Sustainable Engineering and Innovation (SEI - E-Journal)
Not a member yet
    81 research outputs found

    Performance evaluation of a parabolic cylinder collector applying the Monte Carlo ray tracing method

    Get PDF
    The purpose of this article is to evaluate the performance of a prototype parabolic trough collector for three proposed scenarios, where geometric designs with optical characteristics are tested according to the appropriate technological paradigm; low cost of maintenance and implementation, intensive local labor, materials and resources of the implementation area. The device was developed by the Energy, Automation and Control Systems Research Group GISEAC of the Unidades Tecnológicas de Santander for low-cost water heating; using materials and labor for its fabrication easily available locally. Monte Carlo ray tracing methodology was applied using the open-access software SolTrace and Tonatiuh. To select the geometric scenario to be simulated, the edge angle and the width of the primary reflection system of the device were varied. The results obtained showed that the aperture of the parabola has a direct impact on the drop in the concentration ratio (CR) percentage value and the performance of the prototype

    A data-driven approach for studying tribology based on experimentation and artificial intelligence coupling tools

    Get PDF
    Tribology problems generally, and particularly high-temperature tribology (HTT), is a critical and complex topic based on the interaction between several intrinsic and extrinsic parameters. This involved complex phenomena, resulting in synergistic effects between mechanical, physical, chemical, and thermal solicitations. Introducing artificial intelligence tools, coupled with the design of the experiment, is an original approach to implement a successful transition from traditional "experimental guidance" to "experimental guidance associated with a data-driven" approach. The current study delves into the utilization of machine learning (ML) with simulation to help in the choice of the parameters for experimentation, and the development of predictive models. A detailed framework that takes into account the coupling between such tools is presented. Different scenarios are discussed to data drive the collaborative schema between the design of experiment, numerical development, and ML algorithms. This approach gives several opportunities such as the identification of the well-impacted parameters, optimization of the experimental design, and the proposition of predictive models. With the suitable proposed model, time loss, production costs, precision results, and man-hours could be saved or improved

    Cybersecurity challenges across sustainable development goals: A comprehensive review

    Get PDF
    In an era where society becomes increasingly reliant on digital technology and interconnected systems, the significance of cybersecurity for upholding sustainable development has become paramount. The Sustainable Development Goals (SDGs) were adopted by the United Nations in 2015 as a universal call to action to end poverty, protect the planet, and ensure that by 2030, people enjoy peace and prosperity. As we draw closer to the critical year of 2030, the insights of this paper gain urgency in light of ongoing efforts to achieve the SDGs. This review paper takes an innovative stance by examining how cybersecurity challenges align with each SDG. The novelty of this study is that, it not only highlights the interconnected nature of cybersecurity within each goal but also identifies and categorizes the top five emerging threats that could impact the 17 goals. By pinpointing potential risks, it calls for further research and strategies to counter these cyber threats that might hinder the progress towards the SDGs. This research work serves as valuable guidance for researchers, policymakers, and practitioners, offering a comprehensive understanding of the intricate relationship between cybersecurity and sustainable development

    Rectangular small patch antenna

    No full text
    This paper discusses various challenges related to the antenna design process for sub 6 GHz, 5G communications. In the first example, the design is a square, simple antenna with two slots. Their parametric studies are made to see which parameters have affected the results. On the other hand, the second design for the antenna is represented as well, the design is still like a square, but the number of slots is bigger. The circular design of the antenna is also one of the most popular for 5G, but the results are not so good. For this kind of antenna below 6 GHz, a few slots are important, and a circular design is not the best idea. This antenna, the second design operates at 3.23 GHz with S11 of -14.3 dB, E-Theta of 5.73 dB, and E-Phi of -11.6 dB

    Integration of advanced digital technologies in the hospitality industry: A technological approach towards sustainability

    Get PDF
    The potential assimilation of Industry 4.0 technologies across diverse sectors unlocks the pathways to achieve sustainability through innovative infrastructure with sustainable approaches. The World Travel & Tourism Council’s (WTTC) 2023 report emphasizes the impact of the hospitality industry contributes $9.5 trillion to the gross domestic product (GDP) and provides a workforce of 320 million globally and also strives towards meeting sustainability. Driven by the facts above, this study conducted a review to explore the potentiality of Industry 4.0 technologies specifically focused on meeting sustainability. Along with the review, the study has proposed a scalable-based architecture with the assimilation of many Industry 4.0 technologies. Further, this study has analyzed the real-world examples of Industry 4.0 technologies adoption in the hospitality industry with an objective of innovation and sustainable practices. Finally, the articles discussed the recommendations that can empower the establishment of resilient infrastructure through Industry 4.0 technologies

    Finite element analysis of unreinforced masonry walls with different bond patterns

