Search results for: oil leaks
64 Acid Injection PTFE Internal Lining in Raw Water System
Authors: Fikri Suwaileh
Abstract:
In the reverse osmosis (RO) water treatment plant, operation was suffering from several leaks on the acid injection point spool and downstream spools, due to insufficient injection monitoring and the coating failure leading to pin holes. The paper will go over the background of the leaks in the acid injection point, the process in the RO plant, the material, and coating used in the existing spools, the impact of these repeated leaks, the type of damage mechanism that occurred in the system due to the manner of acid injection and the heat in the spools, which lead to coating failure, leaks and water release. This paper will also look at the analysis, both the short- and long-term recommendations, and the utilization of Teflon internal lining to stop the leaks. Sharing this case study will enhance the knowledge of the importance of taking all factors that will lead to leaks in the acid injection points, along with the importance of utilizing the appropriate coating material lining to enhance the full system.Keywords: corrosion, coating, raw water, lining
Procedia PDF Downloads 1963 Managing City Pipe Leaks through Community Participation Using a Web and Mobile Application in South Africa
Authors: Mpai Mokoena, Nsenda Lukumwena
Abstract:
South Africa is one of the driest countries in the world and is facing a water crisis. In addition to inadequate infrastructure and poor planning, the country is experiencing high rates of water wastage due to pipe leaks. This study outlines the level of water wastage and develops a smart solution to efficiently manage and reduce the effects of pipe leaks, while monitoring the situation before and after fixing the pipe leaks. To understand the issue in depth, a literature review of journal papers and government reports was conducted. A questionnaire was designed and distributed to the general public. Additionally, the municipality office was contacted from a managerial perspective. The analysis from the study indicated that the majority of the citizens are aware of the water crisis and are willing to participate positively to decrease the level of water wasted. Furthermore, the response from the municipality acknowledged that more practical solutions are needed to reduce water wastage, and resources to attend to pipe leaks swiftly. Therefore, this paper proposes a specific solution for municipalities, local plumbers and citizens to minimize the effects of pipe leaks. The solution provides web and mobile application platforms to report and manage leaks swiftly. The solution is beneficial to the country in achieving water security and would promote a culture of responsibility toward water usage.Keywords: urban distribution networks, leak management, mobile application, responsible citizens, water crisis, water security
Procedia PDF Downloads 14562 Effect of Leaks in Solid Oxide Electrolysis Cells Tested for Durability under Co-Electrolysis Conditions
Authors: Megha Rao, Søren H. Jensen, Xiufu Sun, Anke Hagen, Mogens B. Mogensen
Abstract:
Solid oxide electrolysis cells have an immense potential in converting CO2 and H2O into syngas during co-electrolysis operation. The produced syngas can be further converted into hydrocarbons. This kind of technology is called power-to-gas or power-to-liquid. To produce hydrocarbons via this route, durability of the cells is still a challenge, which needs to be further investigated in order to improve the cells. In this work, various nickel-yttria stabilized zirconia (Ni-YSZ) fuel electrode supported or YSZ electrolyte supported cells, cerium gadolinium oxide (CGO) barrier layer, and an oxygen electrode are investigated for durability under co-electrolysis conditions in both galvanostatic and potentiostatic conditions. While changing the gas on the oxygen electrode, keeping the fuel electrode gas composition constant, a change in the gas concentration arc was observed by impedance spectroscopy. Measurements of open circuit potential revealed the presence of leaks in the setup. It is speculated that the change in concentration impedance may be related to the leaks. Furthermore, the cells were also tested under pressurized conditions to find an inter-play between the leak rate and the pressure. A mathematical modeling together with electrochemical and microscopy analysis is presented.Keywords: co-electrolysis, durability, leaks, gas concentration arc
Procedia PDF Downloads 14561 Modeling of Leaks Effects on Transient Dispersed Bubbly Flow
Authors: Mohand Kessal, Rachid Boucetta, Mourad Tikobaini, Mohammed Zamoum
Abstract:
Leakage problem of two-component fluids flow is modeled for a transient one-dimensional homogeneous bubbly flow and developed by taking into account the effect of a leak located at the middle point of the pipeline. The corresponding three conservation equations are numerically resolved by an improved characteristic method. The obtained results are explained and commented in terms of physical impact on the flow parameters.Keywords: fluid transients, pipelines leaks, method of characteristics, leakage problem
