Search results for: Kraft paper
15386 Reduce, Reuse and Recycle: Grand Challenges in Construction Recovery Process
Authors: Abioye A. Oyenuga, Rao Bhamidimarri
Abstract:
Hurling a successful Construction and Demolition Waste (C&DW) recycling operation around the globe is a challenge today, predominantly because secondary materials markets are yet to be integrated. Reducing, Reusing and recycling of (C&DW) have been employed over the years, and various techniques have been investigated. However, the economic and environmental viability of its application seems limited. This paper discusses the costs and benefits in using secondary materials and focus on investigating reuse and recycling process for five major types of construction materials: concrete, metal, wood, cardboard/paper and plasterboard. Data obtained from demolition specialists and contractors are considered and evaluated. The research paper found that construction material recovery process fully incorporate a 3R’s principle contributing to saving energy and natural resources. This scrutiny leads to the empathy of grand challenges in construction material recovery process. Recommendations to deepen material recovery process are also discussed.
Keywords: Construction & Demolition Waste (C&DW), 3R concept, Recycling, Reuse, Life-Cycle Assessment (LCA), Waste Management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 510015385 The Appeal of Vocal Islamism in the West: The Case of Hizb ut-Tahrir vis-à-vis Its Competitors
Authors: Elisa Orofino
Abstract:
Islamism is a very debated topic in the West but almost exclusively explored in its violent forms. Nevertheless, a number of “vocal radical Islamist” groups exist in the West and legally operate because of their non-violent nature. Vocal radicals continually inspire individuals and lead them towards specific goals and priorities, sometimes even towards violence. This paper uses the long-living group Hizb ut-Tahrir (HT) to explore the elements that make the organization appealing to segments of Muslim community in the West. This paper uses three agency variables - reflexive monitoring, the rationalization of action and the motivations for actions – to analyze HT’s appeal vis-à-vis two other Islamist groups, Ikhwan al-Muslimun and Jamaat-e-Islami (JeI), having similar goals and the same high international profile. This paper concludes that HT’s uniqueness is given by its method, detailed vision of the caliphate, consistency over time and the emphasis placed on the caliphate as the leading force of HT’s unchanged motivation for action.
Keywords: Agency, Caliphate, Radicalization, Vocal Radicals.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 78815384 Effect of Fuel Lean Reburning Process on NOx Reduction and CO Emission
Authors: Changyeop Lee, Sewon Kim
Abstract:
Reburning is a useful technology in reducing nitric oxide through injection of a secondary hydrocarbon fuel. In this paper, an experimental study has been conducted to evaluate the effect of fuel lean reburning on NOx/CO reduction in LNG flame. Experiments were performed in flames stabilized by a co-flow swirl burner, which was mounted at the bottom of the furnace. Tests were conducted using LNG gas as the reburn fuel as well as the main fuel. The effects of reburn fuel fraction and injection manner of the reburn fuel were studied when the fuel lean reburning system was applied. The paper reports data on flue gas emissions and temperature distribution in the furnace for a wide range of experimental conditions. At steady state, temperature distribution and emission formation in the furnace have been measured and compared. This paper makes clear that in order to decrease both NOx and CO concentrations in the exhaust when the pulsated fuel lean reburning system was adapted, it is important that the control of some factors such as frequency and duty ratio. Also it shows the fuel lean reburning is also effective method to reduce NOx as much as reburning.
