Search results for: integrity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 710

Search results for: integrity

440 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 70
439 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 429
438 Post-Earthquake Damage Detection Using System Identification with a Pair of Seismic Recordings

Authors: Lotfi O. Gargab, Ruichong R. Zhang

Abstract:

A wave-based framework is presented for modeling seismic motion in multistory buildings and using measured response for system identification which can be utilized to extract important information regarding structure integrity. With one pair of building response at two locations, a generalized model response is formulated based on wave propagation features and expressed as frequency and time response functions denoted, respectively, as GFRF and GIRF. In particular, GIRF is fundamental in tracking arrival times of impulsive wave motion initiated at response level which is dependent on local model properties. Matching model and measured-structure responses can help in identifying model parameters and infer building properties. To show the effectiveness of this approach, the Millikan Library in Pasadena, California is identified with recordings of the Yorba Linda earthquake of September 3, 2002.

Keywords: system identification, continuous-discrete mass modeling, damage detection, post-earthquake

Procedia PDF Downloads 347
437 Examining the Racialisation of White Workers in Rural Louisiana as a Technology of Capitalist Management and Control

Authors: Kendall Artz

Abstract:

In the 1950s, a wave of violent labor unrest shook a small town in south-western Louisiana leading to the racialisation of workers—previously considered white—as ‘mixed-race’ or, in local terms, ‘Redbone.’ This paper examines why the group known as ‘Redbones’ were marked as non-white in relation to strike violence and their opposition to capitalist expansion. Utilising archival research, historiography and oral testimony, I examine how an instance of labor unrest was reinterpreted by local law enforcement, an interstate capitalist class and the national press as calling into question the racial integrity of a group of workers who had been formerly marked as white. This explosive and largely unstudied strike provides an opportunity to better understand how racialisation operates as a technology of control, even over individuals who appear phenotypically white. The strike at Elizabeth allows a glimpse at the tactics of representatives of white supremacy when white workers do not fully embrace the ‘wages of whiteness.

Keywords: American federation of labor, labor history, Louisiana history, wages of whiteness

Procedia PDF Downloads 157
436 Seismic Response and Sensitivity Analysis of Circular Shallow Tunnels

Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed

Abstract:

Underground tunnels are one of the most popular public facilities for various applications such as transportation, water transfer, network utilities and etc. Experience from the past earthquake reveals that the underground tunnels also become vulnerable components and may damage at certain percentage depending on the level of ground shaking and induced phenomena. In this paper a numerical analysis is conducted in evaluating the sensitivity of two types of circular shallow tunnel lining models to wide ranging changes in the geotechnical design parameter. Critical analysis has been presented about the current methods of analysis, structural typology, ground motion characteristics, effect of soil conditions and associated uncertainties on the tunnel integrity. The response of the tunnel is evaluated through 2D non-linear finite element analysis, which critically assesses the impact of increasing levels of seismic loads. The finding from this study offer significant information on improving methods to assess the vulnerability of underground structures.

Keywords: geotechnical design parameter, seismic response, sensitivity analysis, shallow tunnel

Procedia PDF Downloads 412
435 Ethics, Culture, Customer Relationships and Risk Management in Financing Chinese SMEs

Authors: Yongsheng Guo, Mengyu Lu

Abstract:

This study investigates how Chinese SMEs manage financial risks in customer financing. 32 interviews were conducted, and grounded theory models were developed to link the causal conditions, actions, and consequences. This study found that Chinese ethical principles, including integrity, friendship, reciprocity, and cultural traits, including collectivism, acquaintance society, and long-term orientation, provide conditions for customer financing. The SMEs establish trust-based relationships with customers and build a social network. The SMEs reduce financial risk through diversification, frequent operations and enterprise reputations. Both customers and SMEs can get benefits, including customer experience and financial rewards for customers and financial resources and customer base for SMEs. But there are some problems, like default for customers and financial cost for enterprises. This study develops a resource and process capability theory of SMEs and a customer capital and customer value theory to connect finance, accounting, and management concepts.

