Search results for: AIMMS mathematical software
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6386

Search results for: AIMMS mathematical software

6116 Software Tool Design for Heavy Oil Upgrading by Hydrogen Donor Addition in a Hydrodynamic Cavitation Process

Authors: Munoz A. Tatiana, Solano R. Brandon, Montes C. Juan, Cierco G. Javier

Abstract:

The hydrodynamic cavitation is a process in which the energy that the fluids have in the phase changes is used. From this energy, local temperatures greater than 5000 °C are obtained where thermal cracking of the fluid molecules takes place. The process applied to heavy oil affects variables such as viscosity, density, and composition, which constitutes an important improvement in the quality of crude oil. In this study, the need to design a software through mathematical integration models of mixing, cavitation, kinetics, and reactor, allows modeling changes in density, viscosity, and composition of a heavy oil crude, when the fluid passes through a hydrodynamic cavitation reactor. In order to evaluate the viability of this technique in the industry, a heavy oil of 18° API gravity, was simulated using naphtha as a hydrogen donor at concentrations of 1, 2 and 5% vol, where the simulation results showed an API gravity increase to 0.77, 1.21 and 1.93° respectively and a reduction viscosity by 9.9, 12.9 and 15.8%. The obtained results allow to have a favorable panorama on this technological development, an appropriate visualization on the generation of innovative knowledge of this technique and the technical-economic opportunity that benefits the development of the hydrocarbon sector related to heavy crude oil that includes the largest world oil production.

Keywords: hydrodynamic cavitation, thermal cracking, hydrogen donor, heavy oil upgrading, simulator

Procedia PDF Downloads 151
6115 Mathematical Modelling of Different Types of Body Support Surface for Pressure Ulcer Prevention

Authors: Mahbub C. Mishu, Venktesh N. Dubey, Tamas Hickish, Jonathan Cole

Abstract:

Pressure ulcer is a common problem for today's healthcare industry. It occurs due to external load applied to the skin. Also when the subject is immobile for a longer period of time and there is continuous load applied to a particular area of human body,blood flow gets reduced and as a result pressure ulcer develops. Body support surface has a significant role in preventing ulceration so it is important to know the characteristics of support surface under loading conditions. In this paper we have presented mathematical models of different types of viscoelastic materials and also we have shown the validation of our simulation results with experiments.

Keywords: pressure ulcer, viscoelastic material, mathematical model, experimental validation

Procedia PDF Downloads 311
6114 Analytical Study of Data Mining Techniques for Software Quality Assurance

Authors: Mariam Bibi, Rubab Mehboob, Mehreen Sirshar

Abstract:

Satisfying the customer requirements is the ultimate goal of producing or developing any product. The quality of the product is decided on the bases of the level of customer satisfaction. There are different techniques which have been reported during the survey which enhance the quality of the product through software defect prediction and by locating the missing software requirements. Some mining techniques were proposed to assess the individual performance indicators in collaborative environment to reduce errors at individual level. The basic intention is to produce a product with zero or few defects thereby producing a best product quality wise. In the analysis of survey the techniques like Genetic algorithm, artificial neural network, classification and clustering techniques and decision tree are studied. After analysis it has been discovered that these techniques contributed much to the improvement and enhancement of the quality of the product.

Keywords: data mining, defect prediction, missing requirements, software quality

Procedia PDF Downloads 469
6113 Software Development to Empowering Digital Libraries with Effortless Digital Cataloging and Access

Authors: Abdul Basit Kiani

Abstract:

