Search results for: one side class algorithm
4499 Experimental Challenges and Solutions in Design and Operation of the Test Rig for Water Lubricated Journal Bearing
Authors: Ravindra Mallya, B. Satish Shenoy, B. Raghuvir Pai
Abstract:
The study deals with the challenges in developing a test rig to test the performance of water lubricated journal bearing. The test rig is designed to simulate the working conditions of the bearing in order to understand their performance before they are put in operation. The bearing that is studied is the commercially available water lubricated bearing which has a rubber liner bonded with a rigid metal shell. The lubricant enters the bearing axially through a pressurized inlet tank and exits to an outlet tank which is at sufficiently low pressure. The load on the bearing is applied through the dead weight system which acts both in upward and downward direction so that net load acts on the bearing. The issues in feeding the lubricant into the bearing from the inlet side and preventing the leakage of the lubricant is discussed. The application of the load on the test bearing while maintaining the bearing afloat is also discussed.Keywords: axial groove, hydrodynamic pressure, journal bearing, test rig, water lubrication
Procedia PDF Downloads 5074498 Critical Activity Effect on Project Duration in Precedence Diagram Method
Authors: Salman Ali Nisar, Koshi Suzuki
Abstract:
Precedence Diagram Method (PDM) with its additional relationships i.e., start-to-start, finish-to-finish, and start-to-finish, between activities provides more flexible schedule than traditional Critical Path Method (CPM). But, changing the duration of critical activities in PDM network will have anomalous effect on critical path. Researchers have proposed some classification of critical activity effects. In this paper, we do further study on classifications of critical activity effect and provide more information in detailed. Furthermore, we determine the maximum amount of time for each class of critical activity effect by which the project managers can control the dynamic feature (shortening/lengthening) of critical activities and project duration more efficiently.Keywords: construction project management, critical path method, project scheduling, precedence diagram method
Procedia PDF Downloads 5164497 The Role of Phytoremediation in Reclamation of Soil Pollution and Suitability of Certain Ornamental Plants to Phytoremediation
Authors: Bahriye Gülgün, Gökhan Balik, Şükrü Dursun, Kübra Yazici
Abstract:
The main reasons such as economic growth of society increase of the world population and rapid changes of industrialization cause the amount and the types of pollutants to increase over time. Soil pollution is the typical side effect of industrial activities. As a result of industrial activities, there are large amounts of heavy metal emission every year. Heavy metals are one of the highest pollution sources according to the soil pollution aspect. The usage of hyperaccumulator plants to clean heavy metal polluted soils and the selection of plants for phytoremediation gain importance recently. There are limited numbers of researches on the ornamental plant types of phytoremediation thus; researches on this subject are important. This research is prepared based on the ornamental plant types with phytoremediation abilities.Keywords: phytoremediation, ornamental plants, landscape reclamation, soil reclamation, environmental pollution
Procedia PDF Downloads 4124496 Finite Time Blow-Up and Global Solutions for a Semilinear Parabolic Equation with Linear Dynamical Boundary Conditions
Authors: Xu Runzhang, Yang Yanbing, Niu Yi, Zhang Mingyou, Liu Yu
Abstract:
For a class of semilinear parabolic equations with linear dynamical boundary conditions in a bounded domain, we obtain both global solutions and finite time blow-up solutions when the initial data varies in the phase space H1(Ω). Our main tools are the comparison principle, the potential well method and the concavity method. In particular, we discuss the behavior of the solutions with the initial data at critical and high energy level.Keywords: high energy level, critical energy level, linear dynamical boundary condition, semilinear parabolic equation
Procedia PDF Downloads 4394495 Plasma-Induced Modification of Biomolecules: A Tool for Analysis of Protein Structures
Authors: Yuting Wu, Faraz Choudhury, Daniel Benjamin, James Whalin, Joshua Blatz, Leon Shohet, Michael Sussman, Mark Richards
Abstract:
Plasma-Induced Modification of Biomolecules (PLIMB) has been developed as a technology, which, together with mass spectrometry, measures three-dimensional structural characteristics of proteins. This technique uses hydroxyl radicals generated by atmospheric-pressure plasma discharge to react with the solvent-accessible side chains of protein in an aqueous solution. In this work, we investigate the three-dimensional structure of hemoglobin and myoglobin using PLIMB. Additional modifications to these proteins, such as oxidation, fragmentations, and conformational changes caused by PLIMB are also explored. These results show that PLIMB, coupled with mass spectrometry, is an effective way to determine solvent access to hemoproteins. Furthermore, we show that many factors, including pH and the electrical parameters used to generate the plasma, have a significant influence on solvent accessibility.Keywords: plasma, hemoglobin, myoglobin, solvent access
