Search results for: path connected
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2595

Search results for: path connected

2295 Investigating the Motion of a Viscous Droplet in Natural Convection Using the Level Set Method

Authors: Isadora Bugarin, Taygoara F. de Oliveira

Abstract:

Binary fluids and emulsions, in general, are present in a vast range of industrial, medical, and scientific applications, showing complex behaviors responsible for defining the flow dynamics and the system operation. However, the literature describing those highlighted fluids in non-isothermal models is currently still limited. The present work brings a detailed investigation on droplet migration due to natural convection in square enclosure, aiming to clarify the effects of drop viscosity on the flow dynamics by showing how distinct viscosity ratios (droplet/ambient fluid) influence the drop motion and the final movement pattern kept on stationary regimes. The analysis was taken by observing distinct combinations of Rayleigh number, drop initial position, and viscosity ratios. The Navier-Stokes and Energy equations were solved considering the Boussinesq approximation in a laminar flow using the finite differences method combined with the Level Set method for binary flow solution. Previous results collected by the authors showed that the Rayleigh number and the drop initial position affect drastically the motion pattern of the droplet. For Ra ≥ 10⁴, two very marked behaviors were observed accordingly with the initial position: the drop can travel either a helical path towards the center or a cyclic circular path resulting in a closed cycle on the stationary regime. The variation of viscosity ratio showed a significant alteration of pattern, exposing a large influence on the droplet path, capable of modifying the flow’s behavior. Analyses on viscosity effects on the flow’s unsteady Nusselt number were also performed. Among the relevant contributions proposed in this work is the potential use of the flow initial conditions as a mechanism to control the droplet migration inside the enclosure.

Keywords: binary fluids, droplet motion, level set method, natural convection, viscosity

Procedia PDF Downloads 96
2294 An Integer Nonlinear Program Proposal for Intermodal Transportation Service Network Design

Authors: Laaziz El Hassan

Abstract:

The Service Network Design Problem (SNDP) is a tactical issue in freight transportation firms. The existing formulations of the problem for intermodal rail-road transportation were not always adapted to the intermodality in terms of full asset utilization and modal shift reinforcement. The objective of the article is to propose a model having a more compliant formulation with intermodality, including constraints highlighting the imperatives of asset management, reinforcing modal shift from road to rail and reducing, by the way, road mode CO2 emissions. The model is a fixed charged, path based integer nonlinear program. Its objective is to minimize services total cost while ensuring full assets utilization to satisfy freight demand forecast. The model's main feature is that it gives as output both the train sizes and the services frequencies for a planning period. We solved the program using a commercial solver and discussed the numerical results.

Keywords: intermodal transport network, service network design, model, nonlinear integer program, path-based, service frequencies, modal shift

Procedia PDF Downloads 98
2293 Sperm Flagellum Center-Line Tracing in 4D Stacks Using an Iterative Minimal Path Method

Authors: Paul Hernandez-Herrera, Fernando Montoya, Juan Manuel Rendon, Alberto Darszon, Gabriel Corkidi

Abstract:

Intracellular calcium ([Ca2+]i) regulates sperm motility. The analysis of [Ca2+]i has been traditionally achieved in two dimensions while the real movement of the cell takes place in three spatial dimensions. Due to optical limitations (high speed cell movement and low light emission) important data concerning the three dimensional movement of these flagellated cells had been neglected. Visualizing [Ca2+]i in 3D is not a simple matter since it requires complex fluorescence microscopy techniques where the resulting images have very low intensity and consequently low SNR (Signal to Noise Ratio). In 4D sequences, this problem is magnified since the flagellum oscillates (for human sperm) at least at an average frequency of 15 Hz. In this paper, a novel approach to extract the flagellum’s center-line in 4D stacks is presented. For this purpose, an iterative algorithm based on the fast-marching method is proposed to extract the flagellum’s center-line. Quantitative and qualitative results are presented in a 4D stack to demonstrate the ability of the proposed algorithm to trace the flagellum’s center-line. The method reached a precision and recall of 0.96 as compared with a semi-manual method.

Keywords: flagellum, minimal path, segmentation, sperm

Procedia PDF Downloads 261
2292 The Mediation Role of Loneliness in the Relationship between Interpersonal Trust and Empathy

Authors: Ghazal Doostmohammadi, Susan Rahimzadeh

Abstract:

Aim: This research aimed to investigate the relationship between empathy and interpersonal trust and recognize the mediating role of loneliness between them in both genders. Methods: With a correlational descriptive design, 192 university students (130 female and 62 male) responded to the questionnaires on “empathy quotient,” “loneliness,” and “interpersonal trust” tests. These tests were designed and validated by experts in the field. Data were analysed using Pearson correlation and path analysis, which is a statistical technique that uses standard linear regression equations to determine the degree of conformity of a theoretical causal model with reality. Results: The data analysis showed that there was no significant correlation between interpersonal trust, both with loneliness (t=0.169) and empathy (t=0.186), while there was a significant negative correlation (t=0.359) between empathy and loneliness. This means that there is an inverse correlation between empathy and loneliness. The path analysis confirmed the hypothesis of the research about the mediating role of loneliness between empathy and interpersonal trust. But gender did not play a role in this relationship. Conclusion: As an outcome, clinical professionals and education trainers should pay more attention to interpersonal trust as a basic need and try to recreate and shape it to prevent people's social breakdown, and on the other hand, self-disclosure training (especially in Men), expression of feelings and courage should be given double importance to prevent the consequences of loneliness.