The software for the digital library system is a cutting-edge solution designed to revolutionize the way libraries manage and provide access to their vast collections of digital content. This advanced software leverages the power of technology to offer a seamless and user-friendly experience for both library staff and patrons. By implementing this software, libraries can efficiently organize, store, and retrieve digital resources, including e-books, audiobooks, journals, articles, and multimedia content. Its intuitive interface allows library staff to effortlessly manage cataloging, metadata extraction, and content enrichment, ensuring accurate and comprehensive access to digital materials. For patrons, the software offers a personalized and immersive digital library experience. They can easily browse the digital catalog, search for specific items, and explore related content through intelligent recommendation algorithms. The software also facilitates seamless borrowing, lending, and preservation of digital items, enabling users to access their favorite resources anytime, anywhere, on multiple devices. With robust security features, the software ensures the protection of intellectual property rights and enforces access controls to safeguard sensitive content. Integration with external authentication systems and user management tools streamlines the library's administration processes, while advanced analytics provide valuable insights into patron behavior and content usage. Overall, this software for the digital library system empowers libraries to embrace the digital era, offering enhanced access, convenience, and discoverability of their vast collections. It paves the way for a more inclusive and engaging library experience, catering to the evolving needs of tech-savvy patrons.

Keywords: software development, empowering digital libraries, digital cataloging and access, management system

Procedia PDF Downloads 83
6112 Non-Linear Control in Positioning of PMLSM by Estimates of the Load Force by MRAS Method

Authors: Maamar Yahiaoui, Abdelrrahmene Kechich, Ismail Elkhallile Bousserhene

Abstract:

This article presents a study in simulation by means of MATLAB/Simulink software of the nonlinear control in positioning of a linear synchronous machine with the esteemed force of load, to have effective control in the estimator in all tests the wished trajectory follows and the disturbance of load start. The results of simulation prove clearly that the control proposed can detect the reference of positioning the value estimates of load force equal to the actual value.

Keywords: mathematical model, Matlab, PMLSM, control, linearization, estimator, force, load, current

Procedia PDF Downloads 610
6111 Series Solutions to Boundary Value Differential Equations

Authors: Armin Ardekani, Mohammad Akbari

Abstract:

We present a method of generating series solutions to large classes of nonlinear differential equations. The method is well suited to be adapted in mathematical software and unlike the available commercial solvers, we are capable of generating solutions to boundary value ODEs and PDEs. Many of the generated solutions converge to closed form solutions. Our method can also be applied to systems of ODEs or PDEs, providing all the solutions efficiently. As examples, we present results to many difficult differential equations in engineering fields.

Keywords: computational mathematics, differential equations, engineering, series

Procedia PDF Downloads 336
6110 Basic Need Satisfaction and Students’ Willingness to Use Spreadsheet Software

Authors: Anne Sørebø

Abstract:

The present study was designed to test how fulfilment of three basic psychological needs influence students development of perceived usefulness (PU) and ease of use (EOU) in connection with use of a spreadsheet. Both PU and EOU are assumed to be critical for development of students' willingness to utilize spreadsheet in future work within business administration. A questionnaire was completed by 196 business students in Norway. We found that satisfying the need for competence and autonomy is most critical for willingness to utilize the software package. The results also indicate that satisfying the need for relatedness, surprisingly, has no influence on students’ willingness to utilize the software package. A key implication of the present research is that teachers mainly should focus on fulfilling students need for competence and self-determination when the purpose is to motivate them to utilize new software. That students’ should develop their own competence when using a new technology is somewhat obvious, but that the feeling of being self-determined needs to be a complementary element in this connection is not necessary seen as obvious.

Keywords: spreadsheet, business students, technology acceptance, basic psychological needs

Procedia PDF Downloads 393
6109 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network

Authors: Amit Verma, Pardeep Kaur

Abstract:

In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.

Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval

Procedia PDF Downloads 379
6108 Checking Planetary Clutch on the Romania Tractor Using Mathematical Equations

Authors: Mohammad Vahedi Torshizi

Abstract:

In this investigation, at first, bending stress, contact stress, Safety factor of bending and Safety factor of contact between sun gear and planet gear tooth was determined using mathematical equations. Also, The amount of Sun Revolution in, Speed carrier, power Transmitted of the sun, sun torque, sun peripheral speed, Enter the tangential force gears, was calculated using mathematical equations. According to the obtained results, maximum of bending stress and contact stress occurred in three plantary and low status of four plantary. Also, maximum of Speed carrier, sun peripheral speed, Safety factor of bending and Safety factor of contact obtained in four plantary and maximum of power Transmitted of the sun, Enter the tangential force gears, bending stress and contact stress was in three pantry and factors And other factors were equal in the two planets.