Procedia PDF Downloads 2014494 Parallel Multisplitting Methods for Differential Systems
Authors: Malika El Kyal, Ahmed Machmoum
Abstract:
We prove the superlinear convergence of asynchronous multi-splitting methods applied to differential equations. This study is based on the technique of nested sets. It permits to specify kind of the convergence in the asynchronous mode.The main characteristic of an asynchronous mode is that the local algorithm not have to wait at predetermined messages to become available. We allow some processors to communicate more frequently than others, and we allow the communication delays to be substantial and unpredictable. Note that synchronous algorithms in the computer science sense are particular cases of our formulation of asynchronous one.Keywords: parallel methods, asynchronous mode, multisplitting, ODE
Procedia PDF Downloads 5284493 Effectiveness of Dry Needling on Pain and Pressure Point Threshold in Cervicogenic Headache
Authors: Ramesh Chandra Patra, Ajay P. Gautam, Patitapaban Mohanty
Abstract:
Headache disorders are one of the 10 most disabling conditions for men and women. Headache that originated from upper cervical spine and refereed to the one side of the head and/or face is known as cervicogenic headache (CH) which constitute15% to 20% among all the headaches. In our best knowledge manual therapy is often advocated for managing CH, but very little focus given on muscle system although it is a musculoskeletal disorder. In this study, 75 patients with CH were selected and divided into two groups Group A: Manual therapy and Group B: dry needling along with manual therapy group. Assessment was done using NPRS (0-10) for pain, wide spread pressure pain threshold using an algometer at the beginning and end of the study. There is a consistent reduction in pain and tenderness in both the group but significant improvement was shown in combined group. Outcome of the study has explored that the effectiveness of dry needling along with Mulligan is more beneficial in patients with cervicogenic headaches.Keywords: cervicogenic headaches, dry needling, NPRS, pressure point threshold
Procedia PDF Downloads 2324492 Estimating the Traffic Impacts of Green Light Optimal Speed Advisory Systems Using Microsimulation
Authors: C. B. Masera, M. Imprialou, L. Budd, C. Morton
Abstract:
Even though signalised intersections are necessary for urban road traffic management, they can act as bottlenecks and disrupt traffic operations. Interrupted traffic flow causes congestion, delays, stop-and-go conditions (i.e. excessive acceleration/deceleration) and longer journey times. Vehicle and infrastructure connectivity offers the potential to provide improved new services with additional functions of assisting drivers. This paper focuses on one of the applications of vehicle-to-infrastructure communication namely Green Light Optimal Speed Advisory (GLOSA). To assess the effectiveness of GLOSA in the urban road network, an integrated microscopic traffic simulation framework is built into VISSIM software. Vehicle movements and vehicle-infrastructure communications are simulated through the interface of External Driver Model. A control algorithm is developed for recommending an optimal speed that is continuously updated in every time step for all vehicles approaching a signal-controlled point. This algorithm allows vehicles to pass a traffic signal without stopping or to minimise stopping times at a red phase. This study is performed with all connected vehicles at 100% penetration rate. Conventional vehicles are also simulated in the same network as a reference. A straight road segment composed of two opposite directions with two traffic lights per lane is studied. The simulation is implemented under 150 vehicles per hour and 200 per hour traffic volume conditions to identify how different traffic densities influence the benefits of GLOSA. The results indicate that traffic flow is improved by the application of GLOSA. According to this study, vehicles passed through the traffic lights more smoothly, and waiting times were reduced by up to 28 seconds. Average delays decreased for the entire network by 86.46% and 83.84% under traffic densities of 150 vehicles per hour per lane and 200 vehicles per hour per lane, respectively.Keywords: connected vehicles, GLOSA, intelligent transport systems, vehicle-to-infrastructure communication
Procedia PDF Downloads 1754491 Influence of Flame-Holder on Existence Important Parameters in a Duct Combustion Simulator
Authors: Mohammad Mahdi Doustdar, Mohammad Mojtahedpoor
Abstract:
The effects of flame-holder position, the ratio of flame holder diameter to combustion chamber diameter and injection angle on fuel propulsive droplets sizing and effective mass fraction have been studied by a cold flow. We named the mass of fuel vapor inside the flammability limit as the effective mass fraction. An empty cylinder as well as a flame-holder which are as a simulator for duct combustion has been considered. The airflow comes into the cylinder from one side and injection operation will be done by four nozzles which are located on the entrance of cylinder. To fulfill the calculations a modified version of KIVA-3V code which is a transient, three-dimensional, multi phase, multi component code for the analysis of chemically reacting flows with sprays, is used.Keywords: KIVA-3V, flame-holder, duct combustion, effective mass fraction, mean diameter of droplets
Procedia PDF Downloads 6274490 Active Disturbance Rejection Control for Maximization of Generated Power from Wind Energy Conversion Systems using a Doubly Fed Induction Generator
Authors: Tamou Nasser, Ahmed Essadki, Ali Boukhriss
Abstract:
This paper presents the control of doubly fed induction generator (DFIG) used in the wind energy conversion systems. Maximum power point tracking (MPPT) strategy is used to extract the maximum of power during the conversion and taking care that the system does not exceed the operating limits. This is done by acting on the pitch angle to control the orientation of the turbine's blades. Having regard to its robustness and performance, active disturbance rejection control (ADRC) based on the extended state observer (ESO) is employed to achieve the control of both rotor and grid side converters. Simulations are carried out using matlab simulink.Keywords: active disturbance rejection control, extended state observer, doubly fed induction generator, maximum power point tracking
Procedia PDF Downloads 5674489 Maximization of Generated Power from Wind Energy Conversion Systems Using a Doubly Fed Induction Generator with Active Disturbance Rejection Control
Authors: Tamou Nasser, Ahmed Essadki, Ali Boukhriss
Abstract:
This paper presents the control of doubly fed induction generator (DFIG) used in the wind energy conversion systems. Maximum power point tracking (MPPT) strategy is used to extract the maximum of power during the conversion and taking care that the system does not exceed the operating limits. This is done by acting on the pitch angle to control the orientation of the turbine's blades. Having regard to its robustness and performance, active disturbance rejection control (ADRC) based on the extended state observer (ESO) is employed to achieve the control of both rotor and grid side converters. Simulations are carried out using matlab simulink.Keywords: active disturbance rejection control, extended state observer, doubly fed induction generator, maximum power point tracking
Procedia PDF Downloads 5064488 Optimal MRO Process Scheduling with Rotable Inventory to Minimize Total Earliness
Authors: Murat Erkoc, Kadir Ertogral
Abstract:
Maintenance, repair and overhauling (MRO) of high cost equipment used in many industries such as transportation, military and construction are typically subject to regulations set by local governments or international agencies. Aircrafts are prime examples for this kind of equipment. Such equipment must be overhauled at certain intervals for continuing permission of use. As such, the overhaul must be completed by strict deadlines, which often times cannot be exceeded. Due to the fact that the overhaul is typically a long process, MRO companies carry so called rotable inventory for exchange of expensive modules in the overhaul process of the equipment so that the equipment continue its services with minimal interruption. The extracted module is overhauled and returned back to the inventory for future exchange, hence the name rotable inventory. However, since the rotable inventory and overhaul capacity are limited, it may be necessary to carry out some of the exchanges earlier than their deadlines in order to produce a feasible overhaul schedule. An early exchange results with a decrease in the equipment’s cycle time in between overhauls and as such, is not desired by the equipment operators. This study introduces an integer programming model for the optimal overhaul and exchange scheduling. We assume that there is certain number of rotables at hand at the beginning of the planning horizon for a single type module and there are multiple demands with known deadlines for the exchange of the modules. We consider an MRO system with identical parallel processing lines. The model minimizes total earliness by generating optimal overhaul start times for rotables on parallel processing lines and exchange timetables for orders. We develop a fast exact solution algorithm for the model. The algorithm employs full-delay scheduling approach with backward allocation and can easily be used for overhaul scheduling problems in various MRO settings with modular rotable items. The proposed procedure is demonstrated by a case study from the aerospace industry.Keywords: rotable inventory, full-delay scheduling, maintenance, overhaul, total earliness