Keywords: empathy, loneliness, interpersonal trust, gender

Procedia PDF Downloads 61
2291 A Linearly Scalable Family of Swapped Networks

Authors: Richard Draper

Abstract:

A supercomputer can be constructed from identical building blocks which are small parallel processors connected by a network referred to as the local network. The routers have unused ports which are used to interconnect the building blocks. These connections are referred to as the global network. The address space has a global and a local component (g, l). The conventional way to connect the building blocks is to connect (g, l) to (g’,l). If there are K blocks, this requires K global ports in each router. If a block is of size M, the result is a machine with KM routers having diameter two. To increase the size of the machine to 2K blocks, each router connects to only half of the other blocks. The result is a larger machine but also one with greater diameter. This is a crude description of how the network of the CRAY XC® is designed. In this paper, a family of interconnection networks using routers with K global and M local ports is defined. Coordinates are (c,d, p) and the global connections are (c,d,p)↔(c’,p,d) which swaps p and d. The network is denoted D3(K,M) and is called a Swapped Dragonfly. D3(K,M) has KM2 routers and has diameter three, regardless of the size of K. To produce a network of size KM2 conventionally, diameter would be an increasing function of K. The family of Swapped Dragonflies has other desirable properties: 1) D3(K,M) scales linearly in K and quadratically in M. 2) If L < K, D3(K,M) contains many copies of D3(L,M). 3) If L < M, D3(K,M) contains many copies of D3(K,L). 4) D3(K,M) can perform an all-to-all exchange in KM2+KM time which is only slightly more than the time to do a one-to-all. This paper makes several contributions. It is the first time that a swap has been used to define a linearly scalable family of networks. Structural properties of this new family of networks are thoroughly examined. A synchronizing packet header is introduced. It specifies the path to be followed and it makes it possible to define highly parallel communication algorithm on the network. Among these is an all-to-all exchange in time KM2+KM. To demonstrate the effectiveness of the swap properties of the network of the CRAY XC® and D3(K,16) are compared.

Keywords: all-to-all exchange, CRAY XC®, Dragonfly, interconnection network, packet switching, swapped network, topology

Procedia PDF Downloads 103
2290 Long Term Evolution Multiple-Input Multiple-Output Network in Unmanned Air Vehicles Platform

Authors: Ashagrie Getnet Flattie

Abstract:

Line-of-sight (LOS) information, data rates, good quality, and flexible network service are limited by the fact that, for the duration of any given connection, they experience severe variation in signal strength due to fading and path loss. Wireless system faces major challenges in achieving wide coverage and capacity without affecting the system performance and to access data everywhere, all the time. In this paper, the cell coverage and edge rate of different Multiple-input multiple-output (MIMO) schemes in 20 MHz Long Term Evolution (LTE) system under Unmanned Air Vehicles (UAV) platform are investigated. After some background on the enormous potential of UAV, MIMO, and LTE in wireless links, the paper highlights the presented system model which attempts to realize the various benefits of MIMO being incorporated into UAV platform. The performances of the three MIMO LTE schemes are compared with the performance of 4x4 MIMO LTE in UAV scheme carried out to evaluate the improvement in cell radius, BER, and data throughput of the system in different morphology. The results show that significant performance gains such as bit error rate (BER), data rate, and coverage can be achieved by using the presented scenario.

Keywords: LTE, MIMO, path loss, UAV

Procedia PDF Downloads 255
2289 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 121
2288 DC Bus Voltage Ripple Control of Photo Voltaic Inverter in Low Voltage Ride-Trough Operation

Authors: Afshin Kadri

Abstract:

Using Renewable Energy Resources (RES) as a type of DG unit is developing in distribution systems. The connection of these generation units to existing AC distribution systems changes the structure and some of the operational aspects of these grids. Most of the RES requires to power electronic-based interfaces for connection to AC systems. These interfaces consist of at least one DC/AC conversion unit. Nowadays, grid-connected inverters must have the required feature to support the grid under sag voltage conditions. There are two curves in these conditions that show the magnitude of the reactive component of current as a function of voltage drop value and the required minimum time value, which must be connected to the grid. This feature is named low voltage ride-through (LVRT). Implementing this feature causes problems in the operation of the inverter that increases the amplitude of high-frequency components of the injected current and working out of maximum power point in the photovoltaic panel connected inverters are some of them. The important phenomenon in these conditions is ripples in the DC bus voltage that affects the operation of the inverter directly and indirectly. The losses of DC bus capacitors which are electrolytic capacitors, cause increasing their temperature and decreasing its lifespan. In addition, if the inverter is connected to the photovoltaic panels directly and has the duty of maximum power point tracking, these ripples cause oscillations around the operating point and decrease the generating energy. Using a bidirectional converter in the DC bus, which works as a buck and boost converter and transfers the ripples to its DC bus, is the traditional method to eliminate these ripples. In spite of eliminating the ripples in the DC bus, this method cannot solve the problem of reliability because it uses an electrolytic capacitor in its DC bus. In this work, a control method is proposed which uses the bidirectional converter as the fourth leg of the inverter and eliminates the DC bus ripples using an injection of unbalanced currents into the grid. Moreover, the proposed method works based on constant power control. In this way, in addition, to supporting the amplitude of grid voltage, it stabilizes its frequency by injecting active power. Also, the proposed method can eliminate the DC bus ripples in deep voltage drops, which cause increasing the amplitude of the reference current more than the nominal current of the inverter. The amplitude of the injected current for the faulty phases in these conditions is kept at the nominal value and its phase, together with the phase and amplitude of the other phases, are adjusted, which at the end, the ripples in the DC bus are eliminated, however, the generated power decreases.

Keywords: renewable energy resources, voltage drop value, DC bus ripples, bidirectional converter

Procedia PDF Downloads 52
2287 An Improved Modular Multilevel Converter Voltage Balancing Approach for Grid Connected PV System

Authors: Safia Bashir, Zulfiqar Memon

Abstract:

During the last decade, renewable energy sources in particular solar photovoltaic (PV) has gained increased attention. Therefore, various PV converters topologies have emerged. Among this topology, the modular multilevel converter (MMC) is considered as one of the most promising topologies for the grid-connected PV system due to its modularity and transformerless features. When it comes to the safe operation of MMC, the balancing of the Submodules Voltages (SMs) plays a critical role. This paper proposes a balancing approach based on space vector PWM (SVPWM). Unlike the existing techniques, this method generates the switching vectors for the MMC by using only one SVPWM for the upper arm. The lower arm switching vectors are obtained by finding the complement of the upper arm switching vectors. The use of one SVPWM not only simplifies the calculation but also helped in reducing the circulating current in the MMC. The proposed method is varied through simulation using Matlab/Simulink and compared with other available modulation methods. The results validate the ability of the suggested method in balancing the SMs capacitors voltages and reducing the circulating current which will help in reducing the power loss of the PV system.

Keywords: capacitor voltage balancing, circulating current, modular multilevel converter, PV system

Procedia PDF Downloads 140
2286 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation

Authors: Venkata Venugopal Rao Gudlur

Abstract:

The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.

Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework

Procedia PDF Downloads 81
2285 The Beam Expansion Method, A Simplified and Efficient Approach of Field Propagation and Resonators Modes Study

Authors: Zaia Derrar Kaddour

Abstract:

The study of a beam throughout an optical path is generally achieved by means of diffraction integral. Unfortunately, in some problems, this tool turns out to be not very friendly and hard to implement. Instead, the beam expansion method for computing field profiles appears to be an interesting alternative. The beam expansion method consists of expanding the field pattern as a series expansion in a set of orthogonal functions. Propagating each individual component through a circuit and adding up the derived elements leads easily to the result. The problem is then reduced to finding how the expansion coefficients change in a circuit. The beam expansion method requires a systematic study of each type of optical element that can be met in the considered optical path. In this work, we analyze the following fundamental elements: first order optical systems, hard apertures and waveguides. We show that the former element type is completely defined thanks to the Gouy phase shift expression we provide and the latters require a suitable mode conversion. For endorsing the usefulness and relevance of the beam expansion approach, we show here some of its applications such as the treatment of the thermal lens effect and the study of unstable resonators.

Keywords: gouy phase shift, modes, optical resonators, unstable resonators

Procedia PDF Downloads 39
2284 Converting Scheduling Time into Calendar Date Considering Non-Interruptible Construction Tasks

Authors: Salman Ali Nisar, Suzuki Koji

Abstract:

In this paper we developed a new algorithm to convert the project scheduling time into calendar date in order to handle non-interruptible activities not to be split by non-working days (such as weekend and holidays). In a construction project some activities might require not to be interrupted even on non-working days, or to be finished on the end day of business days. For example, concrete placing work might be required to be completed by the end day of weekdays i.e. Friday, and curing in the weekend. This research provides an algorithm that imposes time constraint for start and finish times of non-interruptible activities. The algorithm converts working days, which is obtained by Critical Path Method (CPM), to calendar date with consideration of the start date of a project. After determining the interruption by non-working days, the start time of a certain activity should be postponed, if there is enough total float value. Otherwise, the duration is shortened by hiring additional resources capacity or/and using overtime work execution. Then, time constraints are imposed to start time and finish time of the activity. The algorithm is developed in Excel Spreadsheet for microcomputer and therefore we can easily get a feasible, calendared construction schedule for such a construction project with some non-interruptible activities.