Keywords: bending stress, contact stress, plantary, mathematical equations

Procedia PDF Downloads 289
6107 Reductions of Control Flow Graphs

Authors: Robert Gold

Abstract:

Control flow graphs are a well-known representation of the sequential control flow structure of programs with a multitude of applications. Not only single functions but also sets of functions or complete programs can be modelled by control flow graphs. In this case the size of the graphs can grow considerably and thus makes it difficult for software engineers to analyse the control flow. Graph reductions are helpful in this situation. In this paper we define reductions to subsets of nodes. Since executions of programs are represented by paths through the control flow graphs, paths should be preserved. Furthermore, the composition of reductions makes a stepwise analysis approach possible.

Keywords: control flow graph, graph reduction, software engineering, software applications

Procedia PDF Downloads 552
6106 Software Architecture Optimization Using Swarm Intelligence Techniques

Authors: Arslan Ellahi, Syed Amjad Hussain, Fawaz Saleem Bokhari

Abstract:

Optimization of software architecture can be done with respect to a quality attributes (QA). In this paper, there is an analysis of multiple research papers from different dimensions that have been used to classify those attributes. We have proposed a technique of swarm intelligence Meta heuristic ant colony optimization algorithm as a contribution to solve this critical optimization problem of software architecture. We have ranked quality attributes and run our algorithm on every QA, and then we will rank those on the basis of accuracy. At the end, we have selected the most accurate quality attributes. Ant colony algorithm is an effective algorithm and will perform best in optimizing the QA’s and ranking them.

Keywords: complexity, rapid evolution, swarm intelligence, dimensions

Procedia PDF Downloads 263
6105 Some Trends in Analysis of Two-Way Solid Slabs

Authors: Reem I. Al-Ya' Goub, Nasim Shatarat

Abstract:

This paper presents the results of analytical and comparative study among software programs' outputs in analysis of some two way solid slabs; flat plate, flat slab with beams and flat slab with drop panels problems that already been analyzed using Classical Equivalent Frame Method (CEFM) by several reinforced concrete book authors. The primary objective of this research is to determine the moment results using various software programs. Then, a summary of the results and differences percentages were obtained to show how analysis procedure effects the outputs of calculations that vary from software program to another when comparing them with the results of CEFM. Moment values were obtained using either the Equivalent Frame Method (EFM) or Finite Element Method (FEM) that's used among many software programs. The results of the analyses demonstrate that software programs vary markedly in terms of the information they provide to the structural designer regarding values of the model insertion, stiffness, effective moment of inertia used and specially the moment values.

Keywords: two-way solid slabs, flat plate, flat slab with beams, flat slab with drop panels, analysis, modeling, EFM, CEFM, FEM

Procedia PDF Downloads 412
6104 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 134
6103 InfoMiracles in the Qur’an and a Mathematical Proof to the Existence of God

Authors: Mohammad Mahmoud Mandurah

Abstract:

The existence of InfoMiracles in scripture is evidence that the scripture has a divine origin. It is also evidence to the existence of God. An InfoMiracle is an information-based miracle. The basic component of an InfoMiracle is a piece of information that could not be obtained by a human except through a divine channel. The existence of a sufficient number of convincing InfoMiracles in a scripture necessitates the existence of the divine source to these InfoMiracles. A mathematical equation is developed to prove that the Qur’an has a divine origin, and hence, prove the existence of God. The equation depends on a single variable only, which is the number of InfoMiracles in the Qur’an. The Qur’an is rich with InfoMiracles. It is shown that the existence of less than 30 InfoMiracles in the Qur’an is sufficient proof to the existence of God and that the Qur’an is a revelation from God.