Procedia PDF Downloads 47660 Automated Feature Extraction and Object-Based Detection from High-Resolution Aerial Photos Based on Machine Learning and Artificial Intelligence
Authors: Mohammed Al Sulaimani, Hamad Al Manhi
Abstract:
With the development of Remote Sensing technology, the resolution of optical Remote Sensing images has greatly improved, and images have become largely available. Numerous detectors have been developed for detecting different types of objects. In the past few years, Remote Sensing has benefited a lot from deep learning, particularly Deep Convolution Neural Networks (CNNs). Deep learning holds great promise to fulfill the challenging needs of Remote Sensing and solving various problems within different fields and applications. The use of Unmanned Aerial Systems in acquiring Aerial Photos has become highly used and preferred by most organizations to support their activities because of their high resolution and accuracy, which make the identification and detection of very small features much easier than Satellite Images. And this has opened an extreme era of Deep Learning in different applications not only in feature extraction and prediction but also in analysis. This work addresses the capacity of Machine Learning and Deep Learning in detecting and extracting Oil Leaks from Flowlines (Onshore) using High-Resolution Aerial Photos which have been acquired by UAS fixed with RGB Sensor to support early detection of these leaks and prevent the company from the leak’s losses and the most important thing environmental damage. Here, there are two different approaches and different methods of DL have been demonstrated. The first approach focuses on detecting the Oil Leaks from the RAW Aerial Photos (not processed) using a Deep Learning called Single Shoot Detector (SSD). The model draws bounding boxes around the leaks, and the results were extremely good. The second approach focuses on detecting the Oil Leaks from the Ortho-mosaiced Images (Georeferenced Images) by developing three Deep Learning Models using (MaskRCNN, U-Net and PSP-Net Classifier). Then, post-processing is performed to combine the results of these three Deep Learning Models to achieve a better detection result and improved accuracy. Although there is a relatively small amount of datasets available for training purposes, the Trained DL Models have shown good results in extracting the extent of the Oil Leaks and obtaining excellent and accurate detection.Keywords: GIS, remote sensing, oil leak detection, machine learning, aerial photos, unmanned aerial systems
Procedia PDF Downloads 3259 Metaphorical Devices in Political Cartoons with Reference to Political Confrontation in Pakistan after Panama Leaks
Authors: Ayesha Ashfaq, Muhammad Ajmal Ashfaq
Abstract:
It has been assumed that metaphorical and symbolic contests are waged with metaphors, captions, and signs in political cartoons that play a significant role in image construction of political actors, situations or events in the political arena. This paper is an effort to explore the metaphorical devices in political cartoons related to the political confrontation in Pakistan between the ruling party Pakistan Muslim League Nawaz (PMLN) and opposition parties especially after Panama leaks. For this purpose, political cartoons sketched by five renowned political cartoonists on the basis of their belongings to the most highly circulated mainstream English newspapers of Pakistan and their professional experiences in their genre, were selected. The cartoons were analyzed through the Barthes’s model of Semiotics under the umbrella of the first level of agenda setting theory ‘framing’. It was observed that metaphorical devices in political cartoons are one of the key weapons of cartoonists’ armory. These devices are used to attack the candidates and contribute to the image and character building. It was found that all the selected political cartoonists used different forms of metaphors including situational metaphors and embodying metaphors. Not only the physical stature but also the debates and their activities were depicted metaphorically in the cartoons that create the scenario of comparison between the cartoons and their real political confrontation. It was examined that both forms of metaphors shed light on cartoonist’s perception and newspaper’s policy about political candidates, political parties and particular events. In addition, it was found that zoomorphic metaphors and metaphors of diminishments were also predominantly used to depict the conflict between two said political actors.Keywords: metaphor, Panama leaks, political cartoons, political communication
Procedia PDF Downloads 30758 UNIX Source Code Leak: Evaluation and Feasible Solutions
Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar
Abstract:
Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.Keywords: data transmission, Linux, source code, operating system
Procedia PDF Downloads 27057 A Study on Abnormal Behavior Detection in BYOD Environment
Authors: Dongwan Kang, Joohyung Oh, Chaetae Im
Abstract:
Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies
Procedia PDF Downloads 32456 Risk Analysis of Leaks from a Subsea Oil Facility Based on Fuzzy Logic Techniques