Keywords: Fuel lean reburn, NOx, CO, LNG flame.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 220115383 Automatic Flood Prediction Using Rainfall Runoff Model in Moravian-Silesian Region
Authors: B. Sir, M. Podhoranyi, S. Kuchar, T. Kocyan
Abstract:
Rainfall runoff models play important role in hydrological predictions. However, the model is only one part of the process for creation of flood prediction. The aim of this paper is to show the process of successful prediction for flood event (May 15 – May 18 2014). Prediction was performed by rainfall runoff model HEC–HMS, one of the models computed within Floreon+ system. The paper briefly evaluates the results of automatic hydrologic prediction on the river Olše catchment and its gages Český Těšín and Věřňovice.Keywords: Flood, HEC-HMS, Prediction, Rainfall – Runoff.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 222715382 Production and Recycling of Construction and Demolition Waste
Authors: Vladimira Vytlacilova
Abstract:
Recycling of construction and demolition waste (C&DW) and their new reuse in structures is one of the solutions of environmental problems. Construction and demolition waste creates a major portion of total solid waste production in the world and most of it is used in landfills all the time. The paper deals with the situation of the recycling of the building and demolition waste in the Czech Republic during the recent years. The paper is dealing with questions of C&D waste recycling, it also characterizes construction and demolition waste in general, furthermore it analyses production of construction waste and subsequent production of recycled materials.Keywords: Recycling, Construction and demolition waste, Recycled rubble, Waste management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 77015381 Sustainable Urban Waterfronts Using Sustainability Assessment Rating System
Authors: R. M. R. Hussein
Abstract:
Sustainable urban waterfront development is one of the most interesting phenomena of urban renewal in the last decades. However, there are still many cities whose visual image is compromised due to the lack of a sustainable urban waterfront development, which consequently affects the place of those cities globally. This paper aims to reimagine the role of waterfront areas in city design, with a particular focus on Egypt, so that they provide attractive, sustainable urban environments while promoting the continued aesthetic development of the city overall. This aim will be achieved by determining the main principles of a sustainable urban waterfront and its applications. This paper concentrates on sustainability assessment rating systems. A number of international case-studies, wherein a city has applied the basic principles for a sustainable urban waterfront and have made use of sustainability assessment rating systems, have been selected as examples which can be applied to the urban waterfronts in Egypt. This paper establishes the importance of developing the design of urban environments in Egypt, as well as identifying the methods of sustainability application for urban waterfronts.
Keywords: Sustainable Urban Waterfront, Green Infrastructure, Energy Efficient, Cairo.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 349415380 A Comparative Analysis of Zotero and Mendeley Reference Management Software
Authors: Sujit K. Basak
Abstract:
This paper presents a comparison of the reference management software between Zotero and Mendeley and the results were drawn by comparing the two software’s. The novelty of this paper is the comparative analysis of the software and it has shown that Mendeley can import more information from the Google Scholar for the researchers. This finding can help to know researchers to use the reference management software.
Keywords: Analysis, comparative analysis, zotero, researchers, Mendeley.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 320415379 Semantic Web as an Enabling Technology for Better e-Services Addoption
Authors: Luka Pavlič, Marjan Heričko
Abstract:
E-services have significantly changed the way of doing business in recent years. We can, however, observe poor use of these services. There is a large gap between supply and actual eservices usage. This is why we started a project to provide an environment that will encourage the use of e-services. We believe that only providing e-service does not automatically mean consumers would use them. This paper shows the origins of our project and its current position. We discuss the decision of using semantic web technologies and their potential to improve e-services usage. We also present current knowledge base and its real-world classification. In the paper, we discuss further work to be done in the project. Current state of the project is promising.Keywords: E-Services, E-Services Repository, Ontologies, Semantic Web
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 140015378 Human Rights in Armed Conflicts and Constitutional Law
Authors: Antonios Maniatis
Abstract:
The main purpose of this paper is to determine the impact of both International Humanitarian Law and anti-piracy International Law on Constitutional Law. International Law is endowed with a rich set of norms on the protection of private individuals in armed conflicts and copes with the diachronic crime of maritime piracy, which may be considered as a private war in the high seas. Constitutional Law has been traditionally geared at two generations of fundamental rights. The paper will aim at answering the question “Which is the profile of 3G constitutional rights, particularly in the light of International Humanitarian Law?”