Keywords: CRM, culture, ethics, financing from customer, SME

Procedia PDF Downloads 17
434 Stakeholder Mapping and Requirements Identification for Improving Traceability in the Halal Food Supply Chain

Authors: Laila A. H. F. Dashti, Tom Jackson, Andrew West, Lisa Jackson

Abstract:

Traceability systems are important in the agri-food and halal food sectors for monitoring ingredient movements, tracking sources, and ensuring food integrity. However, designing a traceability system for the halal food supply chain is challenging due to diverse stakeholder requirements and complex needs. Existing literature on stakeholder mapping and identifying requirements for halal food supply chains is limited. To address this gap, a pilot study was conducted to identify the objectives, requirements, and recommendations of stakeholders in the Kuwaiti halal food industry. The study collected data through semi-structured interviews with an international halal food manufacturer based in Kuwait. The aim was to gain a deep understanding of stakeholders' objectives, requirements, processes, and concerns related to the design of a traceability system in the country's halal food sector. Traceability systems are being developed and tested in the agri-food and halal food sectors due to their ability to monitor ingredient movements, track sources, and detect potential issues related to food integrity. Designing a traceability system for the halal food supply chain poses significant challenges due to diverse stakeholder requirements and the complexity of their needs (including varying food ingredients, different sources, destinations, supplier processes, certifications, etc.). Achieving a halal food traceability solution tailored to stakeholders' requirements within the supply chain necessitates prior knowledge of these needs. Although attempts have been made to address design-related issues in traceability systems, literature on stakeholder mapping and identification of requirements specific to halal food supply chains is scarce. Thus, this pilot study aims to identify the objectives, requirements, and recommendations of stakeholders in the halal food industry. The paper presents insights gained from the pilot study, which utilized semi-structured interviews to collect data from a Kuwait-based international halal food manufacturer. The objective was to gain an in-depth understanding of stakeholders' objectives, requirements, processes, and concerns pertaining to the design of a traceability system in Kuwait's halal food sector. The stakeholder mapping results revealed that government entities, food manufacturers, retailers, and suppliers are key stakeholders in Kuwait's halal food supply chain. Lessons learned from this pilot study regarding requirement capture for traceability systems include the need to streamline communication, focus on communication at each level of the supply chain, leverage innovative technologies to enhance process structuring and operations and reduce halal certification costs. The findings also emphasized the limitations of existing traceability solutions, such as limited cooperation and collaboration among stakeholders, high costs of implementing traceability systems without government support, lack of clarity regarding product routes, and disrupted communication channels between stakeholders. These findings contribute to a broader research program aimed at developing a stakeholder requirements framework that utilizes "business process modelling" to establish a unified model for traceable stakeholder requirements.

Keywords: supply chain, traceability system, halal food, stakeholders’ requirements

Procedia PDF Downloads 76
433 The Role of British Public Opinion in the Process of the Great Britain’s Involvement in the Crimean War

Authors: Aysen Muderrisoglu

Abstract:

As a result of the policies constituted and pursued by Russia which aimed to gain territory and power at Ottoman expense, Crimean War broke out in 1853. Nevertheless, the Eastern policies of Russia were in contradiction with the interests of Great Britain which was the great power of the era. Yet, it did hesitate to be confronted with Russian on its route to India, so the Ottoman territorial integrity was defended. In that period, Tzar Nicholas II, to begin with, tried to eliminate a probable opposition coming from the British side, and then tried its chance to build up cooperation with Britain on the territories of the sick man. As a more positive relation was being observed between these two states before the Crimean War, Great Britain initially had adopted a neutral policy. However, in the end, Britain entered the war against Russia due to the efforts of the opposing side in the British Parliament and the rising pressure of the public opinion. The article aims to examine the role of British public opinion in the process of Great Britain’s Involvement in this war. Also, the article will try to find an answer to the following question: to what extent did the public opinion become effective on the foreign policy-making of Great Britain before the war?