Keywords: project management, scheduling, critical path method, time constraint, non-interruptible tasks

Procedia PDF Downloads 487
2283 The Importance of Right Speech in Buddhism and Its Relevance Today

Authors: Gautam Sharda

Abstract:

The concept of right speech is the third stage of the noble eightfold path as prescribed by the Buddha and followed by millions of practicing Buddhists. The Buddha lays a lot of importance on the notion of right speech (Samma Vacca). In the Angutara Nikaya, the Buddha mentioned what constitutes right speech, which is basically four kinds of abstentions; namely abstaining from false speech, abstaining from slanderous speech, abstaining from harsh or hateful speech and abstaining from idle chatter. The Buddha gives reasons in support of his view as to why abstaining from these four kinds of speeches is favourable not only for maintaining the peace and equanimity within an individual but also within a society. It is a known fact that when we say something harsh or slanderous to others, it eventually affects our individual peace of mind too. We also know about the many examples of hate speeches which have led to senseless cases of violence and which are well documented within our country and the world. Also, indulging in false speech is not a healthy sign for individuals within a group as this kind of a social group which is based on falsities and lies cannot really survive for long and will eventually lead to chaos. Buddha also told us to refrain from idle chatter or gossip as generally we have seen that idle chatter or gossip does more harm than any good to the individual and the society. Hence, if most of us actually inculcate this third stage (namely, right speech) of the noble eightfold path of the Buddha in our daily life, it would be highly beneficial both for the individual and for the harmony of the society.

Keywords: Buddhism, speech, individual, society

Procedia PDF Downloads 241
2282 On the Paradigm Shift of the Overall Urban Design in China

Authors: Gaoyuan Wang, Tian Chen, Junnan Liu

Abstract:

Facing a period of major change that’s rarely seen in a century, China formulates the 14th Five-Year Plan and places emphasis on promoting high-quality development. In this context, the overall urban design has become a crucial and systematic tool for high-quality urban development. However, there are bottlenecks in the nature definition, content scope and transmission mechanisms of the current overall urban design in China. The paper interprets the emerging demands of the 14th Five-Year Plan on urban design in terms of new value-quality priority, new dynamic-space performance, new target-region coordination and new path-refined governance. Based on the new trend and appeal, the multi-dimensional thinking integrated with the major tasks of urban design are proposed accordingly, which is the biomass thinking in ecological, production and living element, the strategic thinking in spatial structure, the systematic thinking in the cityscape, the low-carbon thinking in urban form, the governance thinking in public space, the user thinking in design implementation. The paper explores the possibility of transforming the value thinking and technical system of urban design in China and provides a breakthrough path for the urban planning and design industry to better respond to the propositions of the country’s 14th Five-Year Plan.

Keywords: China’s 14th five-year plan, overall urban design, urban design thinking, transformation of urban design

Procedia PDF Downloads 238
2281 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 121
2280 Heterogeneity of Thinking: Religious Beliefs and Logical Concepts

Authors: Alisa Rekunova

Abstract:

According to the theory of word meaning structure developed by Lev Vygotsky (and later modified by Aaro Toomela), there are several levels of thought: sensory-based concepts, situation concepts, logical concepts, and structural-systemic concepts. There are differences between people who have relatively easy access to logical thought compared to those who mostly tend to think in everyday concepts. Religious beliefs are connected with unprovable concepts (Christian Jesus’s ascension or Pagan energy) that cannot be non-controversially related to scientific concepts. However, many scientists in the research are believers of some kinds. Religious views can be different: there are believers, non-believers (atheists), and undecided (we can call them agnostics). Some of the respondents say that scientific or professional and religious spheres do not overlap. Therefore, we can assume they do not see any conflict. Some of them, on the contrary, hesitate to answer and we can conclude they see the conflicts, but they do not want (or do not believe they are able to) to solve it. Finally, the third category of respondents says that religious beliefs and scientific concepts cannot coexist in the human mind. It can be expected that the third category of respondents should have higher education (or even work in the scientific field) but many scientists in the research answer that religious and scientific spheres do not overlap. Therefore, there are other things besides the level of education that is connected with resolving conflicts.

Keywords: conflicts in thinking, cultural-historical psychology, heterogeneity of thinking, religious thinking

Procedia PDF Downloads 126
2279 Proposed Location of Grid Connected Wind-Pv Hybrid System Based on Load Flow and Voltage Stability Indices Study

Authors: Bazilah Ismail, Muhammad Mat Naain, Ibrahim Alhamrouni, Lilik Jamilatul Awalin, Fadi Albatsh, Mohd Fairuz Abdul Hamid

Abstract:

Rapid depletion and prices of the conventional energy sources have stimulated the development of the renewable energy source (RES). Due to the unpredicted and intermittent nature of RES, the hybrid renewable energy system (HRES) is the best solution to complement the nature of the respective sources, and the combination of the wind and solar energy is rapidly gaining popularity. The significant challenges on the operation and planning of the grid system with a high HRES penetration has become an important subject since the location of HRES plant give impact towards the existing system. This paper aims to propose the location of the grid connected Wind-PV hybrid plant (WPHP) based on load flow and voltage stability indices study. Several case studies are carried out using IEEE 14 bus system, and the system is modeled and tested in DigSILENT PowerFactory.

