforce the results derived from the corpus. Initial findings suggest that Algerian Ph.D. students’ emails tend to include more politeness markers than impoliteness ones, they heavily make use of academic titles when addressing their supervisors (Dr. or Prof.), and they rely on hedging devices in order to sound polite.

Keywords: politeness, email communication, corpus pragmatics, Algerian PhD supervisees, Irish supervisors

Procedia PDF Downloads 32
56 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 64
55 The Use of Lane-Centering to Assure the Visible Light Communication Connectivity for a Platoon of Autonomous Vehicles

Authors: Mohammad Y. Abualhoul, Edgar Talavera Munoz, Fawzi Nashashibi

Abstract:

The new emerging Visible Light Communication (VLC) technology has been subjected to intensive investigation, evaluation, and lately, deployed in the context of convoy-based applications for Intelligent Transportations Systems (ITS). The technology limitations were defined and supported by different solutions proposals to enhance the crucial alignment and mobility limitations. In this paper, we propose the incorporation of VLC technology and Lane-Centering (LC) technique to assure the VLC-connectivity by keeping the autonomous vehicle aligned to the lane center using vision-based lane detection in a convoy-based formation. Such combination can ensure the optical communication connectivity with a lateral error less than 30 cm. As soon as the road lanes are detectable, the evaluated system showed stable behavior independently from the inter-vehicle distances and without the need for any exchanged information of the remote vehicles. The evaluation of the proposed system is verified using VLC prototype and an empirical result of LC running application over 60 km in Madrid M40 highway.

Keywords: visible light communication, lane-centerin, platooning, intelligent transportation systems, road safety applications

Procedia PDF Downloads 141
54 Nearly Zero-Energy Regulation and Buildings Built with Prefabricated Technology: The Case of Hungary

Authors: András Horkai, Attila Talamon, Viktória Sugár

Abstract:

There is an urgent need nowadays to reduce energy demand and the current level of greenhouse gas emission and use renewable energy sources increase in energy efficiency. On the other hand, the European Union (EU) countries are largely dependent on energy imports and are vulnerable to disruption in energy supply, which may, in turn, threaten the functioning of their current economic structure. Residential buildings represent a significant part of the energy consumption of the building stock. Only a small part of the building stock is exchanged every year, thus it is essential to increase the energy efficiency of the existing buildings. Present paper focuses on the buildings built with industrialized technology only, and their opportunities in the boundaries of nearly zero-energy regulation. Current paper shows the emergence of panel construction method, and past and present of the ‘panel’ problem in Hungary with a short outlook to Europe. The study shows as well as the possibilities for meeting the nearly zero and cost optimized requirements for residential buildings by analyzing the renovation scenarios of an existing residential typology.

Keywords: Budapest, energy consumption, industrialized technology, nearly zero-energy buildings

Procedia PDF Downloads 312
53 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation

Authors: Aditi Chauhan, Neethu S. Mohan

Abstract:

In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.

Keywords: documents, identity, computational system, suspect

Procedia PDF Downloads 151
52 Control of a Wind Energy Conversion System Works in Tow Operating Modes (Hyper Synchronous and Hypo Synchronous)

Authors: A. Moualdia, D. J. Boudana, O. Bouchhida, A. Medjber

Abstract:

Wind energy has many advantages, it does not pollute and it is an inexhaustible source. However, the cost of this energy is still too high to compete with traditional fossil fuels, especially on sites less windy. The performance of a wind turbine depends on three parameters: the power of wind, the power curve of the turbine and the generator's ability to respond to wind fluctuations. This paper presents a control chain conversion based on a double-fed asynchronous machine and flow-oriented. The supply system comprises of two identical converters, one connected to the rotor and the other one connected to the network via a filter. The architecture of the device is up by three commands are necessary for the operation of the turbine control extraction of maximum power of the wind to control itself (MPPT) control of the rotor side converter controlling the electromagnetic torque and stator reactive power and control of the grid side converter by controlling the DC bus voltage and active power and reactive power exchanged with the network. The proposed control has been validated in both modes of operation of the three-bladed wind 7.5 kW, using Matlab/Simulink. The results of simulation control technology study provide good dynamic performance and static.