Keywords: British press, Crimean war, Great Britain, public opinion

Procedia PDF Downloads 133
432 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 262
431 Psychological Testing in Industrial/Organizational Psychology: Validity and Reliability of Psychological Assessments in the Workplace

Authors: Melissa C. Monney

Abstract:

Psychological testing has been of interest to researchers for many years as useful tools in assessing and diagnosing various disorders as well as to assist in understanding human behavior. However, for over 20 years now, researchers and laypersons alike have been interested in using them for other purposes, such as determining factors in employee selection, promotion, and even termination. In recent years, psychological assessments have been useful in facilitating workplace decision processing, regarding employee circulation within organizations. This literature review explores four of the most commonly used psychological tests in workplace environments, namely cognitive ability, emotional intelligence, integrity, and personality tests, as organizations have used these tests to assess different factors of human behavior as predictive measures of future employee behaviors. The findings suggest that while there is much controversy and debate regarding the validity and reliability of these tests in workplace settings as they were not originally designed for these purposes, the use of such assessments in the workplace has been useful in decreasing costs and employee turnover as well as increase job satisfaction by ensuring the right employees are selected for their roles.

Keywords: cognitive ability, personality testing, predictive validity, workplace behavior

Procedia PDF Downloads 214
430 Modeling Of The Random Impingement Erosion Due To The Impact Of The Solid Particles

Authors: Siamack A. Shirazi, Farzin Darihaki

Abstract:

Solid particles could be found in many multiphase flows, including transport pipelines and pipe fittings. Such particles interact with the pipe material and cause erosion which threats the integrity of the system. Therefore, predicting the erosion rate is an important factor in the design and the monitor of such systems. Mechanistic models can provide reliable predictions for many conditions while demanding only relatively low computational cost. Mechanistic models utilize a representative particle trajectory to predict the impact characteristics of the majority of the particle impacts that cause maximum erosion rate in the domain. The erosion caused by particle impacts is not only due to the direct impacts but also random impingements. In the present study, an alternative model has been introduced to describe the erosion due to random impingement of particles. The present model provides a realistic trend for erosion with changes in the particle size and particle Stokes number. The present model is examined against the experimental data and CFD simulation results and indicates better agreement with the data incomparison to the available models in the literature.

Keywords: erosion, mechanistic modeling, particles, multiphase flow, gas-liquid-solid

Procedia PDF Downloads 144
429 Management of Local Towns (Tambon) According to Philosophy of Sufficiency Economy

Authors: Wichian Sriprachan, Chutikarn Sriviboon

Abstract:

The objectives of this research were to study the management of local towns and to develop a better model of town management according to the Philosophy of Sufficiency Economy. This study utilized qualitative research, field research, as well as documentary research at the same time. A total of 10 local towns or Tambons of Supanburi province, Thailand were selected for an in-depth interview. The findings revealed that the model of local town management according to Philosophy of Sufficient Economy was in a level of “good” and the model of management has the five basic guidelines: 1) ability to manage budget information and keep it up-to-date, 2) ability to decision making according to democracy rules, 3) ability to use check and balance system, 4) ability to control, follow, and evaluation, and 5) ability to allow the general public to participate. In addition, the findings also revealed that the human resource management according to Philosophy of Sufficient Economy includes obeying laws, using proper knowledge, and having integrity in five areas: plan, recruit, select, train, and maintain human resources.

Keywords: management, local town (Tambon), principles of sufficiency economy, marketing management

Procedia PDF Downloads 319
428 Functional Instruction Set Simulator of a Neural Network IP with Native Brain Float-16 Generator

Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula

Abstract:

A functional model to mimic the functional correctness of a neural network compute accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of GCC compilers to the BF-16 datatype, which we addressed with a native BF-16 generator integrated into our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex neural network accelerator design by proposing a functional model-based scoreboard or software model using SystemC. The proposed functional model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT, bringing up micro-steps of execution.