Keywords: hybrid renewable energy system, wind farm, photovoltaic system, voltage stability and load flow

Procedia PDF Downloads 298
2278 Improving Urban Mobility: Analyzing Impacts of Connected and Automated Vehicles on Traffic and Emissions

Authors: Saad Roustom, Hajo Ribberink

Abstract:

In most cities in the world, traffic has increased strongly over the last decades, causing high levels of congestion and deteriorating inner-city air quality. This study analyzes the impact of connected and automated vehicles (CAVs) on traffic performance and greenhouse gas (GHG) emissions under different CAV penetration rates in mixed fleet environments of CAVs and driver-operated vehicles (DOVs) and under three different traffic demand levels. Utilizing meso-scale traffic simulations of the City of Ottawa, Canada, the research evaluates the traffic performance of three distinct CAV driving behaviors—Cautious, Normal, and Aggressive—at penetration rates of 25%, 50%, 75%, and 100%, across three different traffic demand levels. The study employs advanced correlation models to estimate GHG emissions. The results reveal that Aggressive and Normal CAVs generally reduce traffic congestion and GHG emissions, with their benefits being more pronounced at higher penetration rates (50% to 100%) and elevated traffic demand levels. On the other hand, Cautious CAVs exhibit an increase in both traffic congestion and GHG emissions. However, results also show deteriorated traffic flow conditions when introducing 25% penetration rates of any type of CAVs. Aggressive CAVs outperform all other driving at improving traffic flow conditions and reducing GHG emissions. The findings of this study highlight the crucial role CAVs can play in enhancing urban traffic performance and mitigating the adverse impact of transportation on the environment. This research advocates for the adoption of effective CAV-related policies by regulatory bodies to optimize traffic flow and reduce GHG emissions. By providing insights into the impact of CAVs, this study aims to inform strategic decision-making and stimulate the development of sustainable urban mobility solutions.

Keywords: connected and automated vehicles, congestion, GHG emissions, mixed fleet environment, traffic performance, traffic simulations

Procedia PDF Downloads 62
2277 Efficient Energy Extraction Circuit for Impact Harvesting from High Impedance Sources

Authors: Sherif Keddis, Mohamed Azzam, Norbert Schwesinger

Abstract:

Harvesting mechanical energy from footsteps or other impacts is a possibility to enable wireless autonomous sensor nodes. These can be used for a highly efficient control of connected devices such as lights, security systems, air conditioning systems or other smart home applications. They can also be used for accurate location or occupancy monitoring. Converting the mechanical energy into useful electrical energy can be achieved using the piezoelectric effect offering simple harvesting setups and low deflections. The challenge facing piezoelectric transducers is the achievable amount of energy per impact in the lower mJ range and the management of such low energies. Simple setups for energy extraction such as a full wave bridge connected directly to a capacitor are problematic due to the mismatch between high impedance sources and low impedance storage elements. Efficient energy circuits for piezoelectric harvesters are commonly designed for vibration harvesters and require periodic input energies with predictable frequencies. Due to the sporadic nature of impact harvesters, such circuits are not well suited. This paper presents a self-powered circuit that avoids the impedance mismatch during energy extraction by disconnecting the load until the source reaches its charge peak. The switch is implemented with passive components and works independent from the input frequency. Therefore, this circuit is suited for impact harvesting and sporadic inputs. For the same input energy, this circuit stores 150% of the energy in comparison to a directly connected capacitor to a bridge rectifier. The total efficiency, defined as the ratio of stored energy on a capacitor to available energy measured across a matched resistive load, is 63%. Although the resulting energy is already sufficient to power certain autonomous applications, further optimization of the circuit are still under investigation in order to improve the overall efficiency.

Keywords: autonomous sensors, circuit design, energy harvesting, energy management, impact harvester, piezoelectricity

Procedia PDF Downloads 129
2276 Assessment of the Contribution of Geographic Information System Technology in Non Revenue Water: Case Study Dar Es Salaam Water and Sewerage Authority Kawe - Mzimuni Street

Authors: Victor Pesco Kassa

Abstract:

This research deals with the assessment of the contribution of GIS Technology in NRW. This research was conducted at Dar, Kawe Mzimuni Street. The data collection was obtained from existing source which is DAWASA HQ. The interpretation of the data was processed by using ArcGIS software. The data collected from the existing source reveals a good coverage of DAWASA’s water network at Mzimuni Street. Most of residents are connected to the DAWASA’s customer service. Also the collected data revealed that by using GIS DAWASA’s customer Geodatabase has been improved. Through GIS we can prepare customer location map purposely for site surveying also this map will be able to show different type of customer that are connected to DAWASA’s water service. This is a perfect contribution of the GIS Technology to address and manage the problem of NRW in DAWASA. Finally, the study recommends that the same study should be conducted in other DAWASA’s zones such as Temeke, Boko and Bagamoyo not only at Kawe Mzimuni Street. Through this study it is observed that ArcGIS software can offer powerful tools for managing and processing information geographically and in water and sanitation authorities such as DAWASA.