Keywords: D.F.I.G, variable wind speed, hypersynchrone, energy quality, hyposynchrone

Procedia PDF Downloads 342
51 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 161
50 Early Stage Hydration of Wollastonite: Kinetic Aspects of the Metal-Proton Exchange Reaction

Authors: Nicolas Giraudo, Peter Thissen

Abstract:

In this paper we bring up new aspects of the metal proton exchange reaction (MPER, also called early stage hydration): (1) its dependence of the number of protons consumed by the preferential exchanged cations on the pH value applied at the water/wollastonite interface and (2) strong anisotropic characteristics detected in atomic force microscopy (AFM) and low energy ion scattering spectroscopy measurements (LEIS). First we apply density functional theory (DFT) calculations to compare the kinetics of the reaction on different wollastonite surfaces, and combine it with ab initio thermodynamics to set up a model describing (1) the release of Ca in exchange with H coming from the water/wollastonite interface, (2) the dependence of the MPER on the chemical potential of protons. In the second part of the paper we carried out in-situ AFM and inductive coupled plasma atomic emission spectroscopy (ICP-OES) measurements in order to evaluate the predicted values. While a good agreement is found in the basic and neutral regime (pH values from 14-4), an increasing mismatch appears in the acidic regime (pH value lower 4). This is finally explained by non-equilibrium etching, dominating over the MPER in the very acidic regime.

Keywords: anisotropy, calcium silicate, cement, density functional theory, hydration

Procedia PDF Downloads 260
49 Leveraging NFT Secure and Decentralized Lending: A Defi Solution

Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.

Abstract:

In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.

Keywords: blockchain, defi, NFT, ethereum, marketplace

Procedia PDF Downloads 21
48 Studying the Load Sharing and Failure Mechanism of Hybrid Composite Joints Using Experiment and Finite Element Modeling

Authors: Seyyed Mohammad Hasheminia, Heoung Jae Chun, Jong Chan Park, Hong Suk Chang

Abstract:

Composite joints have been getting attention recently due to their high specific mechanical strength to weight ratio that is crucial for structures such as aircrafts and automobiles. In this study on hybrid joints, quasi-static experiments and finite element analysis were performed to investigate the failure mechanism of hybrid composite joint with respect to the joint properties such as the adhesive material, clamping force, and joint geometry. The outcomes demonstrated that the stiffness of the adhesive is the most imperative design parameter. In this investigation, two adhesives with various stiffness values were utilized. Regarding the joints utilizing the adhesive with the lower stiffness modulus, it was observed that the load was exchanged promptly through the adhesive since it was shared more proficiently between the bolt and adhesive. This phenomenon permitted the hybrid joints with low-modulus adhesive to support more prominent loads before failure when contrasted with the joints that utilize the stiffer adhesive. In the next step, the stress share between the bond and bolt as a function of various design parameters was studied using a finite element model in which it was understood that the geometrical parameters such as joint overlap and width have a significant influence on the load sharing between the bolt and the adhesive.

Keywords: composite joints, composite materials, hybrid joints, single-lap joint

Procedia PDF Downloads 377
47 Proposal of Commutation Protocol in Hybrid Sensors and Vehicular Networks for Intelligent Transport Systems

Authors: Taha Bensiradj, Samira Moussaoui

Abstract:

Hybrid Sensors and Vehicular Networks (HSVN), represent a hybrid network, which uses several generations of Ad-Hoc networks. It is used especially in Intelligent Transport Systems (ITS). The HSVN allows making collaboration between the Wireless Sensors Network (WSN) deployed on the border of the road and the Vehicular Network (VANET). This collaboration is defined by messages exchanged between the two networks for the purpose to inform the drivers about the state of the road, provide road safety information and more information about traffic on the road. Moreover, this collaboration created by HSVN, also allows the use of a network and the advantage of improving another network. For example, the dissemination of information between the sensors quickly decreases its energy, and therefore, we can use vehicles that do not have energy constraint to disseminate the information between sensors. On the other hand, to solve the disconnection problem in VANET, the sensors can be used as gateways that allow sending the messages received by one vehicle to another. However, because of the short communication range of the sensor and its low capacity of storage and processing of data, it is difficult to ensure the exchange of road messages between it and the vehicle, which can be moving at high speed at the time of exchange. This represents the time where the vehicle is in communication range with the sensor. This work is the proposition of a communication protocol between the sensors and the vehicle used in HSVN. The latter has as the purpose to ensure the exchange of road messages in the available time of exchange.