Authors: Belén Vinaixa Kinnear, Arturo Hidalgo López, Bernardo Elembo Wilasi, Pablo Fernández Pérez, Cecilia Hernández Fuentealba
Abstract:
The expanded use of risk assessment in legislative and corporate decision-making has increased the role of expert judgement in giving data for security-related decision-making. Expert judgements are required in most steps of risk assessment: danger recognizable proof, hazard estimation, risk evaluation, and examination of choices. This paper presents a fault tree analysis (FTA), which implies a probabilistic failure analysis applied to leakage of oil in a subsea production system. In standard FTA, the failure probabilities of items of a framework are treated as exact values while evaluating the failure probability of the top event. There is continuously insufficiency of data for calculating the failure estimation of components within the drilling industry. Therefore, fuzzy hypothesis can be used as a solution to solve the issue. The aim of this paper is to examine the leaks from the Zafiro West subsea oil facility by using fuzzy fault tree analysis (FFTA). As a result, the research has given theoretical and practical contributions to maritime safety and environmental protection. It has been also an effective strategy used traditionally in identifying hazards in nuclear installations and power industries.Keywords: expert judgment, probability assessment, fault tree analysis, risk analysis, oil pipelines, subsea production system, drilling, quantitative risk analysis, leakage failure, top event, off-shore industry
Procedia PDF Downloads 19055 Effect of Discharge Pressure Conditions on Flow Characteristics in Axial Piston Pump
Authors: Jonghyuk Yoon, Jongil Yoon, Seong-Gyo Chung
Abstract:
In many kinds of industries which usually need a large amount of power, an axial piston pump has been widely used as a main power source of a hydraulic system. The axial piston pump is a type of positive displacement pump that has several pistons in a circular array within a cylinder block. As the cylinder block and pistons start to rotate, since the exposed ends of the pistons are constrained to follow the surface of the swashed plate, the pistons are driven to reciprocate axially and then a hydraulic power is produced. In the present study, a numerical simulation which has three dimensional full model of the axial piston pump was carried out using a commercial CFD code (Ansys CFX 14.5). In order to take into consideration motion of compression and extension by the reciprocating pistons, the moving boundary conditions were applied as a function of the rotation angle to that region. In addition, this pump using hydraulic oil as working fluid is intentionally designed as a small amount of oil leaks out in order to lubricate moving parts. Since leakage could directly affect the pump efficiency, evaluation of effect of oil-leakage is very important. In order to predict the effect of the oil leakage on the pump efficiency, we considered the leakage between piston-shoe and swash-plate by modeling cylindrical shaped-feature at the end of the cylinder. In order to validate the numerical method used in this study, the numerical results of the flow rate at the discharge port are compared with the experimental data, and good agreement between them was shown. Using the validated numerical method, the effect of the discharge pressure was also investigated. The result of the present study can be useful information of small axial piston pump used in many different manufacturing industries. Acknowledgement: This research was financially supported by the “Next-generation construction machinery component specialization complex development program” through the Ministry of Trade, Industry and Energy (MOTIE) and Korea Institute for Advancement of Technology (KIAT).Keywords: axial piston pump, CFD, discharge pressure, hydraulic system, moving boundary condition, oil leaks
Procedia PDF Downloads 24754 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 34653 Accelerating Side Channel Analysis with Distributed and Parallelized Processing
Authors: Kyunghee Oh, Dooho Choi
Abstract:
Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.Keywords: DPA, distributed computing, parallelized processing, side channel analysis
Procedia PDF Downloads 42652 Non-Destructive Visual-Statistical Approach to Detect Leaks in Water Mains
Authors: Alaa Al Hawari, Mohammad Khader, Tarek Zayed, Osama Moselhi
Abstract:
In this paper, an effective non-destructive, non-invasive approach for leak detection was proposed. The process relies on analyzing thermal images collected by an IR viewer device that captures thermo-grams. In this study a statistical analysis of the collected thermal images of the ground surface along the expected leak location followed by a visual inspection of the thermo-grams was performed in order to locate the leak. In order to verify the applicability of the proposed approach the predicted leak location from the developed approach was compared with the real leak location. The results showed that the expected leak location was successfully identified with an accuracy of more than 95%.Keywords: thermography, leakage, water pipelines, thermograms
Procedia PDF Downloads 35551 Identifying the Needs for Renewal of Urban Water Infrastructure Systems: Analysis of Material, Age, Types and Areas: Case Study of Linköping in Sweden