Keywords: DAWASA, NRW, Esri, EURA, ArcGIS

Procedia PDF Downloads 63
2275 Some Codes for Variants in Graphs

Authors: Sofia Ait Bouazza

Abstract:

We consider the problem of finding a minimum identifying code in a graph. This problem was initially introduced in 1998 and has been since fundamentally connected to a wide range of applications (fault diagnosis, location detection …). Suppose we have a building into which we need to place fire alarms. Suppose each alarm is designed so that it can detect any fire that starts either in the room in which it is located or in any room that shares a doorway with the room. We want to detect any fire that may occur or use the alarms which are sounding to not only to not only detect any fire but be able to tell exactly where the fire is located in the building. For reasons of cost, we want to use as few alarms as necessary. The first problem involves finding a minimum domination set of a graph. If the alarms are three state alarms capable of distinguishing between a fire in the same room as the alarm and a fire in an adjacent room, we are trying to find a minimum locating domination set. If the alarms are two state alarms that can only sound if there is a fire somewhere nearby, we are looking for a differentiating domination set of a graph. These three areas are the subject of much active research; we primarily focus on the third problem. An identifying code of a graph G is a dominating set C such that every vertex x of G is distinguished from other vertices by the set of vertices in C that are at distance at most r≥1 from x. When only vertices out of the code are asked to be identified, we get the related concept of a locating dominating set. The problem of finding an identifying code (resp a locating dominating code) of minimum size is a NP-hard problem, even when the input graph belongs to a number of specific graph classes. Therefore, we study this problem in some restricted classes of undirected graphs like split graph, line graph and path in a directed graph. Then we present some results on the identifying code by giving an exact value of upper total locating domination and a total 2-identifying code in directed and undirected graph. Moreover we determine exact values of locating dominating code and edge identifying code of thin headless spider and locating dominating code of complete suns.

Keywords: identiying codes, locating dominating set, split graphs, thin headless spider

Procedia PDF Downloads 454
2274 The Concept of Dharma under Hindu, Buddhist and Sikh Religions: A Comparative Analysis

Authors: Venkateswarlu Kappara

Abstract:

The term ‘Dharma’ is complex and ubiquitous. It has no equivalent word in English Initially applied to Aryans. In Rig Veda, it appears in a number of places with different meanings. The word Dharma comes from the roots word ‘dhr’ (Dhri-Dharayatetiiti Dharmaha). Principles of Dharma are all pervading. The closest synonyms for Dharma in English is ‘Righteousness.’ In a holy book Mahabharata, it is mentioned that Dharma destroys those who destroy it, Dharma Protects those who protect it. Also, Dharma might be shadowed, now and then by evil forces, but at the end, Dharma always triumphs. This line embodies the eternal victory of good over evil. In Mahabharata, Lord Krishna says Dharma upholds both, this worldly and other worldly affairs. Rig Veda says, ‘O Indra! Lead us on the path of Rta, on the right path over all evils.’ For Buddhists, Dharma most often means the body of teachings expounded by the Buddha. The Dharma is one of the three Jewels (Tri Ratnas) of Buddhism under which the followers take refuge. They are: the ‘Buddha’ meaning the minds perfection or enlightenment, the Dharma, meaning the teachings and the methods of the Buddha, and the Sangha meaning those awakened people who provide guidance and support followers. Buddha denies a separate permanent ‘I.’ Buddha Accepts Suffering (Dukka). Change / impermanence (Anicca) and not– self (Annatta) Dharma in the Buddhist scriptures has a variety of meanings including ‘phenomenon’ and ‘nature’ or ‘characteristic.’ For Sikhs, the word ‘Dharma’ means the ‘path’ of righteousness’ The Sikh scriptures attempt to answer the exposition of Dharma. The main Holy Scripture of the Sikh religion is called the Guru Granth Sahib. The faithful people are fully bound to do whatever the Dharma wants them to do. Such is the name of the Immaculate Lord. Only one who has faith comes to know such a state of mind. The righteous judge of Dharma, by the Hukam of God’s Command, sits and Administers true justice. From Dharma flow wealth and pleasure. The study indicates that in Sikh religion, the Dharma is the path of righteousness; In Buddhism, the mind’s perfection of enlightenment, and in Hinduism, it is non-violence, purity, truth, control of senses, not coveting the property of others. The comparative study implies that all religions dealt with Dharma for welfare of the mankind. The methodology adapted is theoretical, analytical and comparative. The present study indicates how far Indian philosophical systems influenced the present circumstances and how far the present system is not compatible with Ancient philosophical systems. A tentative generalization would be that the present system which is mostly influenced by the British Governance may not totally reflect the ancient norms. However, the mental make-up continues to be influenced by Ancient philosophical systems.