Keywords: HSVN, ITS, VANET, WSN

Procedia PDF Downloads 334
46 Effect of the Binary and Ternary Exchanges on Crystallinity and Textural Properties of X Zeolites

Authors: H. Hammoudi, S. Bendenia, K. Marouf-Khelifa, R. Marouf, J. Schott, A. Khelifa

Abstract:

The ionic exchange of the NaX zeolite by Cu2+ and/or Zn2+ cations is progressively driven while following the development of some of its characteristic: crystallinity by XR diffraction, profile of isotherms, RI criterion, isosteric adsorption heat and microporous volume using both the Dubinin–Radushkevich (DR) equation and the t-plot through the Lippens–de Boer method which also makes it possible to determine the external surface area. Results show that the cationic exchange process, in the case of Cu2+ introduced at higher degree, is accompanied by crystalline degradation for Cu(x)X, in contrast to Zn2+-exchanged zeolite X. This degradation occurs without significant presence of mesopores, because the RI criterion values were found to be much lower than 2.2. A comparison between the binary and ternary exchanges shows that the curves of CuZn(x)X are clearly below those of Zn(x)X and Cu(x)X, whatever the examined parameter. On the other hand, the curves relating to CuZn(x)X tend towards those of Cu(x)X. This would again confirm the sensitivity of the crystalline structure of CuZn(x)X with respect to the introduction of Cu2+ cations. An original result is the distortion of the zeolitic framework of X zeolites at middle exchange degree, when Cu2+ competes with another divalent cation, such as Zn2+, for the occupancy of sites distributed within zeolitic cavities. In other words, the ternary exchange accentuates the crystalline degradation of X zeolites. An unexpected result also is the no correlation between crystal damage and the external surface area.

Keywords: adsorption, crystallinity, ion exchange, zeolite

Procedia PDF Downloads 227
45 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 230
44 Continuous Plug Flow and Discrete Particle Phase Coupling Using Triangular Parcels

Authors: Anders Schou Simonsen, Thomas Condra, Kim Sørensen

Abstract:

Various processes are modelled using a discrete phase, where particles are seeded from a source. Such particles can represent liquid water droplets, which are affecting the continuous phase by exchanging thermal energy, momentum, species etc. Discrete phases are typically modelled using parcel, which represents a collection of particles, which share properties such as temperature, velocity etc. When coupling the phases, the exchange rates are integrated over the cell, in which the parcel is located. This can cause spikes and fluctuating exchange rates. This paper presents an alternative method of coupling a discrete and a continuous plug flow phase. This is done using triangular parcels, which span between nodes following the dynamics of single droplets. Thus, the triangular parcels are propagated using the corner nodes. At each time step, the exchange rates are spatially integrated over the surface of the triangular parcels, which yields a smooth continuous exchange rate to the continuous phase. The results shows that the method is more stable, converges slightly faster and yields smooth exchange rates compared with the steam tube approach. However, the computational requirements are about five times greater, so the applicability of the alternative method should be limited to processes, where the exchange rates are important. The overall balances of the exchanged properties did not change significantly using the new approach.

Keywords: CFD, coupling, discrete phase, parcel

Procedia PDF Downloads 228
43 'Freud and Jung: Dissenting Friends'; An Analysis of the Foundations of the Psychoanalytical Theory in Theirs Letters

Authors: Laurence Doremus

Abstract:

Freud as the builder of psychoanalysis as a discipline had created the science with Carl Gustav Jung (1875-1961), a psychiatry specialist from Zurich who was very important in the Freudian theory. The knowledge about the foundation of psychoanalysis is often focused on the influence of the works from Breuer or Charcot in the Freudian praxis, at least at the beginning of his career, and Jung's influence is often under-estimated. The paper focuses on the importance of the Jungian contributions in Freud's theories at the beginning of the creation of the discipline in the 1910s. We often meet Jungian schools on the first hand and Freudian schools, on the other hand in the academic field, but the Freudian field has to admit the importance of the Jungian theories in Freudian science. And also, the dialectical energy which appears in the letters exchanged between both of the fathers of psychoanalysis is important to understand the foundations of Freud Theory. That's why the paper will analyze in detail the correspondence between them in an epistemological and historical approach. Effectively the letters were translated and published (in French but also in English and other languages) lately in history and are still not well knew by the researchers in the psychoanalytical field. We well explain how Freud was helped by Jung despite his desire to build the theory. We analyze how the second topic named 'unconscious, preconscious, and conscious', is the result of the first topic that Jung built with Freud. The paper is a contribution to the knowledge we should have about the intense friendship between the two protagonists.