Procedia PDF Downloads 5484487 Detection of Safety Goggles on Humans in Industrial Environment Using Faster-Region Based on Convolutional Neural Network with Rotated Bounding Box
Authors: Ankit Kamboj, Shikha Talwar, Nilesh Powar
Abstract:
To successfully deliver our products in the market, the employees need to be in a safe environment, especially in an industrial and manufacturing environment. The consequences of delinquency in wearing safety glasses while working in industrial plants could be high risk to employees, hence the need to develop a real-time automatic detection system which detects the persons (violators) not wearing safety glasses. In this study a convolutional neural network (CNN) algorithm called faster region based CNN (Faster RCNN) with rotated bounding box has been used for detecting safety glasses on persons; the algorithm has an advantage of detecting safety glasses with different orientation angles on the persons. The proposed method of rotational bounding boxes with a convolutional neural network first detects a person from the images, and then the method detects whether the person is wearing safety glasses or not. The video data is captured at the entrance of restricted zones of the industrial environment (manufacturing plant), which is further converted into images at 2 frames per second. In the first step, the CNN with pre-trained weights on COCO dataset is used for person detection where the detections are cropped as images. Then the safety goggles are labelled on the cropped images using the image labelling tool called roLabelImg, which is used to annotate the ground truth values of rotated objects more accurately, and the annotations obtained are further modified to depict four coordinates of the rectangular bounding box. Next, the faster RCNN with rotated bounding box is used to detect safety goggles, which is then compared with traditional bounding box faster RCNN in terms of detection accuracy (average precision), which shows the effectiveness of the proposed method for detection of rotatory objects. The deep learning benchmarking is done on a Dell workstation with a 16GB Nvidia GPU.Keywords: CNN, deep learning, faster RCNN, roLabelImg rotated bounding box, safety goggle detection
Procedia PDF Downloads 1344486 Multiple Fault Detection and Classification in a Coupled Motor with Rotor Using Artificial Neural Network
Authors: Mehrdad Nouri Khajavi, Gollamhassan Payganeh, Mohsen Fallah Tafti
Abstract:
Fault diagnosis is an important aspect of maintaining rotating machinery health and increasing productivity. Many researches has been done in this regards. Many faults such as unbalance, misalignment, looseness, bearing faults, etc. have been considered and diagnosed with different techniques. Most of the researches in fault diagnosis of rotating machinery deal with single fault. Where as in reality faults usually occur simultaneously and it is, therefore, necessary to recognize them at the same time. In this research, two of the most common faults namely unbalance and misalignment have been considered simultaneously with different intensity and then identified and classified with the use of Multi-Layer Perception Neural Network (MLPNN). Processed Vibration signals are used as the input to the MLPNN, and the class of mixed unbalancy, and misalignment is the output of the NN.Keywords: unbalance, parallel misalignment, combined faults, vibration signals
Procedia PDF Downloads 3594485 Thermal Stress and Computational Fluid Dynamics Analysis of Coatings for High-Temperature Corrosion
Authors: Ali Kadir, O. Anwar Beg
Abstract:
Thermal barrier coatings are among the most popular methods for providing corrosion protection in high temperature applications including aircraft engine systems, external spacecraft structures, rocket chambers etc. Many different materials are available for such coatings, of which ceramics generally perform the best. Motivated by these applications, the current investigation presents detailed finite element simulations of coating stress analysis for a 3- dimensional, 3-layered model of a test sample representing a typical gas turbine component scenario. Structural steel is selected for the main inner layer, Titanium (Ti) alloy for the middle layer and Silicon Carbide (SiC) for the outermost layer. The model dimensions are 20 mm (width), 10 mm (height) and three 1mm deep layers. ANSYS software is employed to conduct three types of analysis- static structural, thermal stress analysis and also computational fluid dynamic erosion/corrosion analysis (via ANSYS FLUENT). The specified geometry which corresponds to corrosion test samples exactly is discretized using a body-sizing meshing approach, comprising mainly of tetrahedron cells. Refinements were concentrated at the connection points between the layers to shift the focus towards the static effects dissipated between them. A detailed grid independence study is conducted to confirm the accuracy of the selected mesh densities. To recreate gas turbine scenarios; in the stress analysis simulations, static loading and thermal environment conditions of up to 1000 N and 1000 degrees Kelvin are imposed. The default solver was used to set the controls