Authors: Eman Hegazy, Stefan Anderberg, Joakim Krook
Abstract:
Urban water infrastructure is crucial for efficient and reliable water supply in growing cities. With the growth of cities, the need for maintenance and renewal of these systems increases but often goes unfulfilled due to a variety of reasons, such as limited funding, political priorities, or lack of public awareness. Neglecting the renewal needs of these systems can lead to frequent malfunctions and reduced quality and reliability of water supply, as well as increased costs and health and environmental hazards. It is important for cities to prioritize investment in water infrastructure and develop long-term plans to address renewal needs. Drawing general conclusions about the rate of renewal of urban water infrastructure systems at an international or national level can be challenging due to the influence of local management decisions. In many countries, the responsibility for water infrastructure management lies with the municipal authorities, who are responsible for making decisions about the allocation of resources for repair, maintenance, and renewal. These decisions can vary widely based on factors such as local finances, political priorities, and public perception of the importance of water infrastructure. As a result, it is difficult to make generalizations about the rate of renewal across different countries or regions. In Sweden, the situation is not different, and the information from Svenskt Vatten indicates that the rate of renewal varies across municipalities and can be insufficient, leading to a buildup of maintenance and renewal needs. This study aims to examine the adequacy of the rate of renewal of urban water infrastructure in Linköping case city in Sweden. Using a case study framework, the study will assess the current status of the urban water system and the need for renewal. The study will also consider the role of factors such as proper identification processes, limited funding, competing for political priorities, and local management decisions in contributing to insufficient renewal. The study investigates the following questions: (1) What is the current status of water and sewerage networks in terms of length, age distribution, and material composition, estimated total water leakage in the network per year, damages, leaks, and outages occur per year, both overall and by district? (2) What are the main causes of these damages, leaks, and interruptions, and how are they related to lack of maintenance and renewal? (3) What is the current status of renewal work for the water and sewerage networks, including the renewal rate and changes over time, recent renewal material composition, and the budget allocation for renewal and emergency repairs? (4) What factors influence the need for renewal and what conditions should be considered in the assessment? The findings of the study provide insights into the challenges facing urban water infrastructure and identify strategies for improving the rate of renewal to ensure a reliable and sustainable water supply.Keywords: case study, infrastructure, management, renewal need, Sweden
Procedia PDF Downloads 10350 Analysis of the Degradation of the I-V Curve of the PV Module in a Harsh Environment: Estimation of the Site-Specific Factor (Installation Area)
Authors: Maibigue Nanglet, Arafat Ousman Béchir, Mahamat Hassan Béchir
Abstract:
The economy of Central African countries is growing very fast, and the demand for energy is increasing every day. As a result, insufficient power generation is one of the major problems slowing down development. This paper explores the factors of degradation of the I-V curve of the PV Generator (GPV) in harsh environments, taking the case of two locals: Mongo and Abeche. Its objective is to quantify the voltage leaks due to the different GPV installation areas; after using the Newton-Raphson numerical method of the solar cell, a survey of several experimental measurement points was made. The results of the simulation in MATLAB/Simulink show a relative power loss factor of 11.8765% on the GPVs installed in Mongo and 8.5463% on those installed in Abeche; these results allow us to say that the supports on which the modules are installed have an average impact of 10.2114% on their efficiency.Keywords: calculation, degradation, site, GPV, severe environment
Procedia PDF Downloads 3649 Electromagnetic Interference Shielding Effectiveness of a Corrugated Rectangular Waveguide for a Microwave Conveyor-Belt Drier
Authors: Sang-Hyeon Bae, Sung-Yeon Kim, Min-Gyo Jeong, Ji-Hong Kim, Wang-Sang Lee
Abstract:
Traditional heating methods such as electric ovens or steam heating are slow and not very efficient. For continuously heating the objects, a microwave conveyor-belt drier is widely used in the industrial microwave heating systems. However, there is a problem in which electromagnetic wave leaks toward outside of the heating cavity through the insertion opening. To achieve the prevention of the leakage of microwaves and improved heating characteristics, the corrugated rectangular waveguide at the entrance and exit openings of a microwave conveyor-belt drier is proposed and its electromagnetic interference (EMI) shielding effectiveness is analyzed and verified. The corrugated waveguides in the proposed microwave heating system achieve at least 20 dB shielding effectiveness while ensuring a sufficient height of the openings.Keywords: corrugated, electromagnetic wave, microwave conveyor-belt drier, rectangular waveguide, shielding effectiveness