Keywords: Carl Gustav Jung, correspondence, Freud's letters, psychoanalytic theory

Procedia PDF Downloads 116
42 Interactive of Calcium, Potassium, and Dynamic Unequal Salt Distribution on the Growth of Tomato in Hydroponic System

Authors: Mohammad Koushafar, Amir Hossein Khoshgoftarmanesh

Abstract:

Due to water shortage, application of saline water for irrigation is an urgent requirement in agriculture. Thus, this study, the effect of calcium and potassium application as additive in saline root media for reduce salinity adverse effects was investigated on tomato growth in a hydroponic system with unequal distribution of salts in the root media, which was divided into two equal parts containing full Johnson nutrient solution and 40 mM NaCl solution, alone or in combination with KCl (6 mM), CaCl2 (4 mM), K+Ca (3+2 mM) or half-strength Johnson nutrient solution. The root splits were exchanged every 7 days. Results showed that addition of calcium, calcium-potassium and nutrition elements equivalent to half the concentration of Johnson formula to the saline-half of culture media minimized the reduction in plant growth caused by NaCl, although the addition of potassium to culture media was not effective. The greatest concentration of sodium was observed at the shoot of treatments which had the smallest growth. According to the results of this study, in the case of dynamic and non-uniform distribution of salts in the root media, by the addition of additive to the saline solution, it would be possible to use of saline water with no significant growth reduction.

Keywords: calcium, hydroponic, local salinity, potassium, salin water, tomato

Procedia PDF Downloads 415
41 Study of Sustainability Indicators in a Milk Production Process

Authors: E. Lacasa, J. L. Santolaya, I. Millán

Abstract:

The progress toward sustainability implies maintaining and preferably improving both, human and ecosystem well-being, according to a triple bottom line that includes the environmental, economic and social dimensions. The life cycle assessment (LCA) is a method applicable to all production sectors that aims to quantify the environmental pressures and the benefits related to goods and services, as well as the trade-offs and the scope for improving areas of the production process. While using LCA to measure the environmental dimension of sustainability is widespread, similar approaches for the economic and the social dimensions still have limited application worldwide and there is a need for consistent and robust methods and indicators. This paper focuses on the milk production process and presents the analysis of the flows exchanged by an industrial installation through accounting all the energy and material inputs and the associated emissions and waste outputs at this stage of its life cycle. The functional unit is one litre of milk produced. Different metrics and indicators are used to assess the three dimensions of sustainability. Metrics considered useful to assess the production activities are the total water and energy consumptions and the milk production volume of each cow. The global warming, the value added and the working hours are indicators used to measure each sustainability dimension. The study is performed with two types of feeding of the cows, which includes a change in percentages of components as well. Nutritional composition of the milk obtained is almost kept. It is observed that environmental and social improvements involve high economic costs.

Keywords: milk production, sustainability, indicators, life cycle assessment

Procedia PDF Downloads 403
40 Improving Second Language Speaking Skills via Video Exchange

Authors: Nami Takase

Abstract:

Computer-mediated-communication allows people to connect and interact with each other as if they were sharing the same space. The current study examined the effects of using video letters (VLs) on the development of second language speaking skills of Common European Framework of Reference for Languages (CEFR) A1 and CEFR B2 level learners of English as a foreign language. Two groups were formed to measure the impact of VLs. The experimental and control groups were given the same topic, and both groups worked with a native English-speaking university student from the United States of America. Students in the experimental group exchanged VLs, and students in the control group used video conferencing. Pre- and post-tests were conducted to examine the effects of each practice mode. The transcribed speech-text data showed that the VL group had improved speech accuracy scores, while the video conferencing group had increased sentence complexity scores. The use of VLs may be more effective for beginner-level learners because they are able to notice their own errors and replay videos to better understand the native speaker’s speech at their own pace. Both the VL and video conferencing groups provided positive feedback regarding their interactions with native speakers. The results showed how different types of computer-mediated communication impacts different areas of language learning and speaking practice and how each of these types of online communication tool is suited to different teaching objectives.