for the simulation with the fixed support being set as one side of the model while subjecting the opposite side to a tabular force of 500 and 1000 Newtons. Equivalent elastic strain, total deformation, equivalent stress and strain energy were computed for all cases. Each analysis was duplicated twice to remove one of the layers each time, to allow testing of the static and thermal effects with each of the coatings. ANSYS FLUENT simulation was conducted to study the effect of corrosion on the model under similar thermal conditions. The momentum and energy equations were solved and the viscous heating option was applied to represent improved thermal physics of heat transfer between the layers of the structures. A Discrete Phase Model (DPM) in ANSYS FLUENT was employed which allows for the injection of continuous uniform air particles onto the model, thereby enabling an option for calculating the corrosion factor caused by hot air injection (particles prescribed 5 m/s velocity and 1273.15 K). Extensive visualization of results is provided. The simulations reveal interesting features associated with coating response to realistic gas turbine loading conditions including significantly different stress concentrations with different coatings.Keywords: thermal coating, corrosion, ANSYS FEA, CFD
Procedia PDF Downloads 1394484 Computational Fluid Dynamics Study on Water Soot Blower Direction in Tangentially Fired Pulverized-Coal Boiler
Authors: Teewin Plangsrinont, Wasawat Nakkiew
Abstract:
In this study, computational fluid dynamics (CFD) was utilized to simulate and predict the path of water from water soot blower through an ambient flow field in 300-megawatt tangentially burned pulverized coal boiler that utilizes a water soot blower as a cleaning device. To predict the position of the impact of water on the opposite side of the water soot blower under identical conditions, the nozzle size and water flow rate were fixed in this investigation. The simulation findings demonstrated a high degree of accuracy in predicting the direction of water flow to the boiler's water wall tube, which was validated by comparison to experimental data. Results show maximum deviation value of the water jet trajectory is 10.2 percent.Keywords: computational fluid dynamics, tangentially fired boiler, thermal power plant, water soot blower
Procedia PDF Downloads 2154483 Strongly Disordered Conductors and Insulators in Holography
Authors: Matthew Stephenson
Abstract:
We study the electrical conductivity of strongly disordered, strongly coupled quantum field theories, holographically dual to non-perturbatively disordered uncharged black holes. The computation reduces to solving a diffusive hydrostatic equation for an emergent horizon fluid. We demonstrate that a large class of theories in two spatial dimensions have a universal conductivity independent of disorder strength, and rigorously rule out disorder-driven conductor-insulator transitions in many theories. We present a (fine-tuned) axion-dilaton bulk theory which realizes the conductor-insulator transition, interpreted as a classical percolation transition in the horizon fluid. We address aspects of strongly disordered holography that can and cannot be addressed via mean-field modeling, such as massive gravity.Keywords: theoretical physics, black holes, holography, high energy
Procedia PDF Downloads 1834482 Stabilizing of Lithium-Solid-Electrolyte Interfaces by Atomic Layer Deposition Prepared Nano-Interlayers for a Model All-Solid-State Battery
Authors: Rainer Goetz, Zahra Ahaliabadeh, Princess S. Llanos, Aliaksandr S. Bandarenka, Tanja Kallio
Abstract:
In order to understand the electrochemistry of all-solid-state batteries (ASSBs), the use of electrochemical equivalent circuits with a physical meaning is essential. A model battery is needed whose characterization is independent of the influence of the complex battery assembly. Lithium-Ion Conducting Glass-Ceramic (LICGC), a model solid electrolyte, is chosen for its stability in the air, but on the other hand, it is also well-known for its instability against metallic lithium upon direct contact. Hence, as a first step towards a model ASSB, the interface between lithium and the solid electrolyte (SE) is stabilized with thin (5 nm and 10 nm) coatings of titanium oxide (TO) and lithium titanium oxide (LTO). Impedance data shows that both materials are able to protect the SE surface from rapid degradation due to reducing lithium and, therefore, can serve as a protective interlayer on the anode side of a model ASSB.Keywords: all-solid-state battery, lithium anode, solid electrolytes, interlayers
Procedia PDF Downloads 1204481 Critical Terrain Slope Calculation for Locating Small Hydropower Plants
Authors: C. Vrekos, C. Evagelides, N. Samarinas, G. Arampatzis
Abstract:
As known, the water energy is a renewable and clean source of energy. Energy production from hydropower has been the first, and still is today a renewable source used to generate electricity. The optimal location and sizing of a small hydropower plant is a very important issue in engineering design which encourages investigation. The aim of this paper is to present a formula that can be utilized for locating the position of a small hydropower plant although there is a high dependence on economic, environmental, and social parameters. In this paper, the economic and technical side of the problem is considered. More specifically, there is a critical terrain slope that determines if the plant should be located at the end of the slope or not. Of course, this formula can be used for a first estimate and does not include detailed economic analysis. At the end, a case study is presented for the location of a small hydropower plant in order to demonstrate the validity of the proposed formula.Keywords: critical terrain slope, economic analysis, hydropower plant locating, renewable energy
Procedia PDF Downloads 2124480 Security System for Safe Transmission of Medical Image
Authors: Mohammed Jamal Al-Mansor, Kok Beng Gan
Abstract:
This paper develops an optimized embedding of payload in medical image by using genetic optimization. The goal is to preserve region of interest from being distorted because of the watermark. By using this developed system there is no need of manual defining of region of interest through experts as the system will apply the genetic optimization to select the parts of image that can carry the watermark with guaranteeing less distortion. The experimental results assure that genetic based optimization is useful for performing steganography with less mean square error percentage.Keywords: AES, DWT, genetic algorithm, watermarking
Procedia PDF Downloads 4144479 Artificial Neural Network Approach for Modeling and Optimization of Conidiospore Production of Trichoderma harzianum
Authors: Joselito Medina-Marin, Maria G. Serna-Diaz, Alejandro Tellez-Jurado, Juan C. Seck-Tuoh-Mora, Eva S. Hernandez-Gress, Norberto Hernandez-Romero, Iaina P. Medina-Serna
Abstract:
Trichoderma harzianum is a fungus that has been utilized as a low-cost fungicide for biological control of pests, and it is important to determine the optimal conditions to produce the highest amount of conidiospores of Trichoderma harzianum. In this work, the conidiospore production of Trichoderma harzianum is modeled and optimized by using Artificial Neural Networks (AANs). In order to gather data of this process, 30 experiments were carried out taking into account the number of hours of culture (10 distributed values from 48 to 136 hours) and the culture humidity (70, 75 and 80 percent), obtained as a response the number of conidiospores per gram of dry mass. The experimental results were used to develop an iterative algorithm to create 1,110 ANNs, with different configurations, starting from one to three hidden layers, and every hidden layer with a number of neurons from 1 to 10. Each ANN was trained with the Levenberg-Marquardt backpropagation algorithm, which is used to learn the relationship between input and output values. The ANN with the best performance was chosen in order to simulate the process and be able to maximize the conidiospores production. The obtained ANN with the highest performance has 2 inputs and 1 output, three hidden layers with 3, 10 and 10 neurons in each layer, respectively. The ANN performance shows an R2 value of 0.9900, and the Root Mean Squared Error is 1.2020. This ANN predicted that 644175467 conidiospores per gram of dry mass are the maximum amount obtained in 117 hours of culture and 77% of culture humidity. In summary, the ANN approach is suitable to represent the conidiospores production of Trichoderma harzianum because the R2 value denotes a good fitting of experimental results, and the obtained ANN model was used to find the parameters to produce the biggest amount of conidiospores per gram of dry mass.Keywords: Trichoderma harzianum, modeling, optimization, artificial neural network
Procedia PDF Downloads 1654478 Automatic Approach for Estimating the Protection Elements of Electric Power Plants
Authors: Mahmoud Mohammad Salem Al-Suod, Ushkarenko O. Alexander, Dorogan I. Olga
Abstract:
New algorithms using microprocessor systems have been proposed for protection the diesel-generator unit in autonomous power systems. The software structure is designed to enhance the control automata of the system, in which every protection module of diesel-generator encapsulates the finite state machine.Keywords: diesel-generator unit, protection, state diagram, control system, algorithm, software components
Procedia PDF Downloads 4234477 Detecting Logical Errors in Haskell
Authors: Vanessa Vasconcelos, Mariza A. S. Bigonha
Abstract:
In order to facilitate both processes, this paper presents HaskellFL, a tool that uses fault localization techniques to locate a logical error in Haskell code. The Haskell subset used in this work is sufficiently expressive for those studying functional programming to get immediate help debugging their code and to answer questions about key concepts associated with the functional paradigm. HaskellFL was tested against functional programming assignments submitted by students enrolled at the functional programming class at the Federal University of Minas Gerais and against exercises from the Exercism Haskell track that are publicly available on GitHub. Furthermore, the EXAM score was chosen to evaluate the tool’s effectiveness, and results showed that HaskellFL reduced the effort needed to locate an error for all tested scenarios. Results also showed that the Ochiai method was more effective than Tarantula.Keywords: debug, fault localization, functional programming, Haskell