Keywords: Dharma, Dukka (suffering), Rakshati, righteous

Procedia PDF Downloads 149
2273 An Approach to Maximize the Influence Spread in the Social Networks

Authors: Gaye Ibrahima, Mendy Gervais, Seck Diaraf, Ouya Samuel

Abstract:

In this paper, we consider the influence maximization in social networks. Here we give importance to initial diffuser called the seeds. The goal is to find efficiently a subset of k elements in the social network that will begin and maximize the information diffusion process. A new approach which treats the social network before to determine the seeds, is proposed. This treatment eliminates the information feedback toward a considered element as seed by extracting an acyclic spanning social network. At first, we propose two algorithm versions called SCG − algoritm (v1 and v2) (Spanning Connected Graphalgorithm). This algorithm takes as input data a connected social network directed or no. And finally, a generalization of the SCG − algoritm is proposed. It is called SG − algoritm (Spanning Graph-algorithm) and takes as input data any graph. These two algorithms are effective and have each one a polynomial complexity. To show the pertinence of our approach, two seeds set are determined and those given by our approach give a better results. The performances of this approach are very perceptible through the simulation carried out by the R software and the igraph package.

Keywords: acyclic spanning graph, centrality measures, information feedback, influence maximization, social network

Procedia PDF Downloads 224
2272 Participatory Approach for Urban Sustainability through Ostrom’s Principles

Authors: Kuladeep Kumar Sadevi

Abstract:

The shift towards raising global urban population has intense implications on the sustainability of the urban livelihoods. Rapid urbanization has made governments, companies and civil societies recognize that they are barely equipped to deal with growing urban demands, especially water, waste and energy management. Effective management of land, water, energy and waste at a community level should be addressed well to attain greener cities. In pursuit of Green livelihoods; various norms, codes, and green rating programmes have been followed by stakeholders at various levels. While the sustainability is being adapted at smaller scale developments, greening the urban environment at community/city level is still finding its path to reality. This is due to lack of the sense of ownership in the citizens for their immediate neighborhoods and city as a whole. This phenomenon can be well connected to the theory of 'tragedy of commons' with respect to the community engagement to manage the common pool resources. The common pool resource management has been well addressed by Elinor Ostrom, who shared the Nobel Prize in Economics in 2009 for her lifetime of scholarly work investigating how communities succeed or fail at managing common pool (finite) resources. This paper examines the applicability of Elinor Ostrom's 8 Principles for Managing a Commons, to meet urban sustainability. The key objective of this paper is to come up with a model for effective urban common pool resource management, which ultimately leads to sustainability as a whole. The paper brings out a methodology to understand various parameters involved in urban sustainability, examine the synergies of all such parameters, and application of Ostrom’s principles to correlate these parameters in order to attain effective urban resource management.

Keywords: common pool resources, green cities, green communities, participatory management, sustainable development, urban resource management, urban sustainability

Procedia PDF Downloads 335
2271 Performance of Partially Covered N Number of Photovoltaic Thermal (PVT) - Compound Parabolic Concentrator (CPC) Series Connected Water Heating System

Authors: Rohit Tripathi, Sumit Tiwari, G. N. Tiwari

Abstract:

In present study, an approach is adopted where photovoltaic thermal flat plate collector is integrated with compound parabolic concentrator. Analytical expression of temperature dependent electrical efficiency of N number of partially covered Photovoltaic Thermal (PVT) - Compound Parabolic Concentrator (CPC) water collector connected in series has been derived with the help of basic thermal energy balance equations. Analysis has been carried for winter weather condition at Delhi location, India. Energy and exergy performance of N - partially covered Photovoltaic Thermal (PVT) - Compound Parabolic Concentrator (CPC) Water collector system has been compared for two cases: (i) 25% area of water collector covered by PV module, (ii) 75% area of water collector covered by PV module. It is observed that case (i) has been best suited for thermal performance and case (ii) for electrical energy as well as overall exergy.

Keywords: compound parabolic concentrator, energy, photovoltaic thermal, temperature dependent electrical efficiency

Procedia PDF Downloads 389
2270 The Influence of Social Media to Trends Design at Restaurant in Urban Area of Yogyakarta Province, Indonesia

Authors: Suparwoko, M. Hardyan Prastyanto, Aisah Azhari Marwangi

Abstract:

Today, we face with some paradoxical tendencies. In the field of culture, on the one hand, we are witnessing the emergence of ethnic and religious fervor that is becoming stronger, but on the other hand, we are also witnessing a new ideology that characterized the flow of transnationalism, globalism, and secularism. Through social media, the globalization movement is accommodated to spread all over the world. Globalization also requires the commercialization of many fields, including architecture. In the architecture of commercial buildings, the appeal of the building is an important aspect for the function of the building. That theory is the basis for research of this study. This study aimed to know the influence of social media on the changing trends in the design of restaurant in urban areas of Yogyakarta Province. This study is using observation (survey) method to restaurants in Yogyakarta and surrounding areas to collect data, then the assessment of data by using the theory of the social media Path and Instagram that provide trend information from interior and building facades of the restaurant. By using social media Path and Instagram based survey methods, it can be seen that the intensity of social media users who publish or promote restaurant that has been chosen. Generally, conventional character of the restaurant have changed into a material and visually conceptual restaurant.