Keywords: Constitution, Humanitarian International Law, Piracy, 3G fundamental rights.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 150215377 A Cognitive Architectural Approach to the Institutional Roles of Agent Societies
Authors: Antônio Carlos da Rocha Costa
Abstract:
This paper concerns a formal model to help the simulation of agent societies where institutional roles and institutional links can be specified operationally. That is, this paper concerns institutional roles that can be specified in terms of a minimal behavioral capability that an agent should have in order to enact that role and, thus, to perform the set of institutional functions that role is responsible for. Correspondingly, the paper concerns institutional links that can be specified in terms of a minimal interactional capability that two agents should have in order to, while enacting the two institutional roles that are linked by that institutional link, perform for each other the institutional functions supported by that institutional link. The paper proposes a cognitive architecture approach to institutional roles and institutional links, that is, an approach in which a institutional role is seen as an abstract cognitive architecture that should be implemented by any concrete agent (or set of concrete agents) that enacts the institutional role, and in which institutional links are seen as interactions between the two abstract cognitive agents that model the two linked institutional roles. We introduce a cognitive architecture for such purpose, called the Institutional BCC (IBCC) model, which lifts Yoav Shoham-s BCC (Beliefs-Capabilities-Commitments) agent architecture to social contexts. We show how the resulting model can be taken as a means for a cognitive architecture account of institutional roles and institutional links of agent societies. Finally, we present an example of a generic scheme for certain fragments of the social organization of agent societies, where institutional roles and institutional links are given in terms of the model.Keywords: Simulation of agent societies, institutional roles, cognitive architecture of institutional roles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 141815376 A Primer to the Learning Readiness Assessment to Raise the Sharing of e-Health Knowledge amongst Libyan Nurses
Authors: Mohamed Elhadi M. Sharif, Mona Masood
Abstract:
The usage of e-health facilities is seen to be the first priority by the Libyan government. As such this paper focuses on how the key factors or elements of working size in terms of technological availability, structural environment, and other competence-related matters may affect nurses’ sharing of knowledge in e-health. Hence, this paper investigates learning readiness assessment to raise e-health for Libyan regional hospitals by using ehealth services in nursing education.
Keywords: Libyan nurses, e-Learning readiness, e-Health.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 217215375 IoT Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework
Authors: Femi Elegbeleye, Seani Rananga
Abstract:
This paper focused on cost effective storage architecture using fog and cloud data storage gateway, and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. Several results obtained from this study on data privacy models show that when two or more data privacy models are integrated via a fog storage gateway, we often have more secure data. Our main focus in the study is to design a framework for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, including its structure, and its interrelationships.
Keywords: IoT, fog storage, cloud storage, data analysis, data privacy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24415374 Hotel Guest's Liability for Non-Payment of Hotel Services in Comparative Law
Authors: Oliver Radolović
Abstract:
The subject of the paper is comparative analysis of the hotel guest-s contractual liability for breaching the obligation for non-payment of hotel services in the hotel-keeper-s contract. The paper is methodologically conceived of six chapters (1. introduction, 2. comparative law sources of the hotel-keeper-s contract, 3. the guest-s obligation for payment of hotel services, 4. hotel guest's liability for non-payment, 5. the hotel-keeper-s rights due to nonpayment and 6. conclusion), which analyzes the guest-s liability for non-payment of hotel services through the international law, European law, euro-continental national laws (France, Germany, Italy, Croatia) and Anglo-American national laws (UK, USA). The paper-s results are the synthesis of answers to the set hypothesis and comparative review of hotel guest-s contractual liability for nonpayment of hotel services provided. In conclusion, it is necessary to adopt an international convention on the hotel-keeper-s contract, which would unify the institute of the hotel guest-s contractual liability for non-payment of hotel services at the international level.
Keywords: Comparative law, hotel guest's contractual liability, non-payment, hotel-keeper's contract.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 505615373 Visualization of Latent Sweat Fingerprints Deposit on Paper by Infrared Radiation and Blue Light
Authors: Xiaochun Huang, Xuejun Zhao, Yun Zou, Feiyu Yang, Wenbin Liu, Nan Deng, Ming Zhang, Nengbin Cai
Abstract:
A simple device termed infrared radiation (IR) was developed for rapid visualization of sweat fingerprints deposit on paper with blue light (450 nm, 11 W). In this approach, IR serves as the pretreatment device before the sweat fingerprints was illuminated by blue light. An annular blue light source was adopted for visualizing latent sweat fingerprints. Sample fingerprints were examined under various conditions after deposition, and experimental results indicate that the recovery rate of the latent sweat fingerprints is in the range of 50%-100% without chemical treatments. A mechanism for the observed visibility is proposed based on transportation and re-impregnation of fluorescer in paper at the region of water. And further exploratory experimental results gave the full support to the visible mechanism. Therefore, such a method as IR-pretreated in detecting latent fingerprints may be better for examination in the case where biological information of samples is needed for consequent testing.
Keywords: Forensic science, visualization, infrared radiation, blue light, latent sweat fingerprints, detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 146315372 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment
Authors: Wenqing Fan, Yixuan Cheng, Wei Huang
Abstract:
The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.