Keywords: computer-assisted-language-learning, computer-mediated-communication, english as a foreign language, speaking

Procedia PDF Downloads 71
39 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 118
38 Physicochemical Characterization of MFI–Ceramic Hollow Fibres Membranes for CO2 Separation with Alkali Metal Cation

Authors: A. Alshebani, Y. Swesi, S. Mrayed, F. Altaher

Abstract:

This paper present some preliminary work on the preparation and physicochemical caracterization of nanocomposite MFI-alumina structures based on alumina hollow fibres. The fibers are manufactured by a wet spinning process. α-alumina particles were dispersed in a solution of polysulfone in NMP. The resulting slurry is pressed through the annular gap of a spinneret into a precipitation bath. The resulting green fibres are sintered. The mechanical strength of the alumina hollow fibres is determined by a three-point-bending test while the pore size is characterized by bubble-point testing. The bending strength is in the range of 110 MPa while the average pore size is 450 nm for an internal diameter of 1 mm and external diameter of 1.7 mm. To characterize the MFI membranes various techniques were used for physicochemical characterization of MFI–ceramic hollow fibres membranes: The nitrogen adsorption, X-ray diffractometry, scanning electron microscopy combined with X emission microanalysis. Scanning Electron Microscopy (SEM) and Energy Dispersive Microanalysis by the X-ray were used to observe the morphology of the hollow fibre membranes (thickness, infiltration into the carrier, defects, homogeneity). No surface film, has been obtained, as observed by SEM and EDX analysis and confirmed by high temperature variation of N2 and CO2 gas permeances before cation exchange. Local analysis and characterise (SEM and EDX) and overall (by ICP elemental analysis) were conducted on two samples exchanged to determine the quantity and distribution of the cation of cesium on the cross section fibre of the zeolite between the cavities.

Keywords: physicochemical characterization of MFI, ceramic hollow fibre, CO2, ion-exchange

Procedia PDF Downloads 316
37 The Greek Root Word ‘Kos’ and the Trade of Ancient Greek with Tamil Nadu, India

Authors: D. Pugazhendhi

Abstract:

The ancient Greeks were forerunners in many fields than other societies. So, the Greeks were well connected with all the countries which were well developed during that time through trade route. In this connection, trading of goods from the ancient Greece to Tamil Nadu which is presently in India, though they are geographically far away, played an important role. In that way, the word and the goods related with kos and kare got exchanged between these two societies. So, it is necessary to compare the phonology and the morphological occurrences of these words that are found common both in the ancient Greek and Tamil literatures of the contemporary period. The results show that there were many words derived from the root kos with the basic meaning of ‘arrange’ in the ancient Greek language, but this is not the case in the usage of the word kare. In the ancient Tamil literature, the word ‘kos’ does not have any root and also had rare occurrences. But it was just the opposite in the case of the word ‘kare’. One of all the meanings of the word, which was derived from the root ‘kos’ in ancient Greek literature, is related with costly ornaments. This meaning seems to have close resemblance with the usage of word ‘kos’ in ancient Tamil literature. Also, the meaning of the word ‘kare’ in ancient Tamil literature is related with spices whereas, in the ancient Greek literature, its meaning is related to that of the cooking of meat using spices. Hence, the similarity seen in the meanings of these words ‘kos’ and ‘kare’ in both these languages provides lead for further study. More than that, the ancient literary resources which are available in both these languages ensure the export and import of gold and spices from the ancient Greek land to Tamil land.

Keywords: arrange, kare, Kos, ornament, Tamil

Procedia PDF Downloads 104
36 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 273
35 Comparison of Effect of Promoter and K Addition of Co₃O₄ for N₂O Decomposition Reaction

Authors: R. H. Hwang, J. H. Park, K. B. Yi

Abstract:

Nitrous oxide (N2O) is now distinguished as an environmental pollutant. N2O is one of the representative greenhouse gases and N2O is produced by both natural and anthropogenic sources. So, it is very important to reduce N2O. N2O abatement processes are various processes such as HC-SCR, NH3-SCR and decomposition process. Among them, decomposition process is advantageous because it does not use a reducing agent. N2O decomposition is a reaction in which N2O is decomposed into N2 and O2. There are noble metals, transition metal ion-exchanged zeolites, pure and mixed oxides for N2O decomposition catalyst. Among the various catalysts, cobalt-based catalysts derived from hydrotalcites gathered much attention because spinel catalysts having large surface areas and high thermal stabilities. In this study, the effect of promoter and K addition on the activity was compared and analyzed. Co3O4 catalysts for N2O decomposition were prepared by co- precipitation method. Ce and Zr were added during the preparation of the catalyst as promoter with the molar ratio (Ce or Zr) / Co = 0.05. In addition, 1 wt% K2CO3 was doped to the prepared catalyst with impregnation method to investigate the effect of K on the catalyst performance. Characterizations of catalysts were carried out with SEM, BET, XRD, XPS and H2-TPR. The catalytic activity tests were carried out at a GHSV of 45,000 h-1 and a temperature range of 250 ~ 375 ℃. The Co3O4 catalysts showed a spinel crystal phase, and the addition of the promoter increased the specific surface area and reduced the particle and crystal size. It was exhibited that the doping of K improves the catalytic activity by increasing the concentration of Co2+ in the catalyst which is an active site for catalytic reaction. As a result, the K-doped catalyst showed higher activity than the promoter added. Also, it was found through experiments that Co2+ concentration and reduction temperature greatly affect the reactivity.

Keywords: Co₃O4, K-doped, N₂O decomposition, promoter

Procedia PDF Downloads 146
34 Conceptual Solution and Thermal Analysis of the Final Cooling Process of Biscuits in One Confectionary Factory in Serbia

Authors: Duško Salemović, Aleksandar Dedić, Matilda Lazić, Dragan Halas

Abstract:

The paper presents the conceptual solution for the final cooling of the chocolate dressing of biscuits in one confectionary factory in Serbia. The proposed concept solution was derived from the desired technological process of final cooling of biscuits and the required process parameters that were to be achieved, and which were an integral part of the project task. The desired process parameters for achieving proper hardening and coating formation are the exchanged amount of heat in the time unit between the two media (air and chocolate dressing), the speed of air inside the tunnel cooler, and the surface of all biscuits in contact with the air. These parameters were calculated in the paper. The final cooling of chocolate dressing on biscuits could be optimized by changing process parameters and dimensions of the tunnel cooler and looking for the appropriate values for them. The accurate temperature predictions and fluid flow analysis could be conducted by using heat balance and flow balance equations, having in mind the theory of similarity. Furthermore, some parameters were adopted from previous technology processes, such as the inlet temperature of biscuits and input air temperature. A thermal calculation was carried out, and it was demonstrated that the percentage error between the contact surface of the air and the chocolate biscuit topping, which is obtained from the heat balance and geometrically through the proposed conceptual solution, does not exceed 0.67%, which is a very good agreement. This enabled the quality of the cooling process of chocolate dressing applied on the biscuit and the hardness of its coating.

Keywords: chocolate dressing, air, cooling, heat balance

Procedia PDF Downloads 44
33 Three Dimensional Large Eddy Simulation of Blood Flow and Deformation in an Elastic Constricted Artery

Authors: Xi Gu, Guan Heng Yeoh, Victoria Timchenko

Abstract:

In the current work, a three-dimensional geometry of a 75% stenosed blood vessel is analysed. Large eddy simulation (LES) with the help of a dynamic subgrid scale Smagorinsky model is applied to model the turbulent pulsatile flow. The geometry, the transmural pressure and the properties of the blood and the elastic boundary were based on clinical measurement data. For the flexible wall model, a thin solid region is constructed around the 75% stenosed blood vessel. The deformation of this solid region was modelled as a deforming boundary to reduce the computational cost of the solid model. Fluid-structure interaction is realised via a two-way coupling between the blood flow modelled via LES and the deforming vessel. The information of the flow pressure and the wall motion was exchanged continually during the cycle by an arbitrary lagrangian-eulerian method. The boundary condition of current time step depended on previous solutions. The fluctuation of the velocity in the post-stenotic region was analysed in the study. The axial velocity at normalised position Z=0.5 shows a negative value near the vessel wall. The displacement of the elastic boundary was concerned in this study. In particular, the wall displacement at the systole and the diastole were compared. The negative displacement at the stenosis indicates a collapse at the maximum velocity and the deceleration phase.