Procedia PDF Downloads 3024476 Several Spectrally Non-Arbitrary Ray Patterns of Order 4
Authors: Ling Zhang, Feng Liu
Abstract:
A matrix is called a ray pattern matrix if its entries are either 0 or a ray in complex plane which originates from 0. A ray pattern A of order n is called spectrally arbitrary if the complex matrices in the ray pattern class of A give rise to all possible nth degree complex polynomial. Otherwise, it is said to be spectrally non-arbitrary ray pattern. We call that a spectrally arbitrary ray pattern A of order n is minimally spectrally arbitrary if any nonzero entry of A is replaced, then A is not spectrally arbitrary. In this paper, we find that is not spectrally arbitrary when n equals to 4 for any θ which is greater than or equal to 0 and less than or equal to n. In this article, we give several ray patterns A(θ) of order n that are not spectrally arbitrary for some θ which is greater than or equal to 0 and less than or equal to n. by using the nilpotent-Jacobi method. One example is given in our paper.Keywords: spectrally arbitrary, nilpotent matrix , ray patterns, sign patterns
Procedia PDF Downloads 1884475 A Linear Active Disturbance Rejection Control for Maximization of Generated Power from Wind Energy Conversion Systems Using a Doubly Fed Induction Generator
Authors: Tamou Nasser, Ahmed Essadki, Ali Boukhriss
Abstract:
This paper presents the control of doubly fed induction generator (DFIG) used in the wind energy conversion systems. Maximum power point tracking (MPPT) strategy is used to extract the maximum of power during the conversion and taking care that the system does not exceed the operating limits. This is done by acting on the pitch angle to control the orientation of the turbine's blades. Having regard to its robustness and performance, active disturbance rejection control (ADRC) based on the extended state observer (ESO) is employed to achieve the control of both rotor and grid side converters. Simulations are carried out using MATLAB simulink.Keywords: active disturbance rejection control, extended state observer, doubly fed induction generator, maximum power point tracking
Procedia PDF Downloads 5284474 Examination of Indoor Air Quality of Naturally Ventilated Dwellings During Winters in Mega-City Kolkata
Authors: Tanya Kaur Bedi, Shankha Pratim Bhattacharya
Abstract:
The US Environmental Protection Agency defines indoor air quality as “The air quality within and around buildings, especially as it relates to the health and comfort of building occupants”. According to the 2021 report by the Energy Policy Institute at Chicago, Indian residents, a country which is home to the highest levels of air pollution in the world, lose about 5.9 years from life expectancy due to poor air quality and yet has numerous dwellings dependent on natural ventilation. Currently the urban population spends 90% of the time indoors, this scenario raises a concern for occupant health and well-being. The built environment can affect health directly and indirectly through immediate or long-term exposure to indoor air pollutants. Health effects associated with indoor air pollutants include eye/nose/throat irritation, respiratory diseases, heart disease, and even cancer. This study attempts to demonstrate the causal relationship between the indoor air quality and its determining aspects. Detailed indoor air quality audits were conducted in residential buildings located in Kolkata, India in the months of December and January 2021. According to the air pollution knowledge assessment city program in India, Kolkata is also the second most polluted mega-city after Delhi. Although the air pollution levels are alarming year-long, the winter months are most crucial due to the unfavorable environmental conditions. While emissions remain typically constant throughout the year, cold air is denser and moves slower than warm air, trapping the pollution in place for much longer and consequently is breathed in at a higher rate than the summers. The air pollution monitoring period was selected considering environmental factors and major pollution contributors like traffic and road dust. This study focuses on the relationship between the built environment and the spatial-temporal distribution of air pollutants in and around it. The measured parameters include, temperature, relative humidity, air velocity, particulate matter, volatile organic compounds, formaldehyde, and benzene. A total of 56 rooms were audited, selectively targeting the most dominant middle-income group. The data-collection was conducted using a set of instruments positioned in the human breathing-zone. The study assesses indoor air quality based on factors determining natural ventilation and air pollution dispersion such as surrounding environment, dominant wind, openable window to floor area ratio, windward or leeward side openings, and natural ventilation type in the room: single side or cross-ventilation, floor height, residents cleaning habits, etc.Keywords: indoor air quality, occupant health, urban housing, air pollution, natural ventilation, architecture, urban issues
