{"title":"Effects of Conductive Electrode for Optimized Electrochemical Performances","authors":"Kue‐Ho Kim, Kiwhan Sung, H. Ahn","doi":"10.33422/6th-istconf.2019.07.414","DOIUrl":"https://doi.org/10.33422/6th-istconf.2019.07.414","url":null,"abstract":"Recently, global challenges related to increasing energy consumption have attracted many researches regarding the energy conservation and efficiency increasement. This has accelerated a performance enhancement for various electronic devices used in daily life that based on electrochemical reaction (electrochemical capacitors, Li-ion batteries, electrochromic devices etc.). The electrochemical reaction refers to the induction of an oxidation-reduction reaction in a material which accompanied with electrons and ion movement. Their performances are determined by the electrochemical reaction rate and quantity which occurs at the interface of electrode and electrolyte. The typical electrochemical devices are composed of three parts including active material layer, electrolyte layer and conductive electrode layer. Among them, conductive electrode layer transfers electrons through an external circuit and the electrical conductivity of this layer can significantly affect to the electrochemical reaction rate. In this study, we demonstrated the effects of conductive electrode layer on electrochemical device by varying the electrical conductivity of them and investigated their performance enhancement mechanisms systematically.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73187676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"(Un)limited-(Mis)Placed-Space(less): The Forms of Transformation from Istanbul to Bursa","authors":"Tuba Sarı","doi":"10.33422/6th-istconf.2019.07.409","DOIUrl":"https://doi.org/10.33422/6th-istconf.2019.07.409","url":null,"abstract":"The case of transformation is discussed with high-rise development that are presented as the sign and image of mega-cities in global scale. The paper aims to question the forms of spatial transformation created by high rises at the scale of the urban design considering criteria of the relationship between the natural-physical environment and architectural-structural identity. Also, it examines the effects of the transformation on the urban fabric and the silhouette with high-rise development. In the scope of the research, the field study contains two different building projects chosen according to the method of Convenience Sampling, Süzer Plaza rising in Istanbul and Tower Plaza project in Bursa. Istanbul and Bursa, which exhibit different characteristics in terms of urban settlement, scale and structuring character, reflect the common context problem in the frame of environment-context relation of high-rises. With this paper, it is aimed to evaluate highrises from the perspective of the relationship between context and environment considering the sustainability of urban aesthetic. While high-rises mostly stand out as the sign of economic and political power on the axis of central business areas, Süzer Plaza and Tower Plaza show such a behavior that cannot be established with regard to the architectural and urban scale, which does not take any criteria in the context of urban settlement decisions resulted in un-limited, mis-placed and space-less urban areas. In conclusion, the relationship between physical and natural environment becomes more difficult as height and scale increase considering height decisions are connected with urban landscape and silhouette.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77150781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chi Ping Li, M. Ling Chen, Chen Chen Tseng, Shu Ling Huang
{"title":"Monitoring of Thermal Effect of Redox Flow Battery by the Infrared Thermal Image Technology","authors":"Chi Ping Li, M. Ling Chen, Chen Chen Tseng, Shu Ling Huang","doi":"10.33422/6th-istconf.2019.07.412","DOIUrl":"https://doi.org/10.33422/6th-istconf.2019.07.412","url":null,"abstract":"RFB (redox flow battery) generate heat when consume the electric power in working state, and that will transfer into a thermal form emitted from the normal or abnormal state; therefore, it is important to control the thermal effect for battery’s performance and safety improvement. Specifically, RFB will bring big thermal effect when the cell charged or discharged by the higher electric current. Due to the different battery’s components and stack designs, the problems of RFB system identified by looking at the uneven heat distribution, the reduction of the battery's performance and life cycle. Therefore, it is important to understand the battery’s thermal effect in high-rate discharge or its thermal effect in overcharge cases for the state of battery’s health (SOH). Infrared thermal imager (IRTI) is a non-contact measurement, and that composed by the lens and computer analysis system. IRTI can detect a certain area of the temperature change, whereby the analysis can effectively identify the real hot spots, and make further improvements for RFB system’s design. In this study, we developed a single cell to design the battery’s stack of FB system and investigate battery’s performance changes. Infrared thermal imaging technology applied to analyze and evaluate the thermal effect of battery's stack effectively. The high-resolution images with the function of the temperature profile data used to evaluate the components of the stacks or the key materials for RFB performance, and explore the possibility of its development.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80093874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of API Management Solutions","authors":"Syed Ali, Tariq Rahim Soomro","doi":"10.33422/6th-istconf.2019.07.411","DOIUrl":"https://doi.org/10.33422/6th-istconf.2019.07.411","url":null,"abstract":"The aim of this paper is to perform a comparative study on Application Programming Interface (API) Management Solutions. API acts as the digital glue that links systems, applications, and services together to create influencing customer experiences. They help one rapidly develop interfaces between back-end systems and applications. Sharing these interfaces with their clients and developers can help one open revenue channels, bring new digital services to market and exceed customer expectations. In this paper solutions from the top 5 vendors were studied deeply with the focus on indutsry implementations, common widely used features, famous success stories from these vendors. Survey was also conducted on the related subject matter. In the end, contradictions and agreements were highlighted between the literature review and survey results.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74828989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Declarative configuration management for complex and dynamic networks","authors":"Xu Chen, Yun Mao, Z. Morley Mao, J. Merwe","doi":"10.1145/1921168.1921176","DOIUrl":"https://doi.org/10.1145/1921168.1921176","url":null,"abstract":"Network management and operations are complicated, tedious, and error-prone, requiring signifcant human involvement and domain knowledge. As the complexity involved inevitably grows due to larger scale networks and more complex protocol features, human operators are increasingly short-handed, despite the best effort from existing support systems to make it otherwise. This paper presents coolaid, a system under which the domain knowledge of device vendors and service providers is formally captured by a declarative language. Through effcient and powerful rule-based reasoning on top of a database-like abstraction over a network of devices, coolaid enables new management primitives to perform network-wide reasoning, prevent misconfguration, and automate network confguration, while requiring minimum operator effort. We describe the design and prototype implementation of coolaid, and demonstrate its effectiveness and scalability through various realistic network management tasks.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78278306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu Jin, N. Duffield, Alexandre Gerber, P. Haffner, S. Sen, Zhi-Li Zhang
