Search results for: incident analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27283

Search results for: incident analysis

26953 Saudi Twitter Corpus for Sentiment Analysis

Authors: Adel Assiri, Ahmed Emam, Hmood Al-Dossari

Abstract:

Sentiment analysis (SA) has received growing attention in Arabic language research. However, few studies have yet to directly apply SA to Arabic due to lack of a publicly available dataset for this language. This paper partially bridges this gap due to its focus on one of the Arabic dialects which is the Saudi dialect. This paper presents annotated data set of 4700 for Saudi dialect sentiment analysis with (K= 0.807). Our next work is to extend this corpus and creation a large-scale lexicon for Saudi dialect from the corpus.

Keywords: Arabic, sentiment analysis, Twitter, annotation

Procedia PDF Downloads 602
26952 Reference Management Software: Comparative Analysis of RefWorks and Zotero

Authors: Sujit K. Basak

Abstract:

This paper presents a comparison of reference management software between RefWorks and Zotero. The results were drawn by comparing two software and the novelty of this paper is the comparative analysis of software and it has shown that ReftWorks can import more information from the Google Scholar for the researchers. This finding could help to know researchers to use the reference management software.

Keywords: analysis, comparative analysis, reference management software, researchers

Procedia PDF Downloads 522
26951 Fire and Explosion Consequence Modeling Using Fire Dynamic Simulator: A Case Study

Authors: Iftekhar Hassan, Sayedil Morsalin, Easir A Khan

Abstract:

Accidents involving fire occur frequently in recent times and their causes showing a great deal of variety which require intervention methods and risk assessment strategies are unique in each case. On September 4, 2020, a fire and explosion occurred in a confined space caused by a methane gas leak from an underground pipeline in Baitus Salat Jame mosque during Night (Esha) prayer in Narayanganj District, Bangladesh that killed 34 people. In this research, this incident is simulated using Fire Dynamics Simulator (FDS) software to analyze and understand the nature of the accident and associated consequences. FDS is an advanced computational fluid dynamics (CFD) system of fire-driven fluid flow which solves numerically a large eddy simulation form of the Navier–Stokes’s equations for simulation of the fire and smoke spread and prediction of thermal radiation, toxic substances concentrations and other relevant parameters of fire. This study focuses on understanding the nature of the fire and consequence evaluation due to thermal radiation caused by vapor cloud explosion. An evacuation modeling was constructed to visualize the effect of evacuation time and fractional effective dose (FED) for different types of agents. The results were presented by 3D animation, sliced pictures and graphical representation to understand fire hazards caused by thermal radiation or smoke due to vapor cloud explosion. This study will help to design and develop appropriate respond strategy for preventing similar accidents.

Keywords: consequence modeling, fire and explosion, fire dynamics simulation (FDS), thermal radiation

Procedia PDF Downloads 204
26950 Reliability Analysis of Dam under Quicksand Condition

Authors: Manthan Patel, Vinit Ahlawat, Anshh Singh Claire, Pijush Samui

Abstract:

This paper focuses on the analysis of quicksand condition for a dam foundation. The quicksand condition occurs in cohesion less soil when effective stress of soil becomes zero. In a dam, the saturated sediment may appear quite solid until a sudden change in pressure or shock initiates liquefaction. This causes the sand to form a suspension and lose strength hence resulting in failure of dam. A soil profile shows different properties at different points and the values obtained are uncertain thus reliability analysis is performed. The reliability is defined as probability of safety of a system in a given environment and loading condition and it is assessed as Reliability Index. The reliability analysis of dams under quicksand condition is carried by Gaussian Process Regression (GPR). Reliability index and factor of safety relating to liquefaction of soil is analysed using GPR. The results of reliability analysis by GPR is compared to that of conventional method and it is demonstrated that on applying GPR the probabilistic analysis reduces the computational time and efforts.