Keywords: DIR Triad Model, DVE, vulnerability intelligence, vulnerability recurrence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 69115371 Multisensor Agent Based Intrusion Detection
Authors: Richard A. Wasniowski
Abstract:
In this paper we propose a framework for multisensor intrusion detection called Fuzzy Agent-Based Intrusion Detection System. A unique feature of this model is that the agent uses data from multiple sensors and the fuzzy logic to process log files. Use of this feature reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that provides a prototype implementation. This paper discusses also the issues of combining intelligent agent technology with the intrusion detection domain.Keywords: Intrusion detection, fuzzy logic, agents, networksecurity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 191915370 The Way Classroom Functions: Another Hidden Curriculum to be Explored
Authors: Victoria Konidari, Yvan Abernot
Abstract:
This paper seeks to explore the actual classroom setting, to examine its role for students- learning, and attitude in the class. It presents a theoretical approach of the classroom as system to be explored and examines the concrete reality of Greek secondary education students, under the light of the above approach. Based on the findings of a quantitative and qualitative research, authors propose a rather ontological approach of the classroom and underline what the key-elements for such approach should be. The paper explores extensively the theoretical dimensions for the change of paradigm required and addresses the new issues to be considered.Keywords: Group, class, collective subject, field, temporality, ontology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 158615369 A New Controlling Parameter in Design of Above Knee Prosthesis
Abstract:
In this paper after reviewing some previous studies, in order to optimize the above knee prosthesis, beside the inertial properties a new controlling parameter is informed. This controlling parameter makes the prosthesis able to act as a multi behavior system when the amputee is opposing to different environments. This active prosthesis with the new controlling parameter can simplify the control of prosthesis and reduce the rate of energy consumption in comparison to recently presented similar prosthesis “Agonistantagonist active knee prosthesis". In this paper three models are generated, a passive, an active, and an optimized active prosthesis. Second order Taylor series is the numerical method in solution of the models equations and the optimization procedure is genetic algorithm. Modeling the prosthesis which comprises this new controlling parameter (SEP) during the swing phase represents acceptable results in comparison to natural behavior of shank. Reported results in this paper represent 3.3 degrees as the maximum deviation of models shank angle from the natural pattern. The natural gait pattern belongs to walking at the speed of 81 m/min.Keywords: Above knee prosthesis, active controlling parameter, ballistic motion, swing phase.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 187315368 Counterfeit Drugs Prevention in Pharmaceutical Industry with RFID: A Framework Based On Literature Review
Authors: Zeeshan Hamid, Asher Ramish
Abstract:
The purpose of this paper is to focus on security and safety issues facing by pharmaceutical industry globally when counterfeit drugs are in question. Hence, there is an intense need to secure and authenticate pharmaceutical products in the emerging counterfeit product market. This paper will elaborate the application of radio frequency identification (RFID) in pharmaceutical industry and to identify its key benefits for patient’s care. The benefits are: help to co-ordinate the stream of supplies, accuracy in chains of supplies, maintaining trustworthy information, to manage the operations in appropriate and timely manners and finally deliver the genuine drug to patient. It is discussed that how RFID supported supply chain information sharing (SCIS) helps to combat against counterfeit drugs. And a solution how to tag pharmaceutical products; since, some products prevent RFID implementation in this industry. In this paper, a proposed model for pharma industry distribution suggested to combat against the counterfeit drugs when they are in supply chain.