{"title":"NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems","authors":"Yu Jin, N. Duffield, Alexandre Gerber, P. Haffner, S. Sen, Zhi-Li Zhang","doi":"10.1145/1921168.1921178","DOIUrl":"https://doi.org/10.1145/1921168.1921178","url":null,"abstract":"Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resolutions and overall can contribute to increased customer dissatisfaction. In this paper, we propose a proactive approach to facilitate troubleshooting customer edge problems and reducing customer tickets. Our system consists of: i) a ticket predictor which predicts future customer tickets; and ii) a trouble locator which helps technicians accelerate the troubleshooting process during field dispatches. Both components infer future tickets and trouble locations based on existing sparse line measurements, and the inference models are constructed automatically using supervised machine learning techniques. We propose several novel techniques to address the operational constraints in DSL networks and to enhance the accuracy of NEVERMIND. Extensive evaluations using an entire year worth of customer tickets and measurement data from a large network show that our method can predict thousands of future customer tickets per week with high accuracy and signifcantly reduce the time and effort for diagnosing these tickets. This is benefcial as it has the effect of both reducing the number of customer care calls and improving customer satisfaction.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87393051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simple yet efficient, transparent airtime allocation for TCP in wireless mesh networks","authors":"Ki-Young Jang, K. Psounis, R. Govindan","doi":"10.1145/1921168.1921205","DOIUrl":"https://doi.org/10.1145/1921168.1921205","url":null,"abstract":"In this paper, we explore a simple yet effective technique for explicitly allocating airtime to each active pair of communicating neighbors in a wireless neighborhood so that TCP starvation in a wireless mesh network is avoided. Our explicit allocation is efficient, redistributing unused airtime and also accounting for airtime rendered unusable by external interference. Our technique requires no modifications to TCP/IP and the 802.11 MAC, and is responsive to short flows, MAC-layer auto rate adaptation, and other dynamics, as we demonstrate in extensive experiments on two indoor testbeds. Despite its simplicity, the technique is on average within 12% of the max-min optimal allocation on several topologies.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87962342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federation of virtualized infrastructures: sharing the value of diversity","authors":"P. Antoniadis, S. Fdida, T. Friedman, V. Misra","doi":"10.1145/1921168.1921184","DOIUrl":"https://doi.org/10.1145/1921168.1921184","url":null,"abstract":"By federating virtualized computing and network resources one can significantly increase their value thanks to gains from statistical multiplexing and increases in resource diversity (more distinct locations, technologies, etc.). Successful federation depends upon resource providers being able to agree on policies: how to share the profit generated by external customers and/or how to allocate the resources contributed by the federation participants to their affiliated users. This paper's main contribution is a method that enables organizers of a federation to evaluate the relative importance of the resources contributed by each participant. We build on coalitional game theory concepts and formulate a generic economic model of federation that captures the notion of diversity, which is relevant for a variety of overlay services, and notably the networking research experiments that are running today on PlanetLab. Based on this model, we propose the Shapley value as a means for participants to share the value of federation. We show how this approach can help in the design of policies that encourage infrastructure owners to federate.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84434373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strengthening forensic investigations of child pornography on P2P networks","authors":"M. Liberatore, B. Levine, C. Shields","doi":"10.1145/1921168.1921193","DOIUrl":"https://doi.org/10.1145/1921168.1921193","url":null,"abstract":"Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of peer-to-peer file sharing networks for sexually exploitative imagery of children (child pornography). First, we present a five-month measurement performed in the law enforcement context. We then show how the identifiers in these measurements can be unreliable, and propose the tagging of remote machines. Our proposed tagging method marks remote machines by providing them with application- or system-level data which is valid, but which covertly has meaning to investigators. This tagging allows investigators to link network observations with physical evidence in a legal, forensically strong, and valid manner. We present a detailed model and analysis of our method, show how tagging can be used in several specific applications, discuss the general applicability of our method, and detail why the tags are strong evidence of criminal intent and participation in a crime.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88230114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Rad, Guowu Xie, M. Faloutsos
{"title":"Profiling-By-Association: a resilient traffic profiling solution for the internet backbone","authors":"Marios Iliofotou, Brian Gallagher, Tina Eliassi-Rad, Guowu Xie, M. Faloutsos","doi":"10.1145/1921168.1921171","DOIUrl":"https://doi.org/10.1145/1921168.1921171","url":null,"abstract":"Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key question addressed here is: Is it possible to profile traffic at the backbone without relying on its packet and flow level information, which can be obfuscated? We propose a novel approach, called Profiling-By-Association (PBA), that uses only the IP-to-IP communication graph and information about some applications used by few IP-hosts (a.k.a. seeds). The key insight is that IP-hosts tend to communicate more frequently with hosts involved in the same application forming communities (or clusters). Profiling few members within a cluster can \"give away\" the whole community. Following our approach, we develop different algorithms to profile Internet traffic and evaluate them on real-traces from four large backbone networks. We show that PBA's accuracy is on average around 90% with knowledge of only 1% of all the hosts in a given data set and its runtime is on the order of minutes (≈ 5).","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74069598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}