Keywords: Large Eddy Simulation, Fluid Structural Interaction, constricted artery, Computational Fluid Dynamics

Procedia PDF Downloads 266
32 Generation of Renewable Energy Through Photovoltaic Panels, Albania Photovoltaic Capacity

Authors: Dylber Qema

Abstract:

Driven by recent developments in technology and the growing concern about the sustainability and environmental impact of conventional fuel use, the possibility of producing clean and sustainable energy in significant quantities from renewable energy sources has sparked interest all over the world. Solar energy is one of the sources for the generation of electricity, with no emissions or environmental pollution. The electricity produced by photovoltaics can supply a home or business and can even be sold or exchanged with the grid operator. A very positive effect of using photovoltaic modules is that they do not produce greenhouse gases and do not produce chemical waste, unlike all other forms of energy production. Photovoltaics are becoming one of the largest investments in the field of renewable generating units. Improving the reliability of the electric power system is one of the most important impacts of the installation of photovoltaics (PV). Renewable energy sources are so large that they can meet the energy demands of the whole world, thus enabling sustainable supply as well as reducing local and global atmospheric emissions. Albania is rated by experts as one of the most favorable countries in Europe for the production of electricity from solar panels. But the country currently produces about 1% of its energy from the sun, while the rest of the needs are met by hydropower plants and imports. Albania has very good characteristics in terms of solar radiation (about 1300–1400 kW/m2). Solar energy has great potential and is a permanent source of energy with greater economic efficiency. Photovoltaic energy is also seen as an alternative, as long periods of drought in Albania have produced crises and high costs for securing energy in the foreign market.

Keywords: capacity, ministry of tourism and environment, obstacles, photovoltaic energy, sustainable

Procedia PDF Downloads 24
31 High Performance Wood Shear Walls and Dissipative Anchors for Damage Limitation

Authors: Vera Wilden, Benno Hoffmeister, Georgios Balaskas, Lukas Rauber, Burkhard Walter

Abstract:

Light-weight timber frame elements represent an efficient structural solution for wooden multistory buildings. The wall elements of such buildings – which act as shear diaphragms- provide lateral stiffness and resistance to wind and seismic loads. The tendency towards multi-story structures leads to challenges regarding the prediction of stiffness, strength and ductility of the buildings. Lightweight timber frame elements are built up of several structural parts (sheeting, fasteners, frame, support and anchorages); each of them contributing to the dynamic response of the structure. This contribution describes the experimental and numerical investigation and development of enhanced lightweight timber frame buildings. These developments comprise high-performance timber frame walls with the variable arrangements of sheathing planes and dissipative anchors at the base of the timber buildings, which reduce damages to the timber structure and can be exchanged after significant earthquakes. In order to prove the performance of the developed elements in the context of a real building a full-scale two-story building core was designed and erected in the laboratory and tested experimentally for its seismic performance. The results of the tests and a comparison of the test results to the predicted behavior are presented. Observation during the test also reveals some aspects of the design and details which need to consider in the application of the timber walls in the context of the complete building.

Keywords: dissipative anchoring, full scale test, push-over-test, wood shear walls

Procedia PDF Downloads 204
30 Exploration of a Blockchain Assisted Framework for Through Baggage Interlining: Blocklining

Authors: Mary Rose Everan, Michael McCann, Gary Cullen

Abstract:

International travel journeys, by their nature, incorporate elements provided by multiple service providers such as airlines, rail carriers, airports, and ground handlers. Data needs to be stored by and exchanged between these parties in the process of managing the journey. The fragmented nature of this shared management of mutual clients is a limiting factor in the development of a seamless, hassle-free, end-to-end travel experience. Traditional interlining agreements attempt to facilitate many separate aspects of co-operation between service providers, typically between airlines and, to some extent, intermodal travel operators, including schedules, fares, ticketing, through check-in, and baggage handling. These arrangements rely on pre-agreement. The development of Virtual Interlining - that is, interlining facilitated by a third party (often but not always an airport) without formal pre-agreement by the airlines or rail carriers - demonstrates an underlying demand for a better quality end-to-end travel experience. Blockchain solutions are being explored in a number of industries and offer, at first sight, an immutable, single source of truth for this data, avoiding data conflicts and misinterpretation. Combined with Smart Contracts, they seemingly offer a more robust and dynamic platform for multi-stakeholder ventures, and even perhaps the ability to join and leave consortia dynamically. Applying blockchain to the intermodal interlining space – termed Blocklining in this paper - is complex and multi-faceted because of the many aspects of cooperation outlined above. To explore its potential, this paper concentrates on one particular dimension, that of through baggage interlining.