Procedia PDF Downloads 51648 The Technique of Mobilization of the Colon for Pull-Through Procedure in Hirschsprung's Disease
Authors: Medet K. Khamitov, Marat M. Ospanov, Vasiliy M. Lozovoy, Zhenis N. Sakuov, Dastan Z. Rustemov
Abstract:
With a high rectosigmoid transitional zone in children with Hirschsprung’s disease, the upper rectal, sigmoid, left colon arteries are ligated during the pull-through of the descending part of the colon. As a result, the inferior mesenteric artery ceases to participate in the blood supply to the descending part of the colon. As a result, the reduced colon is supplied with blood only by the middle colon artery, which originates from the superior mesenteric artery. Insufficiency of blood supply to the reduced colon is the cause of the development of chronic hypoxia of the intestinal wall or necrosis of the reduced descending colon. Some surgeons prefer to preserve the left colon artery. However, it is possible to stretch the mesentery, which can lead to bowel retraction to anastomotic leaks and stenosis. Chronic hypoxia of the reduced colon, in turn, is the cause of acquired (secondary) aganglionosis. The highest frequency of anastomotic leaks is observed in children older than five years. The purpose is to reduce the risk of complications in the pull-through procedure of the descending part of the colon in patients with Hirschsprung’s disease by ensuring its sufficient mobility and maintaining blood supply to the lower mesenteric artery. Methodology and events. Two children aged 5 and 7 years with Hirschsprung’s disease were operated under the conditions of the hospital in Nur-Sultan. The diagnosis was made using x-ray contrast enema and histological examination. Operational technique. After revision of the left part of the colon and assessment of the architectonics of its blood vessels, parietal mobilization of the affected sigmoid and rectum was performed on laparotomy access, while maintaining the arterial and venous terminal arcades of the sigmoid vessels. Then, the descending branch of the left colon artery was crossed (if there is an insufficient length of the reduced intestine, the left colonic artery itself may also be crossed). This manipulation provides additional mobility of the pull-through descending part of the colon. The resulting "windows" in the mesentery of the reduced intestine were sutured to prevent the development of an internal hernia. Formed a full-blooded, sufficiently long transplant from the transverse loops of the splenic angle and the descending parts of the colon with blood supply from the upper and lower mesenteric artery, freely, without tension, is reduced to the rectal zone with the coloanal anastomosis 1.5 cm above the dentate line. Results. The postoperative period was uneventful. Patients were discharged on the 7th day. The observation was carried out for six months. In no case, there was a bowel retraction, anastomotic leak, anastomotic stenosis, or other complications. Conclusion. The presented technique of mobilization of the colon for the pull-through procedure in a high transitional rectosigmoid zone of Hirschsprung’s disease allows to maintain normal blood supply to the distal part of the colon and to avoid the tension of the colon. The technique allows reducing the risk of anastomotic leak, bowel necrosis, chronic ischemia, to exclude colon retraction and anastomotic stenosis.Keywords: blood supply, children, colon mobilization, Hirschsprung's disease, pull-through
Procedia PDF Downloads 14747 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy
Authors: Andrei Bogdan Stanescu, Robert Stana
Abstract:
Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy
Procedia PDF Downloads 8946 Cooperative Jamming for Implantable Medical Device Security
Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed
Abstract:
Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing
Procedia PDF Downloads 11245 Automation Test Method and HILS Environment Configuration for Hydrogen Storage System Management Unit Verification
Authors: Jaejeogn Kim, Jeongmin Hong, Jungin Lee
Abstract:
The Hydrogen Storage System Management Unit (HMU) is a controller that manages hydrogen charging and storage. It detects hydrogen leaks and tank pressure and temperature, calculates the charging concentration and remaining amount, and controls the opening and closing of the hydrogen tank valve. Since this role is an important part of the vehicle behavior and stability of Fuel Cell Electric Vehicles (FCEV), verifying the HMU controller is an essential part. To perform verification under various conditions, it is necessary to increase time efficiency based on an automated verification environment and increase the reliability of the controller by applying numerous test cases. To this end, we introduce the HMU controller automation verification method by applying the HILS environment and an automation test program with the ASAM XIL standard.Keywords: HILS, ASAM, fuel cell electric vehicle, automation test, hydrogen storage system