Keywords: factor of safety, GPR, reliability index, quicksand

Procedia PDF Downloads 462
26949 Poverty Eradication Program in Malaysia

Authors: Ibrahim Mamat, Wan Mohd Zaifurin Wan Nawang

Abstract:

Malaysia's poverty eradication program is a long-term plan that was initially implemented by the government after the riots of the races on May 13, 1969. The incident broke out due to the huge economic gap between the majority of Malaysians,Malays and non-Malays minorities. As a result of the event, the government drafted the New Economic Policy(NEP) in 1970 to reduce the differences in economic status among races in Malaysia. At the end of this policy period (NEP) in 1990, the incidence of poverty in Malaysia was around 6.5 per cent. The incidence of poverty in Malaysia continued to decline to 0.6 per cent (2014) through some other policy after the NEP. The decline in poverty has been the result of the government's efforts to implement the New Economic Policy (1970-1990), National Development Policy (1991-2000), NationalVision Policy (2001-2010), and National Transformation Policy (2011-2020).This article also explains the meaning, concepts and measurements of poverty in order to identify the Poverty Level and measure the Poverty Index using various dimensions. This explanation is very important for a country like Malaysia who has some people living below the poverty line. In such a context, an effective poverty eradication policy can benefit the poor.Consequently, this article examines the continuing involvement of the government and non-governmental organizations through the empowerment program of the hardcore poor to change their lifestyle and culture as well as the vicious circle of poverty is indispensable to ensure that poverty eradication programs are in line with current economic and social changes. In addition, the involvement of non-governmental organizations and the State Islamic Religious Council to provide assistance to the poor is appropriate as the institution has its own distinctive interpretation of poverty to determine the type of assistance, criteria and so on to enable the rights of the poor to be ensured and protected.

Keywords: economic policy, poor, poverty eradication, poverty program

Procedia PDF Downloads 206
26948 Victim Witnesses of Human Trafficking: A Phenomenological Study

Authors: Jireh Reinor L. Vitto, Mylene S. Gumarao, Levy M. Fajanilan, Sheryll Ann M. Castillo, Leonardo B. Dorado, Miriam P. Narbarte

Abstract:

Human trafficking may happen to anyone. The study aimed to explore the experiences of victim witnesses of human trafficking. It utilized a qualitative phenomenological study design. Eighteen women, 15 to 46 years old, had experienced human trafficking (sex or labor trafficking), and with a filed case or not. An in-depth semi-structured, open-ended interview was employed to gather information. Guardians were also interviewed for triangulation purposes. Findings showed that the participants experienced fatigue and abuse for their physical aspect and gained negative feelings such as burdened, sad, scared (fear), stress, anger, trauma, depress and suicidal thoughts for their psychological aspect. For the spiritual aspect, the participants concluded to have enhanced spiritual life where they knew about God, became closer to God, and learned how to pray. They also faced challenges such as dysfunctional family, delinquent friends, exploitation, problems kept from the family, and poverty, which resulted in their becoming victims of human trafficking. To cope with the situation, they utilized family support, prayers, guts or courage (lakas ng loob), negotiation with their employer, and support from kababayans. Their practices and mechanisms to recover were the Blas Ople Center, rescue/entrapment operation, shelter, and embassy. After the incident, the participants shared that they earned to have thoughts of having a good life without going abroad/makabayan, knowledge of overseas Filipino workers, wise choice of friends, contentment, and value for the family.

Keywords: victim-witnesses, human trafficking, lived experiences, challenges, coping strategies

Procedia PDF Downloads 108
26947 Investigating Complement Clause Choice in Written Educated Nigerian English (ENE)

Authors: Juliet Udoudom

Abstract:

Inappropriate complement selection constitutes one of the major features of non-standard complementation in the Nigerian users of English output of sentence construction. This paper investigates complement clause choice in Written Educated Nigerian English (ENE) and offers some results. It aims at determining preferred and dispreferred patterns of complement clause selection in respect of verb heads in English by selected Nigerian users of English. The complementation data analyzed in this investigation were obtained from experimental tasks designed to elicit complement categories of Verb – Noun -, Adjective – and Prepositional – heads in English. Insights from the Government – Binding relations were employed in analyzing data, which comprised responses obtained from one hundred subjects to a picture elicitation exercise, a grammaticality judgement test, and a free composition task. The findings indicate a general tendency for clausal complements (CPs) introduced by the complementizer that to be preferred by the subjects studied. Of the 235 tokens of clausal complements which occurred in our corpus, 128 of them representing 54.46% were CPs headed by that, while whether – and if-clauses recorded 31.07% and 8.94%, respectively. The complement clause-type which recorded the lowest incidence of choice was the CP headed by the Complementiser, for with a 5.53% incident of occurrence. Further findings from the study indicate that semantic features of relevant embedding verb heads were not taken into consideration in the choice of complementisers which introduce the respective complement clauses, hence the that-clause was chosen to complement verbs like prefer. In addition, the dispreferred choice of the for-clause is explicable in terms of the fact that the respondents studied regard ‘for’ as a preposition, and not a complementiser.