Keywords: influence, social media, changes, architecture trend

Procedia PDF Downloads 299
2269 Variable Shunt Reactors for Reactive Power Compensation of HV Subsea Cables

Authors: Saeed A. AlGhamdi, Nabil Habli, Vinoj Somasanran

Abstract:

This paper presents an application of 230 kV Variable Shunt Reactors (VSR) used to compensate reactive power of dual 90 KM subsea cables. VSR integrates an on-load tap changer (OLTC) that adjusts reactive power compensation to maintain acceptable bus voltages under variable load profile and network configuration. An automatic voltage regulator (AVR) or a power management system (PMS) that allows VSR rating to be changed in discrete steps typically controls the OLTC. Typical regulation range start as minimum as 20% up to 100% and are available for systems up to 550kV. The regulation speed is normally in the order of seconds per step and approximately a minute from maximum to minimum rating. VSR can be bus or line connected depending on line/cable length and compensation requirements. The flexible reactive compensation ranges achieved by recent VSR technologies have enabled newer facilities design to deploy line connected VSR through either disconnect switches, which saves space and cost, or through circuit breakers. Lines with VSR are typically energized with lower taps (reduced reactive compensation) to minimize or remove the presence of delayed zero crossing.

Keywords: power management, reactive power, subsea cables, variable shunt reactors

Procedia PDF Downloads 221
2268 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics

Procedia PDF Downloads 399
2267 A Method to Compute Efficient 3D Helicopters Flight Trajectories Based On a Motion Polymorph-Primitives Algorithm

Authors: Konstanca Nikolajevic, Nicolas Belanger, David Duvivier, Rabie Ben Atitallah, Abdelhakim Artiba

Abstract:

Finding the optimal 3D path of an aerial vehicle under flight mechanics constraints is a major challenge, especially when the algorithm has to produce real-time results in flight. Kinematics models and Pythagorian Hodograph curves have been widely used in mobile robotics to solve this problematic. The level of difficulty is mainly driven by the number of constraints to be saturated at the same time while minimizing the total length of the path. In this paper, we suggest a pragmatic algorithm capable of saturating at the same time most of dimensioning helicopter 3D trajectories’ constraints like: curvature, curvature derivative, torsion, torsion derivative, climb angle, climb angle derivative, positions. The trajectories generation algorithm is able to generate versatile complex 3D motion primitives feasible by a helicopter with parameterization of the curvature and the climb angle. An upper ”motion primitives’ concatenation” algorithm is presented based. In this article we introduce a new way of designing three-dimensional trajectories based on what we call the ”Dubins gliding symmetry conjecture”. This extremely performing algorithm will be soon integrated to a real-time decisional system dealing with inflight safety issues.

Keywords: robotics, aerial robots, motion primitives, helicopter

Procedia PDF Downloads 597
2266 Resveratrol Incorporated Liposomes Prepared from Pegylated Phospholipids and Cholesterol

Authors: Mont Kumpugdee-Vollrath, Khaled Abdallah

Abstract:

Liposomes and pegylated liposomes were widely used as drug delivery system in pharmaceutical field since a long time. However, in the former time, polyethylene glycol (PEG) was connected into phospholipid after the liposomes were already prepared. In this paper, we intend to study the possibility of applying phospholipids which already connected with PEG and then they were used to prepare liposomes. The model drug resveratrol was used because it can be applied against different diseases. Cholesterol was applied to stabilize the membrane of liposomes. The thin film technique in a laboratory scale was a preparation method. The liposomes were then characterized by nanoparticle tracking analysis (NTA), photon correlation spectroscopy (PCS) and light microscopic techniques. The stable liposomes can be produced and the particle sizes after filtration were in nanometers. The 2- and 3-chains-PEG-phospholipid (PL) caused in smaller particle size than the 4-chains-PEG-PL. Liposomes from PL 90G and cholesterol were stable during storage at 8 °C of 56 days because the particle sizes measured by PCS were almost not changed. There was almost no leakage of resveratrol from liposomes PL 90G with cholesterol after diffusion test in dialysis tube for 28 days. All liposomes showed the sustained release during measuring time of 270 min. The maximum release amount of 16-20% was detected with liposomes from 2- and 3-chains-PEG-PL. The other liposomes gave max. release amount of resveratrol only of 10%. The release kinetic can be explained by Korsmeyer-Peppas equation. 

Keywords: liposome, NTA, resveratrol, pegylation, cholesterol

Procedia PDF Downloads 163