Keywords: InfoMiracle, God, mathematical proof, miracle, probability

Procedia PDF Downloads 218
6102 Power System Modeling for Calculations in Frequency and Steady State Domain

Authors: G. Levacic, A. Zupan

Abstract:

Application of new technological solutions and installation of new elements into the network requires special attention when investigating its interaction with the existing power system. Special attention needs to be devoted to the occurrence of harmonic resonance. Sources of increasing harmonic penetration could be wind power plants, Flexible Alternating Current Transmission System (FACTS) devices, underground and submarine cable installations etc. Calculation in frequency domain with various software, for example, the software for power systems transients EMTP-RV presents one of the most common ways to obtain the harmonic impedance of the system. Along calculations in frequency domain, such software allows performing of different type of calculations as well as steady-state domain. This paper describes a power system modeling with software EMTP-RV based on data from SCADA/EMS system. The power flow results on 220 kV and 400 kV voltage levels retrieved from EMTP-RV are verified by comparing with power flow results from power transmissions system planning software PSS/E. The determination of the harmonic impedance for the case of remote power plant connection with cable up to 2500 Hz is presented as an example of calculations in frequency domain.

Keywords: power system modeling, frequency domain, steady state, EMTP-RV, PSS/E

Procedia PDF Downloads 323
6101 Working Improvement of Modern Finance in Millennium World

Authors: Saeed Mohammadirad

Abstract:

Financing activities involve long-term liabilities, stockholders' equity (or owner's equity), and changes to short-term borrowings. Finance is very important for every business activities. To perform the finance we have to follow the accounting languages bases on the nature of the business. If all are one package in the software, it is easy to handle, monitor, control, plan, organize, direct and budget the finance. Let us make a challenge in the computer software for the whole finance packages of every business related activities. In this article, it mentioned about the finance functions in the various levels of the business activities and how it should be maintained properly to avoid the unethical events.

Keywords: financing activities, business activities, computer software, unethical events

Procedia PDF Downloads 356
6100 Using the Weakest Precondition to Achieve Self-Stabilization in Critical Networks

Authors: Antonio Pizzarello, Oris Friesen

Abstract:

Networks, such as the electric power grid, must demonstrate exemplary performance and integrity. Integrity depends on the quality of both the system design model and the deployed software. Integrity of the deployed software is key, for both the original versions and the many that occur throughout numerous maintenance activity. Current software engineering technology and practice do not produce adequate integrity. Distributed systems utilize networks where each node is an independent computer system. The connections between them is realized via a network that is normally redundantly connected to guarantee the presence of a path between two nodes in the case of failure of some branch. Furthermore, at each node, there is software which may fail. Self-stabilizing protocols are usually present that recognize failure in the network and perform a repair action that will bring the node back to a correct state. These protocols first introduced by E. W. Dijkstra are currently present in almost all Ethernets. Super stabilization protocols capable of reacting to a change in the network topology due to the removal or addition of a branch in the network are less common but are theoretically defined and available. This paper describes how to use the Software Integrity Assessment (SIA) methodology to analyze self-stabilizing software. SIA is based on the UNITY formalism for parallel and distributed programming, which allows the analysis of code for verifying the progress property p leads-to q that describes the progress of all computations starting in a state satisfying p to a state satisfying q via the execution of one or more system modules. As opposed to demonstrably inadequate test and evaluation methods SIA allows the analysis and verification of any network self-stabilizing software as well as any other software that is designed to recover from failure without external intervention of maintenance personnel. The model to be analyzed is obtained by automatic translation of the system code to a transition system that is based on the use of the weakest precondition.

Keywords: network, power grid, self-stabilization, software integrity assessment, UNITY, weakest precondition

Procedia PDF Downloads 225
6099 A Randomized Controlled Intervention Study of the Effect of Music Training on Mathematical and Working Memory Performances

Authors: Ingo Roden, Stefana Lupu, Mara Krone, Jasmin Chantah, Gunter Kreutz, Stephan Bongard, Dietmar Grube

Abstract:

The present experimental study examined the effects of music and math training on mathematical skills and visuospatial working memory capacity in kindergarten children. For this purpose, N = 54 children (mean age: 5.46 years; SD = .29) were randomly assigned to three groups. Children in the music group (n = 18) received weekly sessions of 60 min music training over a period of eight weeks, whereas children in the math group (n = 18) received the same amount of training focusing on mathematical basic skills, such as numeracy skills, quantity comparison, and counting objectives. The third group of children (n = 18) served as waiting controls. The groups were matched for sex, age, IQ and previous music experiences at baseline. Pre-Post intervention measurements revealed a significant interaction effect of group x time, showing that children in both music and math groups significantly improved their early numeracy skills, whereas children in the control group did not. No significant differences between groups were observed for the visuospatial working memory performances. These results confirm and extend previous findings on transfer effects of music training on mathematical abilities and visuospatial working memory capacity. They show that music and math interventions are similarly effective to enhance children’s mathematical skills. More research is necessary to establish, whether cognitive transfer effects arising from music interventions might facilitate children’s transition from kindergarten to first-grade.

Keywords: music training, mathematical skills, working memory, transfer

Procedia PDF Downloads 273
6098 Pedagogical Variation with Computers in Mathematics Classrooms: A Cultural Historical Activity Theory Analysis

Authors: Joanne Hardman

Abstract:

South Africa’s crisis in mathematics attainment is well documented. To meet the need to develop students’ mathematical performance in schools the government has launched various initiatives using computers to impact on mathematical attainment. While it is clear that computers can change pedagogical practices, there is a dearth of qualitative studies indicating exactly how pedagogy is transformed with Information Communication Technologies (ICTs) in a teaching activity. Consequently, this paper addresses the following question: how, along which dimensions in an activity, does pedagogy alter with the use of computer drill and practice software in four disadvantaged grade 6 mathematics classrooms in the Western Cape province of South Africa? The paper draws on Cultural Historical Activity Theory (CHAT) to develop a view of pedagogy as socially situated. Four ideal pedagogical types are identified: Reinforcement pedagogy, which has the reinforcement of specialised knowledge as its object; Collaborative pedagogy, which has the development of metacognitive engagement with specialised knowledge as its object; Directive pedagogy, which has the development of technical task skills as its object, and finally, Defensive pedagogy, which has student regulation as its object. Face-to-face lessons were characterised as predominantly Reinforcement and Collaborative pedagogy and most computer lessons were characterised as mainly either Defensive or Directive.

Keywords: computers, cultural historical activity theory, mathematics, pedagogy

Procedia PDF Downloads 282
6097 Mathematical Modeling for Continuous Reactive Extrusion of Poly Lactic Acid Formation by Ring Opening Polymerization Considering Metal/Organic Catalyst and Alternative Energies

Authors: Satya P. Dubey, Hrushikesh A Abhyankar, Veronica Marchante, James L. Brighton, Björn Bergmann

Abstract:

Aims: To develop a mathematical model that simulates the ROP of PLA taking into account the effect of alternative energy to be implemented in a continuous reactive extrusion production process of PLA. Introduction: The production of large amount of waste is one of the major challenges at the present time, and polymers represent 70% of global waste. PLA has emerged as a promising polymer as it is compostable, biodegradable thermoplastic polymer made from renewable sources. However, the main limitation for the application of PLA is the traces of toxic metal catalyst in the final product. Thus, a safe and efficient production process needs to be developed to avoid the potential hazards and toxicity. It has been found that alternative energy sources (LASER, ultrasounds, microwaves) could be a prominent option to facilitate the ROP of PLA via continuous reactive extrusion. This process may result in complete extraction of the metal catalysts and facilitate less active organic catalysts. Methodology: Initial investigation were performed using the data available in literature for the reaction mechanism of ROP of PLA based on conventional metal catalyst stannous octoate. A mathematical model has been developed by considering significant parameters such as different initial concentration ratio of catalyst, co-catalyst and impurity. Effects of temperature variation and alternative energies have been implemented in the model. Results: The validation of the mathematical model has been made by using data from literature as well as actual experiments. Validation of the model including alternative energies is in progress based on experimental data for partners of the InnoREX project consortium. Conclusion: The model developed reproduces accurately the polymerisation reaction when applying alternative energy. Alternative energies have a great positive effect to increase the conversion and molecular weight of the PLA. This model could be very useful tool to complement Ludovic® software to predict the large scale production process when using reactive extrusion.