Keywords: complement, complement clause complement selection, complementisers, government-binding

Procedia PDF Downloads 168
26946 Technical Non-Destructive Evaluation of Burnt Bridge at CH. 57+450 Along Abuja-Abaji-Lokoja Road, Nigeria

Authors: Abraham O. Olaniyi, Oluyemi Oke, Atilade Otunla

Abstract:

The structural performance of bridges decreases progressively throughout their service life due to many contributing factors (fatigue, carbonation, fire incidents etc.). Around the world, numerous bridges have attained their estimated service life and many have approached this limit. The structural integrity assessment of the burnt composite bridge located at CH57+450, Koita village along Abuja-Abaji-Lokoja road, Nigeria, is presented as a case study and shall be forthwith referred to as the 'Koita bridge' in this paper. From the technical evaluation, the residual compressive strength of the concrete piers was found to be below 16.0 N/mm2. This value is very low compared to the expected design value of 30.0 N/mm2. The pier capping beam at pier location 1 has a very low residual compressive strength. The cover to the reinforcement of certain capping beams has an outline of reinforcement which signifies poor concrete cover and the mean compressive strength is also less than 20.0 N/mm2. The steel girder indicated black colouration as a result of the fire incident without any significant structural defect like buckling or warping of the steel section. This paper reviews the structural integrity assessment and repair methodology of the Koita bridge; a composite bridge damaged by fire, highlighting the various challenges of limited obtainable guidance documents about the bridge. The objectives are to increase the understanding of processes and versatile equipment required to test and assess a fire-damaged bridge in order to improve the quality of structural appraisal and rehabilitation; thus, eliminating the prejudice associated with current visual inspection techniques.

Keywords: assessment, bridge, rehabilitation, sustainability

Procedia PDF Downloads 345
26945 The Use of AI to Measure Gross National Happiness

Authors: Riona Dighe

Abstract:

This research attempts to identify an alternative approach to the measurement of Gross National Happiness (GNH). It uses artificial intelligence (AI), incorporating natural language processing (NLP) and sentiment analysis to measure GNH. We use ‘off the shelf’ NLP models responsible for the sentiment analysis of a sentence as a building block for this research. We constructed an algorithm using NLP models to derive a sentiment analysis score against sentences. This was then tested against a sample of 20 respondents to derive a sentiment analysis score. The scores generated resembled human responses. By utilising the MLP classifier, decision tree, linear model, and K-nearest neighbors, we were able to obtain a test accuracy of 89.97%, 54.63%, 52.13%, and 47.9%, respectively. This gave us the confidence to use the NLP models against sentences in websites to measure the GNH of a country.

Keywords: artificial intelligence, NLP, sentiment analysis, gross national happiness

Procedia PDF Downloads 82
26944 Development of Alpha Spectroscopy Method with Solid State Nuclear Track Detector Using Aluminium Thin Films

Authors: Nidal Dwaikat

Abstract:

This work presents the development of alpha spectroscopy method with Solid-state nuclear track detectors using aluminum thin films. The resolution of this method is high, and it is able to discriminate between alpha particles at different incident energy. It can measure the exact number of alpha particles at specific energy without needing a calibration of alpha track diameter versus alpha energy. This method was tested by using Cf-252 alpha standard source at energies 5.11 Mev, 3.86 MeV and 2.7 MeV, which produced by the variation of detector -standard source distance. On front side, two detectors were covered with two Aluminum thin films and the third detector was kept uncovered. The thickness of Aluminum thin films was selected carefully (using SRIM 2013) such that one of the films will block the lower two alpha particles (3.86 MeV and 2.7 MeV) and the alpha particles at higher energy (5.11 Mev) can penetrate the film and reach the detector’s surface. The second thin film will block alpha particles at lower energy of 2.7 MeV and allow alpha particles at higher two energies (5.11 Mev and 3.86 MeV) to penetrate and produce tracks. For uncovered detector, alpha particles at three different energies can produce tracks on it. For quality assurance and accuracy, the detectors were mounted on thick enough copper substrates to block exposure from the backside. The tracks on the first detector are due to alpha particles at energy of 5.11 MeV. The difference between the tracks number on the first detector and the tracks number on the second detector is due to alpha particles at energy of 3.8 MeV. Finally, by subtracting the tracks number on the second detector from the tracks number on the third detector (uncovered), we can find the tracks number due to alpha particles at energy 2.7 MeV. After knowing the efficiency calibration factor, we can exactly calculate the activity of standard source.

Keywords: aluminium thin film, alpha particles, copper substrate, CR-39 detector

Procedia PDF Downloads 343
26943 What the Future Holds for Social Media Data Analysis

Authors: P. Wlodarczak, J. Soar, M. Ally

Abstract:

The dramatic rise in the use of Social Media (SM) platforms such as Facebook and Twitter provide access to an unprecedented amount of user data. Users may post reviews on products and services they bought, write about their interests, share ideas or give their opinions and views on political issues. There is a growing interest in the analysis of SM data from organisations for detecting new trends, obtaining user opinions on their products and services or finding out about their online reputations. A recent research trend in SM analysis is making predictions based on sentiment analysis of SM. Often indicators of historic SM data are represented as time series and correlated with a variety of real world phenomena like the outcome of elections, the development of financial indicators, box office revenue and disease outbreaks. This paper examines the current state of research in the area of SM mining and predictive analysis and gives an overview of the analysis methods using opinion mining and machine learning techniques.

Keywords: social media, text mining, knowledge discovery, predictive analysis, machine learning

Procedia PDF Downloads 408
26942 A Social Cognitive Investigation in the Context of Vocational Training Performance of People with Disabilities

Authors: Majid A. AlSayari

Abstract:

The study reported here investigated social cognitive theory (SCT) in the context of Vocational Rehab (VR) for people with disabilities. The prime purpose was to increase knowledge of VR phenomena and make recommendations for improving VR services. The sample consisted of 242 persons with Spinal Cord Injuries (SCI) who completed questionnaires. A further 32 participants were Trainers. Analysis of questionnaire data was carried out using factor analysis, multiple regression analysis, and thematic analysis. The analysis suggested that, in motivational terms, and consistent with research carried out in other academic contexts, self-efficacy was the best predictor of VR performance. The author concludes that that VR self-efficacy predicted VR training performance.

Keywords: people with physical disabilities, social cognitive theory, self-efficacy, vocational training

Procedia PDF Downloads 285
26941 Accelerating Side Channel Analysis with Distributed and Parallelized Processing

Authors: Kyunghee Oh, Dooho Choi

Abstract:

Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.

Keywords: DPA, distributed computing, parallelized processing, side channel analysis

Procedia PDF Downloads 401
26940 Performance of the Photovoltaic Module under Different Shading Patterns

Authors: E. T. El Shenawy, O. N. A. Esmail, Adel A. Elbaset, Hesham F. A. Hamed

Abstract:

Generation of the electrical energy based on photovoltaic (PV) technology has been increased over the world due to either the continuous reduction in the traditional energy sources in addition to the pollution problems related to their usage, or the clean nature and safe usage of the PV technology. Also, PV systems can generate clean electricity in the site of use without any transmission, which can be considered cost effective than other generation systems. The performance of the PV system is highly affected by the amount of solar radiation incident on it. Completely or partially shaded PV systems can affect its output. The PV system can be shaded by trees, buildings, dust, incorrect system configuration, or other obstacles. The present paper studies the effect of the partial shading on the performance of a thin film PV module under climatic conditions of Cairo, Egypt. This effect was measured and evaluated according to practical measurement of the characteristic curves such as current-voltage and power-voltage for two identical PV modules (with and without shading) placed at the same time on one mechanical structure for comparison. The measurements have been carried out for the following shading patterns; half cell (bottom, middle, and top of the PV module); complete cell; and two adjacent cells. The results showed that partially shading the PV module changes the shapes of the I-V and P-V curves and produces more than one maximum power point, that can disturb the traditional maximum power point trackers. Also, the output power from the module decreased according to the incomplete solar radiation reaching the PV module due to shadow patterns. The power loss due shading was 7%, 22%, and 41% for shading of half-cell, one cell, and two adjacent cells of the PV module, respectively.