Keywords: ISA, neural network, Brain Float-16, DUT

Procedia PDF Downloads 61
427 Impact of Propolis on Cryopreservation of Arctic Charr (Salvelinus alpinus) Sperm

Authors: K. A. El-Battawy, E. Brannas

Abstract:

Cryopreservation of sperm causes damages and adversely affected sperm motility and viability resulting in lower hatching rates. The aim of this study is to determine whether propolis has potential protective effect on cryopreservation and fertilization ability of spermatozoa of Salvelinusalpinus. The extenders were prepared by using simple glucose solution (0.3 M glucose) to which 10% Me2SO added with different levels of propolis (0.4, 0.8 and 1 mg/ ml) and 10% egg yolk (as a control without propolis). The pooled semen samples diluted at the ratio of 1:3 by the extenders were subjected to cryopreservation. The percentage and duration of motility and fertilization tests of cryopreserved sperm samples have been done immediately after thawing and compared with control and fresh semen. The extenders containing propolis showed higher percentage motility and motility duration than control group (P < 0.05). Especially the group II (0.8 mg/ ml propolis) and the group III (1 mg/ ml propolis) showed significant positive effects on both post thaw motility and hatching ability. In conclusion, this study confirms that the propolis is an appropriate cryoptrotective agent in fish semen and it maintained the integrity of the spermatozoa during the cryopreservation process.

Keywords: propolis, arctic charr, semen, cryopreservation

Procedia PDF Downloads 258
426 Mitigation of High Voltage Equipment Design Deficiencies for Improved Operation and Maintenance

Authors: Riyad Awad, Abdulmohsen Alghadeer, Meshari Otaibi

Abstract:

Proper operation and maintenance (O&M) activities of high voltage equipment can lead to an increased asset lifecycle and maintain its integrity and reliability. Such a vital process is important to be proactively considered during equipment design and manufacturing phases by removing and eliminating any obstacles in the equipment which adversely affect the (O&M) activities. This paper presents a gap analysis pertaining to difficulties in performing operations and maintenance (O&M) high voltage electrical equipment, includes power transformers, switch gears, motor control center, disconnect switches and circuit breakers. The difficulties are gathered from field personnel, equipment design review comments, quality management system, and lessons learned database. The purpose of the gap analysis is to mitigate and prevent the (O&M) difficulties as early as possible in the design stage of the equipment lifecycle. The paper concludes with several recommendations and corrective actions for all identified gaps in order to reduce the cost (O&M) difficulties and improve the equipment lifecycle.

Keywords: operation and maintenance, high voltage equipment, equipment lifecycle, reduce the cost of maintenance

Procedia PDF Downloads 125
425 The Effect of Glass Thickness on Stress in Vacuum Glazing

Authors: Farid Arya, Trevor Hyde, Andrea Trevisi, Paolo Basso, Danilo Bardaro

Abstract:

Heat transfer through multiple pane windows can be reduced by creating a vacuum pressure less than 0.1 Pa between the glass panes, with low emittance coatings on one or more of the internal surfaces. Fabrication of vacuum glazing (VG) requires the formation of a hermetic seal around the periphery of the glass panes together with an array of support pillars between the panes to prevent them from touching under atmospheric pressure. Atmospheric pressure and temperature differentials induce stress which can affect the integrity of the glazing. Several parameters define the stresses in VG including the glass thickness, pillar specifications, glazing dimensions and edge seal configuration. Inherent stresses in VG can result in fractures in the glass panes and failure of the edge seal. In this study, stress in VG with different glass thicknesses is theoretically studied using Finite Element Modelling (FEM). Based on the finding in this study, suggestions are made to address problems resulting from the use of thinner glass panes in the fabrication of VG. This can lead to the development of high performance, light and thin VG.

Keywords: vacuum glazing, stress, vacuum insulation, support pillars

Procedia PDF Downloads 158
424 A Phase Field Approach to Model Crack Interface Interaction in Ceramic Matrix Composites

Authors: Dhaladhuli Pranavi, Amirtham Rajagopal

Abstract:

There are various failure modes in ceramic matrix composites; notable ones are fiber breakage, matrix cracking and fiber matrix debonding. Crack nucleation and propagation in microstructure of such composites requires an understanding of interaction of crack with the multiple inclusion heterogeneous system and interfaces. In order to assess structural integrity, the material parameters especially of the interface that governs the crack growth should be determined. In the present work, a nonlocal phase field approach is proposed to model the crack interface interaction in such composites. Nonlocal approaches help in understanding the complex mechanisms of delamination growth and mitigation and operates at a material length scale. The performance of the proposed formulation is illustrated through representative numerical examples. The model proposed is implemented in the framework of the finite element method. Several parametric studies on interface crack interaction are conducted. The proposed model is easy and simple to implement and works very well in modeling fracture in composite systems.