Keywords: Supply chain, RFID, pharmaceutical industry, counterfeit drugs, patients care.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 465715367 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: Cybercrime, cybersecurity, computer emergency response team, computer security incident response team.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 209115366 The Use of Network Theory in Heritage Cities
Authors: J. L. Oliver, T. Agryzkov, L. Tortosa, J. Vicent, J. Santacruz
Abstract:
This paper aims to demonstrate how the use of Network Theory can be applied to a very interesting and complex urban situation: The parts of a city which may have some patrimonial value, but because of their lack of relevant architectural elements, they are not considered to be historic in a conventional sense. In this paper, we use the suburb of La Villaflora in the city of Quito, Ecuador as our case study. We first propose a system of indicators as a tool to characterize and quantify the historic value of a geographic area. Then, we apply these indicators to the suburb of La Villaflora and use Network Theory to understand and propose actions.Keywords: Data visualization, historic value, spatial analysis, urban networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 110715365 The Analysis of Duct Model Through Structural and Dynamic Schemes
Authors: S. H. Yahaya, J. M. Ali, M. R. Arham
Abstract:
This paper presents the analysis of duct design using static and dynamic approaches. The static approach is used to find out applicability between the design and material applied. The material used in this paper is Thermoplastic Olefins (TPO). For the dynamic approach, the focusing is only on the CFD simulations. The fatigue life in this design and material applied also covered.Keywords: CFD, structural analysis, fluid analysis, duct design, fatigue life
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 229815364 Mitigation of ISI for Next Generation Wireless Channels in Outdoor Vehicular Environments
Authors: Mohd. Israil, M. Salim Beg
Abstract:
In order to accommodate various multimedia services, next generation wireless networks are characterized by very high transmission bit rates. Thus, in such systems and networks, the received signal is not only limited by noise but - especially with increasing symbols rate often more significantly by the intersymbol interference (ISI) caused by the time dispersive radio channels such as those are used in this work. This paper deals with the study of the performance of detector for high bit rate transmission on some worst case models of frequency selective fading channels for outdoor mobile radio environments. This paper deals with a number of different wireless channels with different power profiles and different number of resolvable paths. All the radio channels generated in this paper are for outdoor vehicular environments with Doppler spread of 100 Hz. A carrier frequency of 1800 MHz is used and all the channels used in this work are such that they are useful for next generation wireless systems. Schemes for mitigation of ISI with adaptive equalizers of different types have been investigated and their performances have been investigated in terms of BER measured as a function of SNR.Keywords: Mobile channels, Rayleigh Fading, Equalization, NMLD.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 142115363 Comparative Emission Analysis of Gasoline/LPG Automotive Bifuel Engine
Authors: R.R. Saraf, S.S.Thipse, P.K.Saxena
Abstract:
This paper presents comparative emission study of newly introduced gasoline/LPG bifuel automotive engine in Indian market. Emissions were tested as per LPG-Bharat stage III driving cycle. Emission tests were carried out for urban cycle and extra urban cycle. Total time for urban and extra urban cycle was 1180 sec. Engine was run in LPG mode by using conversion system. Emissions were tested as per standard procedure and were compared. Corrected emissions were computed by deducting ambient reading from sample reading. Paper describes detail emission test procedure and results obtained. CO emissions were in the range of38.9 to 111.3 ppm. HC emissions were in the range of 18.2 to 62.6 ppm. Nox emissions were 08 to 3.9 ppm and CO2 emissions were from 6719.2 to 8051 ppm. Paper throws light on emission results of LPG vehicles recently introduced in Indian automobile market. Objectives of this experimental study were to measure emissions of engines in gasoline & LPG mode and compare them.Keywords: Gasoline, LPG, Emission, Bifuel, Engine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 340415362 Investigating the Transformer Operating Conditions for Evaluating the Dielectric Response
Authors: Jalal M. Abdallah
Abstract:
This paper presents an experimental investigation of transformer dielectric response and solid insulation water content. The dielectric response was carried out on the base of Hybrid Frequency Dielectric Spectroscopy and Polarization Current measurements method (FDS &PC). The calculation of the water content in paper is based on the water content in oil and the obtained equilibrium curves. A reference measurements were performed at equilibrium conditions for water content in oil and paper of transformer at different stable temperatures (25, 50, 60 and 70°C) to prepare references to evaluate the insulation behavior at the not equilibrium conditions. Some measurements performed at the different simulated normal working modes of transformer operation at the same temperature where the equilibrium conditions. The obtained results show that when transformer temperature is mach more than the its ambient temperature, the transformer temperature decreases immediately after disconnecting the transformer from the network and this temperature reduction influences the transformer insulation condition in the measuring process. In addition to the oil temperature at the near places to the sensors, the temperature uniformity in transformer which can be changed by a big change in the load of transformer before the measuring time will influence the result. The investigations have shown that the extremely influence of the time between disconnecting the transformer and beginning the measurements on the results. And the online monitoring for water content in paper measurements, on the basis of the oil water content on line monitoring and the obtained equilibrium curves. The measurements where performed continuously and for about 50 days without any disconnection in the prepared the adiabatic room.Keywords: Conductivity, Moisture, Temperature, Oil-paperinsulation, Online monitoring, Water content in oil.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 264715361 Classification of Causes and Effects of Uploading and Downloading of Pirated Film Products