Procedia PDF Downloads 7044 A Predictive MOC Solver for Water Hammer Waves Distribution in Network
Authors: A. Bayle, F. Plouraboué
Abstract:
Water Distribution Network (WDN) still suffers from a lack of knowledge about fast pressure transient events prediction, although the latter may considerably impact their durability. Accidental or planned operating activities indeed give rise to complex pressure interactions and may drastically modified the local pressure value generating leaks and, in rare cases, pipe’s break. In this context, a numerical predictive analysis is conducted to prevent such event and optimize network management. A couple of Python/FORTRAN 90, home-made software, has been developed using Method Of Characteristic (MOC) solving for water-hammer equations. The solver is validated by direct comparison with theoretical and experimental measurement in simple configurations whilst afterward extended to network analysis. The algorithm's most costly steps are designed for parallel computation. A various set of boundary conditions and energetic losses models are considered for the network simulations. The results are analyzed in both real and frequencies domain and provide crucial information on the pressure distribution behavior within the network.Keywords: energetic losses models, method of characteristic, numerical predictive analysis, water distribution network, water hammer
Procedia PDF Downloads 23243 Microbial Corrosion on Oil and Gas Facilities: A Case Study of Oil and Gas Facilities in the Niger-Delta
Authors: Frederick Otite Ighovojah
Abstract:
Corrosion in the oil and gas industries is one of the most common causes of failure. Such failure includes leaks in above-ground storage tanks (AGST). The involvement of microorganisms in the corrosion process in AGST systems is often ignored, and this outlines the need to investigate the effect of microbial corrosion in oil and gas facilities. This study's methodology comprised gathering generated water samples from a nearby AGST oil facility that was operating, which were then equally divided into two batch reactors, 1 and 2. Each batch reactor was filled with five prepared X60 coupons using sterilized forceps. To provide nutrients for the microorganisms in batch reactor 1 during the test period, 2g of NPK 15- 15-15 fertilizer was added on a weekly basis. To kill the microorganisms and significantly lower their concentration in the generated water, 5ml of dissolved ozone (a biocide) with a 0.5ppm concentration was added to batch reactor 2. The weight loss measurement (WLM) was used to evaluate for corrosion. Coupons were removed from each batch reactor, and weight loss was measured at every interval of 336 hrs for 2016 hrs. The overall results obtained indicated that coupons from the batch 1 reactor showed a higher corrosion rate and higher mass loss, and this was due to the metabolic production of an aggressive compound in the medium.Keywords: AGST, microbial corrosion, reactor, X60 steel
Procedia PDF Downloads 8342 Imputing Missing Data in Electronic Health Records: A Comparison of Linear and Non-Linear Imputation Models
Authors: Alireza Vafaei Sadr, Vida Abedi, Jiang Li, Ramin Zand
Abstract:
Missing data is a common challenge in medical research and can lead to biased or incomplete results. When the data bias leaks into models, it further exacerbates health disparities; biased algorithms can lead to misclassification and reduced resource allocation and monitoring as part of prevention strategies for certain minorities and vulnerable segments of patient populations, which in turn further reduce data footprint from the same population – thus, a vicious cycle. This study compares the performance of six imputation techniques grouped into Linear and Non-Linear models on two different realworld electronic health records (EHRs) datasets, representing 17864 patient records. The mean absolute percentage error (MAPE) and root mean squared error (RMSE) are used as performance metrics, and the results show that the Linear models outperformed the Non-Linear models in terms of both metrics. These results suggest that sometimes Linear models might be an optimal choice for imputation in laboratory variables in terms of imputation efficiency and uncertainty of predicted values.Keywords: EHR, machine learning, imputation, laboratory variables, algorithmic bias
Procedia PDF Downloads 8541 Aspects Regarding the Structural Behaviour of Autonomous Underwater Vehicle for Emergency Response
Authors: Lucian Stefanita Grigore, Damian Gorgoteanu, Cristian Molder, Amado Stefan, Daniel Constantin
Abstract:
The purpose of this article is to present an analytical-numerical study on the structural behavior of a sunken autonomous underwater vehicle (AUV) for emergency intervention. The need for such a study was generated by the key objective of the ERL-Emergency project. The project aims to develop a system of collaborative robots for emergency response. The system consists of two robots: unmanned ground vehicles (UGV) on tracks and the second is an AUV. The system of collaborative robots, AUV and UGV, will be used to perform missions of monitoring, intervention, and rescue. The main mission of the AUV is to dive into the maritime space of an industrial port to detect possible leaks in a pipeline transporting petroleum products. Another mission is to close and open the valves with which the pipes are provided. Finally, you will need to be able to lift a manikin to the surface, which you can take to land. Numerical analysis was performed by the finite element method (FEM). The conditions for immersing the AUV at 100 m depth were simulated, and the calculations for different fluid flow rates were repeated. From a structural point of view, the stiffening areas and the enclosures in which the command-and-control elements and the accumulators are located have been especially analyzed. The conclusion of this research is that the AUV meets very well the established requirements.Keywords: analytical-numerical, emergency, FEM, robotics, underwater
Procedia PDF Downloads 15040 Technological Measures to Reduce the Environmental Impact of Swimming Pools
Authors: Fátima Farinha, Miguel J. Oliveira, Gina Matias, Armando Inverno, Jânio Monteiro, Cristiano Cabrita
Abstract:
In the last decades, the construction of swimming pools for recreational activities has grown exponentially in southern Europe. Swimming pools are used both for private use in villas and for collective use in hotels or condominiums. However, they have a high environmental impact, mainly in terms of water and energy consumption, being used for a short period of time, depending significantly on favorable atmospheric conditions. Contrary to what would be expected, not enough research has been conducted to reduce the negative impact of this equipment. In this context, this work proposes and analyses technological measures to reduce the environmental impacts of swimming pools, such as thermal insulation of the tank, water balance in order to detect leaks and optimize the backwash process, integration of renewable energy generation, and a smart control system that meets the requirements of the user. The work was developed within the scope of the Ecopool+++ project, which aims to create innovative heated pools with reduced thermal losses and integration of SMART energy plus water management systems. The project is in the final phase of its development, with very encouraging results.Keywords: swimming pools, sustainability, thermal losses, water management system
Procedia PDF Downloads 10339 Process Safety Evaluation of a Nuclear Power Plant through Virtual Process Hazard Analysis Using Hazard and Operability Technique
Authors: Elysa V. Largo, Lormaine Anne A. Branzuela, Julie Marisol D. Pagalilauan, Neil C. Concibido, Monet Concepcion M. Detras
Abstract:
The energy demand in the country is increasing; thus, nuclear energy is recently mandated to add to the energy mix. The Philippines has the Bataan Nuclear Power Plant (BNPP), which can be a source of nuclear energy; however, it has not been operated since the completion of its construction. Thus, evaluating the safety of BNPP is vital. This study explored the possible deviations that may occur in the operation of a nuclear power plant with a pressurized water reactor, which is similar to BNPP, through a virtual process hazard analysis (PHA) using the hazard and operability (HAZOP) technique. Temperature, pressure, and flow were used as parameters. A total of 86 causes of various deviations were identified, wherein the primary system and line from reactor coolant pump to reactor vessel are the most critical system and node, respectively. A total of 348 scenarios were determined. The critical events are radioactive leaks due to nuclear meltdown and sump overflow that could lead to multiple worker fatalities, one or more public fatalities, and environmental remediation. There were existing safeguards identified; however, further recommendations were provided to have additional and supplemental barriers to reduce the risk.Keywords: PSM, PHA, HAZOP, nuclear power plant
Procedia PDF Downloads 15438 A Smart Monitoring System for Preventing Gas Risks in Indoor
Authors: Gyoutae Park, Geunjun Lyu, Yeonjae Lee, Jaheon Gu, Sanguk Ahn, Hiesik Kim
Abstract:
In this paper, we propose a system for preventing gas risks through the use of wireless communication modules and intelligent gas safety appliances. Our system configuration consists of an automatic extinguishing system, detectors, a wall-pad, and a microcomputer controlled micom gas meter to monitor gas flow and pressure as well as the occurrence of earthquakes. The automatic fire extinguishing system checks for both combustible gaseous leaks and monitors the environmental temperature, while the detector array measures smoke and CO gas concentrations. Depending on detected conditions, the micom gas meter cuts off an inner valve and generates a warning, the automatic fire-extinguishing system cuts off an external valve and sprays extinguishing materials, or the sensors generate signals and take further action when smoke or CO are detected. Information on intelligent measures taken by the gas safety appliances and sensors are transmitted to the wall-pad, which in turn relays this as real time data to a server that can be monitored via an external network (BcN) connection to a web or mobile application for the management of gas safety. To validate this smart-home gas management system, we field-tested its suitability for use in Korean apartments under several scenarios.Keywords: gas sensor, leak, gas safety, gas meter, gas risk, wireless communication