Keywords: I-V measurements, PV module characteristics, PV module power loss, PV module shading

Procedia PDF Downloads 114
26939 The Application of Data Mining Technology in Building Energy Consumption Data Analysis

Authors: Liang Zhao, Jili Zhang, Chongquan Zhong

Abstract:

Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.

Keywords: data mining, data analysis, prediction, optimization, building operational performance

Procedia PDF Downloads 831
26938 The Dark Side of Tourism's Implications: A Structural Equation Modeling Study of the 2016 Earthquake in Central Italy

Authors: B. Kulaga, A. Cinti, F. J. Mazzocchini

Abstract:

Despite the fact that growing academic attention on dark tourism is a fairly recent phenomenon, among the various reasons for travelling death-related ones, are very ancient. Furthermore, the darker side of human nature has always been fascinated and curious regarding death, or at least, man has always tried to learn lessons from death. This study proposes to describe the phenomenon of dark tourism related to the 2016 earthquake in Central Italy, deadly for 302 people and highly destructive for the rural areas of Lazio, Marche, and Umbria Regions. The primary objective is to examine the motivation-experience relationship in a dark tourism site, using the structural equation model, applied for the first time to a dark tourism research in 2016, in a study conducted after the Beichuan earthquake. The findings of the current study are derived from the calculations conducted on primary data compiled from 350 tourists in the areas mostly affected by the 2016 earthquake, including the town of Amatrice, near the epicenter, Castelluccio, Norcia, Ussita and Visso, through conducting a Likert scale survey. Furthermore, we use the structural equation model to examine the motivation behind dark travel and how this experience can influence the motivation and emotional reaction of tourists. Expected findings are in line with the previous study mentioned above, indicating that: not all tourists visit the thanatourism sites for dark tourism purpose, tourists’ emotional reactions influence more heavily the emotional tourist experience than cognitive experiences do, and curious visitors are likely to engage cognitively by learning about the incident or related issues.

Keywords: dark tourism, emotional reaction, experience, motivation, structural equation model

Procedia PDF Downloads 123
26937 An Abductive Approach to Policy Analysis: Policy Analysis as Informed Guessing

Authors: Adrian W. Chew

Abstract:

This paper argues that education policy analysis tends to be steered towards empiricist oriented approaches, which place emphasis on objective and measurable data. However, this paper argues that empiricist oriented approaches are generally based on inductive and/or deductive reasoning, which are unable to generate new ideas/knowledge. This paper will outline the logical structure of induction, deduction, and abduction, and argues that only abduction provides possibilities for the creation of new ideas/knowledge. This paper proposes the neologism of ‘informed guessing’ as a reformulation of abduction, and also as an approach to education policy analysis. On one side, the signifier ‘informed’ encapsulates the idea that abductive policy analysis needs to be informed by descriptive conceptualization theory to be able to make relations and connections between, and within, observed phenomenon and unobservable general structures. On the other side, the signifier ‘guessing’ captures the cyclical and unsystematic process of abduction. This paper will end with a brief example of utilising ‘informed guessing’ for a policy analysis of school choice lotteries in the United States.

Keywords: abductive reasoning, empiricism, informed guessing, policy analysis

Procedia PDF Downloads 329
26936 Validation of a Reloading Vehicle Design by Finite Element Analysis

Authors: Tuğrul Aksoy, Hüseyin Karabıyık

Abstract:

Reloading vehicles are the vehicles which are generally equipped with a crane and used to carry a stowage from a point and locate onto the vehicle or vice versa. In this study, structural analysis of a reloading vehicle was performed under the loads which are predicted to be exposed under operating conditions via the finite element method. Among the finite element analysis results, the stress and displacement distributions of the vehicle and the contact pressure distributions of the guide rings within the stabilization legs were examined. Vehicle design was improved by strengthening certain parts according to the analysis results. The analyses performed for the final design were verified by the experiments involving strain gauge measurements.