    Get PDF
    Masonry is the oldest building material, yet it is also the least understood due to the non-linear and composite nature of masonry, which consists of brick units, mortar, and unit-mortar contact. In this paper, the response of a two-dimensional masonry wall with a window opening subjected to an in-plane lateral pushover loading is simulated by varying the interface properties of brick such as crushing, elastic, cracking, and shear properties. The simplified micro-modeling technique with the Engineering Masonry model for bricks and linear stiffness properties for the interfaces in the bed and head joints is employed to investigate the geometric nonlinear behavior of the masonry wall. The pushover curves obtained from the numerical simulations indicate that there is a significant influence on the lateral load response of the wall due to elastic, crushing, and shear parameters while the cracking parameters have less impact on the ductile capacity of the structure. Moreover, the study is also extended to examine the effect of bond patterns such as English, Stretcher, Flemish, and Header bond with varied aspect ratios of 1,1.5 and 0.75. In all four bond patterns, it was observed that the walls with lower aspect ratios exhibited higher strength. Further, in comparison to the other bond patterns, walls with the Flemish bond pattern demonstrated higher strengths at both lower and higher aspect ratios

    Enhancing BYOD mobile device security in a hybrid environment

    Get PDF
    Research on enhancing Bring Your Own Device (BYOD) security in hybrid environments is critically relevant and important to protect data and ensure customer and organizational trust through the development of strong security policies. The study aims to develop and implement effective strategies and interventions that will help ensure that corporate data and resources are protected when employees use personal mobile devices in an environment where both on-premises and cloud-based resources are present. The methods used include analytical, deduction, modeling, statistical, and synthesis methods. This research identified specific vulnerabilities of potential threats to BYOD mobile devices in a hybrid environment and developed security strategies that include recommendations for creating a security policy and using a mobile device management system. The research led to the development of specific technical solutions, such as recommendations for mobile device configuration. This included educating employees and managers about security rules and the importance of adhering to security policies, and updated lists of current BYOD security threats and challenges given the changing threat environment. The practical value of the work lies in providing practical relevance to organizations by providing robust protection of sensitive data and resources, increasing employee comfort and confidence in the security of personal devices, easing IT departments’ tasks of device management and threat detection, and increasing customer and partner confidence in a security-layer organization

    A review of enhanced image techniques using chaos encryption

    Get PDF
    Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security

    Optimization of energy consumption in smart homes using firefly algorithm and deep neural networks

    Get PDF
    Electronic gadget advancements have increased the demand for IoT-based smart homes as the number of connected devices grows rapidly. The most prevalent connected electronic devices are smart environments in houses, grids, structures, and metropolises. Smart grid technology advancements have enabled smart structures to cover every nanosecond of energy use. The problem with smart, intelligent operations is that they use a lot more energy than traditional ones. Because of the growing growth of smart cities and houses, there is an increasing demand for efficient resource management. Energy is a valuable resource with a high unit cost. Consequently, authors are endeavoring to decrease energy usage, specifically in smart urban areas, while simultaneously ensuring a consistent terrain. The objective of this study is to enhance energy efficiency in intelligent buildings for both homes and businesses. For the comfort indicator ("thermal, visual, and air quality"), three parameters are used: temperature, illumination, and CO2. A hybrid rule-based Deep Neural Network (DNN) and Fire Fly (FF) algorithm are used to read the sensor parameters and to operate the comfort indication, as well as optimize energy consumption, respectively. The anticipated user attributes contributed to the system's enhanced performance in terms of the ease of use of the smart system and its energy usage. When compared to traditional approaches in expressions of Multi View with 98.23%, convolutional neural network (CNN) with 99.17%, and traffic automatic vehicle (AV) with 98.14%, the activities of the contributed approach are negligibly commanding

    Informational aspect of the process of functioning of unitary integrated informatics systems

    Get PDF
    The relevance of the subject under study is determined by the considerable spread of information technology in all spheres of modern life and the impact of informatics systems on society. The purpose of this study was to investigate the essence and resource of the integrated unitary management process, which formulates and reveals the concept of integrated unitary management process, its specified content, categories of resources, their interrelation, differentiation from the informative side of the functioning of this process, the sequence of integration of its elements. The conceptual essence and resources of the unitary management process are revealed. The hierarchy, ranks and conceptual value of the material-information processes of the management system objects are highlighted and characterized. In this study, results were obtained indicating that conceptually, an integrated unitary management system, compared to the existing discrete management system, is characterized by a range of key indicators. Specifically, all categories of human activity (material, informational: informative (situational, cognitive) and decisional) through their direct interrelations and interactions are realized as a unified whole. At the level of organization, the system is completed in the form of a material and informational core. Regardless of the dimensionality of the spatiotemporal rays of the system, the superiority of the managerial rank, the influence potential over any managed element has the same intensity as at the primary level. The functioning management system is an analog action that works in real-time in accordance with the decisional values of which the evolution of the managed subject automatically changes

    78

    full texts

    81

    metadata records
    Updated in last 30 days.
    Sustainable Engineering and Innovation (SEI - E-Journal) is based in Bosnia & Herzegovina
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