Procedia PDF Downloads 41437 Assessment of Environmental Impact of Rain Water and Industrial Water Leakage in the Libyan Iron and Steel Company in the Sea Water
Authors: Mohamed Alzarug Aburugba, Rashid Mohamed Eltanashi
Abstract:
Rainwater is considered an essential water resource, as it contributes to filling the deficit in water resources, especially in countries that suffer from a scarcity of natural water sources. One of the important issues facing the Water and Gas Services Department at the Libyan Iron and Steel Company is the large loss of quantities of industrial water, both direct and indirect cooling water (DCW, ICW), produced within the company due to leaks in the cooling systems of the factories of the Libyan Iron and Steel Company. These amounts of polluted industrial water leakage are mixed with rainwater collected by stormwater stations (6 stations) in LISCO, which is pumped to the sea through pumps with a very high flow rate, and thus, this will carry a lot of waste, heavy metals, and oils to the sea, which negatively affects marine environmental resources. This paper assesses the environmental impact of the quantities of rainwater and mixed industrial water in stormwater stations in the Libyan Iron and Steel Company and methods of mitigation, treating pollutants and reusing them as industrial water in the production processes of the steel industry.Keywords: rainwater, mitigation, impact, sewage, heavy metals, assessment, pollution, environment, natural resources, industrial water.
Procedia PDF Downloads 6436 Influence of Produced Water Mixed With Crude Oil on the Geotechnical Properties of Sandy Soil
Authors: Khalifa Abdunaser
Abstract:
This study investigated the effects of oil contamination due to pro-duced water leaks that created lakes decades ago, as well as the extent of its im-pact on altering the geotechnical characteristics of the soil, which could act as a barrier to groundwater access The concentration of total petroleum hydrocarbons (TPH), which is the main component in the contaminated soil, was measured using a variety of analyses. Additionally, some extensive laboratory tests were performed to examine the effects on the soil's geotechnical properties, including particle size distribution, shear strength, consistency limits, specific gravity, and permeability coefficient. A clear decrease in TPH concentration was observed with increasing depth, and it is expected to end within only a few meters. It was found that there is a signifi-cant effect of this pollutant on the size of the soil particles, which led to them be-coming coarser than the uncontaminated soil particles. Moreover, it causes a de-crease in fluid and plastic boundaries, as well as an increase in cohesion between soil particles. However, the angle of internal friction decreases with the increase in the content of petroleum hydrocarbons in the soil samples. It came to light that determining the permeability coefficient as one of the physical characteristics of the most important factors responsible for the passage of pollutants in the groundwater, as it showed an obvious reduction in the permeability, which is the main reason dealt as an obstacle to the arrival of oil pollutants to the groundwater.Keywords: TPH, specific gravity, oil lake, Libya
Procedia PDF Downloads 9235 A Study on the Effect of Rib Structure in Spoke-Type PMSM
Authors: Hyun-Soo Seol, In-Gun Kim, Hyun Seok Hong, Dong-Woo Kang, Ju Lee
Abstract:
Rotor of Spoke-Type PMSM is divided into permanent magnet and rotor core. Moreover, rotor core is composed of pole-piece, Bridge and rib. Piece between the permanent magnet N and S poles is pole-piece. Bridge and rib hold pole-piece. In the case of pole-piece and bridge, it is essential structure of Spoke-Type PMSM. However, Rib can be selected by the designer depending on the operating conditions and constraints. If rib is present in the rotor, rib which acts in the leak path generates a leakage flux. Although the leakage flux reduces the torque in low speed, it expands speed range in high speed. So, there is a relationship of trade off. Viewed from the standpoint of permanent magnet demagnetization, since the magnetic flux by the stator winding leaks to the rib, it is an advantage. In addition, rib affects the safety factor of the rotor. For application required high speed operation, since the securing the safety factor of the rotor is important, rib structure is advantageous. On the other hand, in the case of the application that does not require high speed operation, it is desirable to increase the output power by designing without rib. In this paper, Effects on rib structure is analyzed in detail and this paper provides designer with information about rotor design of spoke-type PMSM according to rib structure.Keywords: spoke-Type PMSM, rotor shape, rib, operation range
Procedia PDF Downloads 429