Procedia PDF Downloads 1284473 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security
Authors: D. Pugazhenthi, B. Sree Vidya
Abstract:
Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification
Procedia PDF Downloads 2664472 Sustainability: Effect of Earthquake in Micro Hydro Sector, a Case Study of Micro Hydro Projects in Northern Part of Kavre District, Nepal
Authors: Ram Bikram Thapa, Ganesh Lama
Abstract:
The Micro Hydro is one of the successful technology in Rural Nepal. Kavre is one of the pioneer district of sustainability of Micro Hydro Projects. A total of 30 Micro Hydro projects have been constructed with producing 700 KW of energy in northern side of the Kavre district. This study shows that 67% of projects have been affected by devastating earthquake in April and May, 2015. Out of them 23% are completely damaged. Most of the structures are failure like Penstock 71%, forebay 21%, powerhouse 7% have been completely damaged and 91% Canal & 44% Intake structures have been partially damaged by the earthquake. This paper empathizes that the engineering design is the vital component for sustainability of Micro Hydro Projects. This paper recommended that technicians should be considered the safety factor of earthquake and provision of disaster recovery fund during design of Micro Hydro Projects.Keywords: micro hydro, earthquake, structural failure, sustainability
Procedia PDF Downloads 3514471 Analyzing the Effects of Adding Bitcoin to Portfolio
Authors: Shashwat Gangwal
Abstract:
This paper analyses the effect of adding Bitcoin, to the portfolio (stocks, bonds, Baltic index, MXEF, gold, real estate and crude oil) of an international investor by using daily data available from 2nd of July, 2010 to 2nd of August, 2016. We conclude that adding Bitcoin to portfolio, over the course of the considered period, always yielded a higher Sharpe ratio. This means that Bitcoin’s returns offset its high volatility. This paper, recognizing the fact that Bitcoin is a relatively new asset class, gives the readers a basic idea about the working of the virtual currency, the increasing number developments in the financial industry revolving around it, its unique features and the detailed look into its continuously growing acceptance across different fronts (Banks, Merchants and Countries) globally. We also construct optimal portfolios to reflect the highly lucrative and largely unexplored opportunities associated with investment in Bitcoin.Keywords: bitcoin, financial instruments, portfolio management, risk adjusted return
Procedia PDF Downloads 2374470 Reinforcement Learning For Agile CNC Manufacturing: Optimizing Configurations And Sequencing
Authors: Huan Ting Liao
Abstract:
In a typical manufacturing environment, computer numerical control (CNC) machining is essential for automating production through precise computer-controlled tool operations, significantly enhancing efficiency and ensuring consistent product quality. However, traditional CNC production lines often rely on manual loading and unloading, limiting operational efficiency and scalability. Although automated loading systems have been developed, they frequently lack sufficient intelligence and configuration efficiency, requiring extensive setup adjustments for different products and impacting overall productivity. This research addresses the job shop scheduling problem (JSSP) in CNC machining environments, aiming to minimize total completion time (makespan) and maximize CNC machine utilization. We propose a novel approach using reinforcement learning (RL), specifically the Q-learning algorithm, to optimize scheduling decisions. The study simulates the JSSP, incorporating robotic arm operations, machine processing times, and work order demand allocation to determine optimal processing sequences. The Q-learning algorithm enhances machine utilization by dynamically balancing workloads across CNC machines, adapting to varying job demands and machine states. This approach offers robust solutions for complex manufacturing environments by automating decision-making processes for job assignments. Additionally, we evaluate various layout configurations to identify the most efficient setup. By integrating RL-based scheduling optimization with layout analysis, this research aims to provide a comprehensive solution for improving manufacturing efficiency and productivity in CNC-based job shops. The proposed method's adaptability and automation potential promise significant advancements in tackling dynamic manufacturing challenges.Keywords: job shop scheduling problem, reinforcement learning, operations sequence, layout optimization, q-learning
Procedia PDF Downloads 32