Authors: Pavel Janak
Abstract:
This paper covers various aspects of the Internet film piracy. In order to successfully deal with this matter, it is needed to recognize and explain various motivational factors related to film piracy. Thus, this study proposes groups of economical, sociopsychological and other factors that could motivate individuals to engage in pirate activities. The paper also studies the interactions between downloaders and uploaders and offers the causality of the motivational factors and its effects on the film industry. Moreover, the study also focuses on proposed scheme of relations of downloading movies and the possible effect on box office revenues.Keywords: Download, Film piracy, Internet, Upload
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 312115360 Removal of Chlorinated Resin and Fatty Acids from Paper Mill wastewater through Constructed Wetland
Authors: Ashutosh Kumar Choudhary, Satish Kumar, Chhaya Sharma
Abstract:
This study evaluates the performance of horizontal subsurface flow constructed wetland (HSSF-CW) for the removal of chlorinated resin and fatty acids (RFAs) from pulp and paper mill wastewater. The dimensions of the treatment system were 3.5 m x 1.5 m x 0.28 m with surface area of 5.25 m2, filled with fine sand and gravel. The cell was planted with an ornamental plant species Canna indica. The removal efficiency of chlorinated RFAs was in the range of 92-96% at the hydraulic retention time (HRT) of 5.9 days. Plant biomass and soil (sand and gravel) were analyzed for chlorinated RFAs content. No chlorinated RFAs were detected in plant biomass but detected in soil samples. Mass balance studies of chlorinated RFAs in HSSF-CW were also carried out.Keywords: Canna indica, Chlorinated resin & fatty acids, Constructed wetland, Pulp and paper mill wastewater.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 216915359 Using Knowledge Management for Creating Knowledge Society through e-Government Services in Montenegro
Authors: Tamara Djurickovic
Abstract:
The waves of eGovernment are rising very fast through almost all public administration, or at least most of the public administrations around the world, and not only the public administration, but also the entire government and all of their organization as a whole. The government uses information technology, and above all the internet or web network, to facilitate the exchange of services between government agencies and citizens, businesses, employees and other non-governmental agencies. With efficient and transparent information exchange, the information becomes accessible to the society (citizens, business, employees etc.), and as a result of these processes the society itself becomes the information society or knowledge society. This paper discusses the knowledge management for eGovernment development in significance and role. Also, the paper reviews the role of virtual communities as a knowledge management mechanism to support eGovernment in Montenegro. It explores the need for knowledge management in eGovernment, identifies knowledge management technologies, and highlights the challenges for developing countries, such as Montenegro in the implementation of eGovernment. The paper suggests that knowledge management is needed to facilitate information exchange and transaction processing with citizens, as well as to enable creation of knowledge society.Keywords: information, eGovernment, knowledge management, knowledge society
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 155715358 A Study on RFID Privacy Mechanism using Mobile Phone
Authors: Haedong Lee, Dooho Choi, Sokjoon Lee, Howon Kim
Abstract:
This paper is about hiding RFID tag identifier (ID) using handheld device like a cellular phone. By modifying the tag ID of objects periodically or manually using cellular phone built-in a RFID reader chip or with a external RFID reader device, we can prevent other people from gathering the information related with objects querying information server (like an EPC IS) with a tag ID or deriving the information from tag ID-s code structure or tracking the location of the objects and the owner of the objects. In this paper, we use a cryptographic algorithm for modification and restoring of RFID tag ID, and for one original tag ID, there are several different temporary tag ID, periodically.Keywords: EPC, RFID, Mobile RFID.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 180415357 Interactive Methods of Design Education as the Principles of Social Implications of Modern Communities
Authors: Pelin Yildiz
Abstract:
The term interactive education indicates the meaning related with multidisciplinary aspects of distance education following contemporary means around a common basis with different functional requirements. The aim of this paper is to reflect the new techniques in education with the new methods and inventions. These methods are better supplied by interactivity. The integration of interactive facilities in the discipline of education with distance learning is not a new concept but in addition the usage of these methods on design issue is newly being adapted to design education. In this paper the general approach of this method and after the analysis of different samples, the advantages and disadvantages of these approaches are being identified. The method of this paper is to evaluate the related samples and then analyzing the main hypothesis. The main focus is to mention the formation processes of this education. Technological developments in education should be filtered around the necessities of the design education and the structure of the system could then be formed or renewed. The conclusion indicates that interactive methods of education in design issue is a meaning capturing not only technical and computational intelligence aspects but also aesthetical and artistic approaches coming together around the same purpose.Keywords: Interactive education, distance learning, designeducation, computational intelligence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1642