Keywords: composite, interface, nonlocal, phase field

Procedia PDF Downloads 113
423 The Influence of Fiber Fillers on the Bonding Safety of Wood-Adhesive Interfaces: A Fracture Energetic Approach

Authors: M. H. Brandtner-Hafner

Abstract:

Adhesives have established themselves as an innovative joining technology in the wood industry. The strengths of adhesive bonding lie in the realization of lightweight designs, the avoidance of material weakening, and the joining of different types of materials. There is now a number of ways to positively influence the properties of bonded joints. One way is to add fiber fillers. This leads to an improvement in adhesion, structural integrity, and fracture toughness. In this study, the effectiveness of fiber-modified adhesives for bonding wooden joints is reviewed. A series of experimental tests were performed using the fracture analytical GF-principle to study the adhesive bonding safety and performance of the wood-adhesive interface. Two different construction adhesives based on epoxy and PUR were modified with different fiber materials and applied to bond wooden joints. The results show that bonding efficiency by adding fibrous materials to the bonding matrix leads to significant improvements in structural material properties.

Keywords: fiber-modified adhesives, bonding safety, wood-adhesive interfaces, fracture analysis

Procedia PDF Downloads 71
422 How Trust Functions in Fostering Innovation and Technology Development

Authors: Obidimma Ezezika

Abstract:

In light of the increasing importance of trust in development programs, the purpose of this study, was to identify how trust functions as an essential key determinant in successful innovation and technology development programs. Using projects in the agricultural sector as case studies, we determined how the concept of trust is understood. Our data collection relied on semi-structured, face-to-face interviews conducted as part of a larger study investigating the role of trust in development programs. Interview transcripts were analyzed to create a narrative on how trust is understood by the study’s participants and how trust functions in fostering innovation. We identified six themes and showed how trust plays an important factor in innovation. These themes included the practice of integrity and honesty; delivery of results in an accountable manner; capability and competency; sharing of the same objectives and interests; transparency about actions and intentions through clear communication; and the targeting of services toward the interests of the public. The results of this study can provide guidance on how to enhance implementation mechanisms and provide impetus for organizations to implement trust building activities in fostering effective innovation.

Keywords: trust, research, innovation, technology

Procedia PDF Downloads 456
421 Causes of Institutionalization of Children and Adolescents in a Shelter in Brazil

Authors: Eduardo Guilherme, Sabrina Duarte

Abstract:

Shelters or orphanages are institutions responsible for ensuring the physical and mental integrity of children and adolescents who had their rights violated or neglected, whether from a social-leavers, is at personal risk to which they were exposed or the negligence of its parents; in Brazil about twenty thousand children and adolescents living in about five hundred registered shelters that receive funds from the federal government. We evaluated the records of institutionalized children and adolescents from the foundation of municipal shelter in Rio Negro/Parana State, Brazil since June/2000 to February/2015. Institutionalization of the causes cited were: lack of family/guardian material resources, abandonment by parents/guardians, domestic violence, substance abuse of parents/guardians, street experience, orphans and others. In Brazil, poverty and extreme poverty are closely related to the institutionalization of causes of children and adolescents. Census data in 2010, the Brazilian Institute of Geography and Statistics (IBGE) indicate that 40% of Brazilians living in poverty are girls and boys up to 14 years in a total of approximately 23 million individuals. Poverty denies children and adolescents their rights, representing a vulnerability which predisposes to some causes of shelter.

Keywords: Brazil, shelter, orphanages, institutionalization

Procedia PDF Downloads 453
420 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning

Procedia PDF Downloads 122
419 Experimental and Numerical Investigation of “Machining Induced Residual Stresses” during Orthogonal Machining of Alloy Steel AISI 4340

Authors: Theena Thayalan, K. N. Ramesh Babu

Abstract:

Machining induced residual stress (RS) is one of the most important surface integrity parameters that characterize the near surface layer of a mechanical component, which plays a crucial role in controlling the performance, especially its fatigue life. Since experimental determination of RS is expensive and time consuming, it would be of great benefit if they could be predicted. In such case, it would be possible to select the cutting parameters required to produce a favorable RS profile. In the present study, an effort has been made to develop a 'two dimensional finite element model (FEM)' to simulate orthogonal cutting process and to predict surface and sub-surface RS using the commercial FEA software DEFORM-2D. The developed finite element model has been validated through experimental investigation of RS. In the experimentation, the orthogonal cutting tests were carried out on AISI 4340 by varying the cutting speed (VC) and uncut chip thickness (f) at three levels and the surface & sub-surface RS has been measured using XRD and Electro polishing techniques. The comparison showed that the RS obtained using developed numerical model is in reasonable agreement with that of experimental data.

Keywords: FEM, machining, residual stress, XRF

Procedia PDF Downloads 315
418 A Comprehensive Model of Professional Ethics Based on the Teachings of the Holy Quran

Authors: Zahra Mohagheghian, Fatema Agharebparast

Abstract:

Professional ethic is a subject that has been an issue today, so most of the businesses, including the teaching profession, understand the need and importance of it. So they need to develop a code of professional ethics for their own. In this regard, this study seeks to answer the question, with respect to the integrity of the Qur'an (Nahl / 89), is it possible to contemplate the divine teachers conduct to extract the divine pattern for teaching and training? In the code of conduct for divine teachers what are the most important moral obligations and duties of the teaching professionals? The results of this study show that the teaching of Khidr, according to the Quran’s verses, Abundant and subtle hints emphasized that it can be as comprehensive and divine pattern used in teaching and in the drafting of the charter of professional ethics of teachers used it. Also, the results show that in there have been many ethical principles in prophet Khidr’s teaching pattern.The most important ethical principles include: Student assessment, using objective and not subjective examples, assessment during teaching, flexibility, and others. According to each of these principles can help teachers achieve their educational goals and lead human being in their path toward spiritual evaluation.

Keywords: professional ethics, teaching-learning process, teacher, student, Quran

Procedia PDF Downloads 270
417 An Investigation on Orthopedic Rehabilitation by Avoiding Thermal Necrosis

Authors: R. V. Dahibhate, A. B. Deoghare, P. M. Padole

Abstract:

Maintaining natural integrity of biosystem is paramount significant for orthopedic surgeon while performing surgery. Restoration is challenging task to rehabilitate trauma patient. Drilling is an inevitable procedure to fix implants. The task leads to rise in temperature at the contact site which intends to thermal necrosis. A precise monitoring can avoid thermal necrosis. To accomplish it, data acquiring instrument is integrated with the drill bit. To contemplate it, electronic feedback system is developed. It not only measures temperature without any physical contact in between measuring device and target but also visualizes the site and monitors correct movement of tool path. In the current research work an infrared thermometer data acquisition system is used which monitors variation in temperature at the drilling site and a camera captured movement of drill bit advancement. The result is presented in graphical form which represents variations in temperature, drill rotation and time. A feedback system helps in keeping drill speed in threshold limit.

Keywords: thermal necrosis, infrared thermometer, drilling tool, feedback system

Procedia PDF Downloads 206
416 Effect of Load Ratio on Probability Distribution of Fatigue Crack Propagation Life in Magnesium Alloys

Authors: Seon Soon Choi

Abstract:

It is necessary to predict a fatigue crack propagation life for estimation of structural integrity. Because of an uncertainty and a randomness of a structural behavior, it is also required to analyze stochastic characteristics of the fatigue crack propagation life at a specified fatigue crack size. The essential purpose of this study is to present the good probability distribution fit for the fatigue crack propagation life at a specified fatigue crack size in magnesium alloys under various fatigue load ratio conditions. To investigate a stochastic crack growth behavior, fatigue crack propagation experiments are performed in laboratory air under several conditions of fatigue load ratio using AZ31. By Anderson-Darling test, a goodness-of-fit test for probability distribution of the fatigue crack propagation life is performed and the good probability distribution fit for the fatigue crack propagation life is presented. The effect of load ratio on variability of fatigue crack propagation life is also investigated.