Keywords: aviation, baggage, blocklining, intermodal, interlining

Procedia PDF Downloads 123
29 Promotional Effects of Zn in Cu-Zn/Core-Shell Al-MCM-41 for Selective Catalytic Reduction of NO with NH3: Acidic Properties, NOx Adsorption Properties, and Nature of Copper

Authors: Thidarat Imyen, Paisan Kongkachuichay

Abstract:

Cu-Zn/core-shell Al-MCM-41 catalyst with various copper species, prepared by a combination of three methods—substitution, ion-exchange, and impregnation, was studied for the selective catalytic reduction (SCR) of NO with NH3 at 300 °C for 150 min. In order to investigate the effects of Zn introduction on the nature of the catalyst, Cu/core-shell Al-MCM-41 and Zn/core-shell Al-MCM-41 catalysts were also studied. The roles of Zn promoter in the acidity and the NOx adsorption properties of the catalysts were investigated by in situ Fourier transform infrared spectroscopy (FTIR) of NH3 and NOx adsorption, and temperature-programmed desorption (TPD) of NH3 and NOx. The results demonstrated that the acidity of the catalyst was enhanced by the Zn introduction, as exchanged Zn(II) cations loosely bonded with Al-O-Si framework could create Brønsted acid sites by interacting with OH groups. Moreover, Zn species also provided the additional sites for NO adsorption in the form of nitrite (NO2–) and nitrate (NO3–) species, which are the key intermediates for SCR reaction. In addition, the effect of Zn on the nature of copper was studied by in situ FTIR of CO adsorption and in situ X-ray adsorption near edge structure (XANES). It was found that Zn species hindered the reduction of Cu(II) to Cu(0), resulting in higher Cu(I) species in the Zn promoted catalyst. The Cu-Zn/core-shell Al-MCM-41 exhibited higher catalytic activity compared with that of the Cu/core-shell Al-MCM-41 for the whole reaction time, as it possesses the highest amount of Cu(I) sites, which are responsible for SCR catalytic activity. The Cu-Zn/core-shell Al-MCM-41 catalyst also reached the maximum NO conversion of 100% with the average NO conversion of 76 %. The catalytic performance of the catalyst was further improved by using Zn promoter in the form of ZnO instead of reduced Zn species. The Cu-ZnO/core-shell Al-MCM-41 catalyst showed better catalytic performance with longer working reaction time, and achieved the average NO conversion of 81%.

Keywords: Al-MCM-41, copper, nitrogen oxide, selective catalytic reduction, zinc

Procedia PDF Downloads 266
28 Social Networks Global Impact on Protest Movements and Human Rights Activism

Authors: Marcya Burden, Savonna Greer

Abstract:

In the wake of social unrest around the world, protest movements have been captured like never before. As protest movements have evolved, so too have their visibility and sources of coverage. Long gone are the days of print media as our only glimpse into the action surrounding a protest. Now, with social networks such as Facebook, Instagram and Snapchat, we have access to real-time video footage of protest movements and human rights activism that can reach millions of people within seconds. This research paper investigated various social media network platforms’ statistical usage data in the areas of human rights activism and protest movements, paralleling with other past forms of media coverage. This research demonstrates that social networks are extremely important to protest movements and human rights activism. With over 2.9 billion users across social media networks globally, these platforms are the heart of most recent protests and human rights activism. This research shows the paradigm shift from the Selma March of 1965 to the more recent protests of Ferguson in 2014, Ni Una Menos in 2015, and End Sars in 2018. The research findings demonstrate that today, almost anyone may use their social networks to protest movement leaders and human rights activists. From a student to an 80-year-old professor, the possibility of reaching billions of people all over the world is limitless. Findings show that 82% of the world’s internet population is on social networks 1 in every 5 minutes. Over 65% of Americans believe social media highlights important issues. Thus, there is no need to have a formalized group of people or even be known online. A person simply needs to be engaged on their respective social media networks (Facebook, Twitter, Instagram, Snapchat) regarding any cause they are passionate about. Information may be exchanged in real time around the world and a successful protest can begin.

Keywords: activism, protests, human rights, networks

Procedia PDF Downloads 61