Keywords: polymer, poly-lactic acid (PLA), ring opening polymerization (ROP), metal-catalyst, bio-degradable, renewable source, alternative energy (AE)

Procedia PDF Downloads 362
6096 Hydrodynamic Study and Sizing of a Distillation Column by HYSYS Software

Authors: Derrouazin Mohammed Redhouane, Souakri Mohammed Lotfi, Henini Ghania

Abstract:

This work consists, first of all, of mastering one of the powerful process simulation tools currently used in the industrial processes, which is the HYSYS sizing software, and second, of simulating a petroleum distillation column. This study is divided into two parts; where the first one consists of a dimensioning of the column with a fast approximating method using state equations, iterative calculations, and then a precise simulation method with the HYSYS software. The second part of this study is a hydrodynamic study in order to verify by obtained results the proper functioning of the plates.

Keywords: industry process engineering, water distillation, environment, HYSYS simulation tool

Procedia PDF Downloads 130
6095 A Comparative Study of Three Major Performance Testing Tools

Authors: Abdulaziz Omar Alsadhan, Mohd Mudasir Shafi

Abstract:

Performance testing is done to prove the reliability of any software product. There are a number of tools available in the markets that are used to perform performance testing. In this paper we present a comparative study of the three most commonly used performance testing tools. These tools cover the major share of the performance testing market and are widely used. In this paper we compared the tools on five evaluation parameters which are; User friendliness, portability, tool support, compatibility and cost. The conclusion provided at the end of the paper is based on our study and does not support any tool or company.

Keywords: software development, software testing, quality assurance, performance testing, load runner, rational testing, silk performer

Procedia PDF Downloads 608
6094 Analyzing the Impact of Code Commenting on Software Quality

Authors: Thulya Premathilake, Tharushi Perera, Hansi Thathsarani, Tharushi Nethmini, Dilshan De Silva, Piyumika Samarasekara

Abstract:

One of the most efficient ways to assist developers in grasping the source code is to make use of comments, which can be found throughout the code. When working in fields such as software development, having comments in your code that are of good quality is a fundamental requirement. Tackling software problems while making use of programs that have already been built. It is essential for the intention of the source code to be made crystal apparent in the comments that are added to the code. This assists programmers in better comprehending the programs they are working on and enables them to complete software maintenance jobs in a more timely manner. In spite of the fact that comments and documentation are meant to improve readability and maintainability, the vast majority of programmers place the majority of their focus on the actual code that is being written. This study provides a complete and comprehensive overview of the previous research that has been conducted on the topic of code comments. The study focuses on four main topics, including automated comment production, comment consistency, comment classification, and comment quality rating. One is able to get the knowledge that is more complete for use in following inquiries if they conduct an analysis of the proper approaches that were used in this study issue.

Keywords: code commenting, source code, software quality, quality assurance

Procedia PDF Downloads 86
6093 Prediction of Time to Crack Reinforced Concrete by Chloride Induced Corrosion

Authors: Anuruddha Jayasuriya, Thanakorn Pheeraphan

Abstract:

In this paper, a review of different mathematical models which can be used as prediction tools to assess the time to crack reinforced concrete (RC) due to corrosion is investigated. This investigation leads to an experimental study to validate a selected prediction model. Most of these mathematical models depend upon the mechanical behaviors, chemical behaviors, electrochemical behaviors or geometric aspects of the RC members during a corrosion process. The experimental program is designed to verify the accuracy of a well-selected mathematical model from a rigorous literature study. Fundamentally, the experimental program exemplifies both one-dimensional chloride diffusion using RC squared slab elements of 500 mm by 500 mm and two-dimensional chloride diffusion using RC squared column elements of 225 mm by 225 mm by 500 mm. Each set consists of three water-to-cement ratios (w/c); 0.4, 0.5, 0.6 and two cover depths; 25 mm and 50 mm. 12 mm bars are used for column elements and 16 mm bars are used for slab elements. All the samples are subjected to accelerated chloride corrosion in a chloride bath of 5% (w/w) sodium chloride (NaCl) solution. Based on a pre-screening of different models, it is clear that the well-selected mathematical model had included mechanical properties, chemical and electrochemical properties, nature of corrosion whether it is accelerated or natural, and the amount of porous area that rust products can accommodate before exerting expansive pressure on the surrounding concrete. The experimental results have shown that the selected model for both one-dimensional and two-dimensional chloride diffusion had ±20% and ±10% respective accuracies compared to the experimental output. The half-cell potential readings are also used to see the corrosion probability, and experimental results have shown that the mass loss is proportional to the negative half-cell potential readings that are obtained. Additionally, a statistical analysis is carried out in order to determine the most influential factor that affects the time to corrode the reinforcement in the concrete due to chloride diffusion. The factors considered for this analysis are w/c, bar diameter, and cover depth. The analysis is accomplished by using Minitab statistical software, and it showed that cover depth is the significant effect on the time to crack the concrete from chloride induced corrosion than other factors considered. Thus, the time predictions can be illustrated through the selected mathematical model as it covers a wide range of factors affecting the corrosion process, and it can be used to predetermine the durability concern of RC structures that are vulnerable to chloride exposure. And eventually, it is further concluded that cover thickness plays a vital role in durability in terms of chloride diffusion.

Keywords: accelerated corrosion, chloride diffusion, corrosion cracks, passivation layer, reinforcement corrosion

Procedia PDF Downloads 219
6092 FRATSAN: A New Software for Fractal Analysis of Signals

Authors: Hamidreza Namazi

Abstract:

Fractal analysis is assessing fractal characteristics of data. It consists of several methods to assign fractal characteristics to a dataset which may be a theoretical dataset or a pattern or signal extracted from phenomena including natural geometric objects, sound, market fluctuations, heart rates, digital images, molecular motion, networks, etc. Fractal analysis is now widely used in all areas of science. An important limitation of fractal analysis is that arriving at an empirically determined fractal dimension does not necessarily prove that a pattern is fractal; rather, other essential characteristics have to be considered. For this purpose a Visual C++ based software called FRATSAN (FRActal Time Series ANalyser) was developed which extract information from signals through three measures. These measures are Fractal Dimensions, Jeffrey’s Measure and Hurst Exponent. After computing these measures, the software plots the graphs for each measure. Besides computing three measures the software can classify whether the signal is fractal or no. In fact, the software uses a dynamic method of analysis for all the measures. A sliding window is selected with a value equal to 10% of the total number of data entries. This sliding window is moved one data entry at a time to obtain all the measures. This makes the computation very sensitive to slight changes in data, thereby giving the user an acute analysis of the data. In order to test the performance of this software a set of EEG signals was given as input and the results were computed and plotted. This software is useful not only for fundamental fractal analysis of signals but can be used for other purposes. For instance by analyzing the Hurst exponent plot of a given EEG signal in patients with epilepsy the onset of seizure can be predicted by noticing the sudden changes in the plot.

Keywords: EEG signals, fractal analysis, fractal dimension, hurst exponent, Jeffrey’s measure

Procedia PDF Downloads 469
6091 IT Skills and Soft Skills for Accountants in Thailand

Authors: Manirath Wongsim

Abstract:

Information technology management has become important for the achievement of organisations. An increase in the pace of technological change has revolutionised the way accountants perform their jobs. In response to this challenge, the identification of a new comprehensive set of information technology competencies combined with information technology skills and other skills (namely, soft skills) are necessary. Thus, this study aims to investigate IT competencies among professional accountants to enhance firm performance. This research was conducted with 42 respondents at ten organisations in Thailand. This research used qualitative, interpretive evidence.The results indicate that the factor IT competencies within the organizational issues defines19 factors. Specifically, these new factors, based on the research findings and the literature and unique to IT competences for professional accountants, include ERP software skills, BI software skills and accounting law and legal skills. The evidence in this study suggests that ERP software, spreadsheets, BI software and accounting software were ranked as much-needed skills to be acquired by accountants while communication skills were ranked as the most required skills, and delegation skills as the least required. The findings of the research’s empirical evidence suggest that organizations should understand appropriate into developing information technology related competencies for knowledge workers in general and professional accountants in particular and provide assistance in all processes of decision making.