Keywords: fatigue crack propagation life, load ratio, magnesium alloys, probability distribution

Procedia PDF Downloads 616
415 Study of Transformer and Motor Winding under Pulsed Power Application

Authors: Arijit Basuray, Saibal Chatterjee

Abstract:

Pulsed Power in the form of Recurrent Surge Generator (RSG) can be used for testing various parameters of Motor or Transformer windings including inter-turn, interlayer insulation. Windings with solid insulation in motor and transformer have many interfaces and undesirable defects, and these defects can be exposed under this nondestructive testing methodology. Due to rapid development in power electronics variable frequency drives (VFD), Dry Type or cast resin Transformer used with PWM Sine wave inverters for solar power, solid insulation system used nowadays are shifting more and more to a high-frequency application. Authors have used the recurrent surge generator for testing winding integrity as well as Partial Discharge(PD) at fast rising voltage enabling PD measurement at closer situation under which the insulation system is supposed to work. Authors have discussed test results on a different system with recurrent surge voltages of different rise time.

Keywords: fast rising voltage, partial discharge, pulsed power, recurrent surge generator, solid insulation

Procedia PDF Downloads 249
414 Comparative Pre-treatment Analysis of RNA-Extraction Methods and Efficient Detection of SARS-COV-2 and PMMoV in Influents and 1ˢᵗ Sedimentation from a Wastewater Treatment Plan

Authors: Jesmin Akter, Chang Hyuk Ahn, Ilho Kim, Fumitake Nishimura, Jaiyeop Lee

Abstract:

This study aimed to compare two pre-treatment and two RNA extraction methods, namely PEG, and Nano bubble, Viral RNA Soil, and Mini Kit, in terms of their efficiency in detecting SARS-CoV-2 and PMMoV in influent and 1st sedimentation samples from a wastewater treatment plant. The extracted RNA samples were quantified and evaluated for purity, yield, and integrity. The results indicated that the nanobubble PEG method provided the highest yield of RNA, while the QIAamp Viral RNA Mini Kit produced the purest RNA samples. In terms of sensitivity and specificity, all these methods were able to detect SARS-CoV-2 and PMMoV in both influent and 1st sedimentation samples. However, the nanobubble PEG method showed slightly higher sensitivity compared to the other methods. These findings suggest that the choice of RNA extraction method should depend on the downstream application and the quality of the RNA required. The study also highlights the potential of wastewater-based epidemiology as an effective and non-invasive method for monitoring the spread of infectious diseases in a community.

Keywords: influent, PMMoV, SARS-CoV-2, wastewater based epidemiology

Procedia PDF Downloads 66
413 Electoral Violence and Women in Politics: A Case Study of Pakistan

Authors: Mariam Arif

Abstract:

The objective of the current study is to find out the electoral violence against women and its implications on their political participation. This paper is a qualitative study to get an in-depth analysis of the phenomenon. This study used questionnaires and interviews for findings. This paper attempts to study electoral violence and women in politics in Pakistan. The study concluded that women are subjected to different categories of violence defined as physical violence that involves sexual and bodily harm to a politically active woman or to people associated with her. Social and psychological violence includes class difference, stress, social limitations, family pressure and character assassination. Economic violence is defined as a systematic restriction of access to economic resources available to women thus hinder women active participation in politics (elections). All these violence against women in elections are threat to the integrity of the electoral process of the country that eventually affects women’s participation as voters, party candidates, election officials and political party leaders. It also undermines the free and fair democratic process. This qualitative paper shows a significant negative relationship between electoral violence and women participation in politics.

Keywords: elections, politics, violence, women

Procedia PDF Downloads 126
412 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 247
411 Functional Instruction Set Simulator (ISS) of a Neural Network (NN) IP with Native BF-16 Generator

Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula

Abstract:

A Functional Model to mimic the functional correctness of a Neural Network Compute Accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of gcc compilers to BF-16 datatype, which we addressed with a native BF-16 generator integrated to our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex Neural Network Accelerator design by proposing a Functional Model-based scoreboard or Software model using SystemC. The proposed Functional Model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT bringing up micro-steps of execution.

Keywords: ISA (instruction set architecture), NN (neural network), TLM (transaction-level modeling), GEMM (general matrix multiplication)

Procedia PDF Downloads 48