Keywords: IT competencies, IT competencies for accountants, IT skills for accounting, soft skills for accountants

Procedia PDF Downloads 416
6090 Parasitic Capacitance Modeling in Pulse Transformer Using FEA

Authors: D. Habibinia, M. R. Feyzi

Abstract:

Nowadays, specialized software is vastly used to verify the performance of an electric machine prototype by evaluating a model of the system. These models mainly consist of electrical parameters such as inductances and resistances. However, when the operating frequency of the device is above one kHz, the effect of parasitic capacitances grows significantly. In this paper, a software-based procedure is introduced to model these capacitances within the electromagnetic simulation of the device. The case study is a high-frequency high-voltage pulse transformer. The Finite Element Analysis (FEA) software with coupled field analysis is used in this method.

Keywords: finite element analysis, parasitic capacitance, pulse transformer, high frequency

Procedia PDF Downloads 515
6089 Sfard’s Commognitive Framework as a Method of Discourse Analysis in Mathematics

Authors: Dong-Joong Kim, Sangho Choi, Woong Lim

Abstract:

This paper discusses Sfard’s commognitive approach and provides an empirical study as an example to illustrate the theory as method. Traditionally, research in mathematics education focused on the acquisition of mathematical knowledge and the didactic process of knowledge transfer. Through attending to a distinctive form of language in mathematics, as well as mathematics as a discursive subject, alternative views of making meaning in mathematics have emerged; these views are therefore “critical,” as in critical discourse analysis. The commognitive discourse analysis method has the potential to bring more clarity to our understanding of students’ mathematical thinking and the process through which students are socialized into school mathematics.

Keywords: commognitive framework, discourse analysis, mathematical discourse, mathematics education

Procedia PDF Downloads 336
6088 Knowledge Based Automated Software Engineering Platform Used for the Development of Bulgarian E-Customs

Authors: Ivan Stanev, Maria Koleva

Abstract:

Described are challenges to the Bulgarian e-Customs (BeC) related to low level of interoperability and standardization, inefficient use of available infrastructure, lack of centralized identification and authorization, extremely low level of software process automation, and insufficient quality of data stored in official registers. The technical requirements for BeC are prepared with a focus on domain independent common platform, specialized customs and excise components, high scalability, flexibility, and reusability. The Knowledge Based Automated Software Engineering (KBASE) Common Platform for Automated Programming (CPAP) is selected as an instrument covering BeC requirements for standardization, programming automation, knowledge interpretation and cloud computing. BeC stage 3 results are presented and analyzed. BeC.S3 development trends are identified.

Keywords: service oriented architecture, cloud computing, knowledge based automated software engineering, common platform for automated programming, e-customs

Procedia PDF Downloads 373
6087 Component Interface Formalization in Robotic Systems

Authors: Anton Hristozov, Eric Matson, Eric Dietz, Marcus Rogers

Abstract:

Components are heavily used in many software systems, including robotics systems. The growth of sophistication and diversity of new capabilities for robotic systems presents new challenges to their architectures. Their complexity is growing exponentially with the advent of AI, smart sensors, and the complex tasks they have to accomplish. Such complexity requires a more rigorous approach to the creation, use, and interoperability of software components. The issue is exacerbated because robotic systems are becoming more and more reliant on third-party components for certain functions. In order to achieve this kind of interoperability, including dynamic component replacement, we need a way to standardize their interfaces. A formal approach is desperately needed to specify what an interface of a robotic software component should contain. This study performs an analysis of the issue and presents a universal and generic approach to standardizing component interfaces for robotic systems. Our approach is inspired by well-established robotic architectures such as ROS, PX4, and Ardupilot. The study is also applicable to other software systems that share similar characteristics with robotic systems. We consider the use of JSON or Domain Specific Languages (DSL) development with tools such as Antlr and automatic code and configuration file generation for frameworks such as ROS and PX4. A case study with ROS2 is presented as a proof of concept for the proposed methodology.

Keywords: CPS, robots, software architecture, interface, ROS, autopilot

Procedia PDF Downloads 92