Keywords: structural analysis, reloading vehicle, crane, strain gauge

Procedia PDF Downloads 45
26935 Exergy Analysis and Evaluation of the Different Flowsheeting Configurations for CO₂ Capture Plant Using 2-Amino-2-Methyl-1-Propanol

Authors: Ebuwa Osagie, Vasilije Manovic

Abstract:

Exergy analysis provides the identification of the location, sources of thermodynamic inefficiencies, and magnitude in a thermal system. Thus, both the qualitative and quantitative assessment can be evaluated with exergy, unlike energy which is based on quantitative assessment only. The main purpose of exergy analysis is to identify where exergy is destroyed. Thus, reduction of the exergy destruction and losses associated with the capture plant systems can improve work potential. Furthermore, thermodynamic analysis of different configurations of the process helps to identify opportunities for reducing the steam requirements for each of the configurations. This paper presents steady-state simulation and exergy analysis of the 2-amino-2-methyl-1-propanol (AMP)-based post-combustion capture (PCC) plant. Exergy analysis performed for the AMP-based plant and the different configurations revealed that the rich split with intercooling configuration gave the highest exergy efficiency of 73.6%, while that of the intercooling and the reference AMP-based plant were 57.3% and 55.8% respectively.

Keywords: 2-amino-2-methyl-1-propanol, modelling, and simulation, post-combustion capture plant, exergy analysis, flowsheeting configurations

Procedia PDF Downloads 144
26934 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 511
26933 Analysis of CO₂ Capture Products from Carbon Capture and Utilization Plant

Authors: Bongjae Lee, Beom Goo Hwang, Hye Mi Park

Abstract:

CO₂ capture products manufactured through Carbon Capture and Utilization (CCU) Plant that collect CO₂ directly from power plants require accurate measurements of the amount of CO₂ captured. For this purpose, two tests were carried out on the weight loss test. And one was analyzed using a carbon dioxide quantification device. First, the ignition loss analysis was performed by measuring the weight of the sample at 550°C after the first conversation and then confirming the loss when ignited at 950°C. Second, in the thermogravimetric analysis, the sample was divided into two sections of 40 to 500°C and 500 to 800°C to confirm the reduction. The results of thermal weight loss analysis and thermogravimetric analysis were confirmed to be almost similar. However, the temperature of the ignition loss analysis method was 950°C, which was 150°C higher than that of the thermogravimetric method at a temperature of 800°C, so that the difference in the amount of weight loss was 3 to 4% higher by the heat loss analysis method. In addition, the tendency that the CO₂ content increases as the reaction time become longer is similarly confirmed. Third, the results of the wet titration method through the carbon dioxide quantification device were found to be significantly lower than the weight loss method. Therefore, based on the results obtained through the above three analysis methods, we will establish a method to analyze the accurate amount of CO₂. Acknowledgements: This work was supported by the Korea Institute of Energy Technology Evaluation and planning (No. 20152010201850).

Keywords: carbon capture and utilization, CCU, CO2, CO2 capture products, analysis method

Procedia PDF Downloads 194
26932 A Comparative Analysis of Zotero and Mendeley Reference Management Software

Authors: Sujit K. Basak

Abstract:

This paper presents a comparison of the reference management software between Zotero and Mendeley and the results were drawn by comparing the two software’s. The novelty of this paper is the comparative analysis of the software and it has shown that Mendeley can import more information from the Google Scholar for the researchers. This finding can help to know researchers to use the reference management software.

Keywords: analysis, comparative analysis, zotero, researchers, Mendeley

Procedia PDF Downloads 591
26931 Investigation of Detectability of Orbital Objects/Debris in Geostationary Earth Orbit by Microwave Kinetic Inductance Detectors

Authors: Saeed Vahedikamal, Ian Hepburn

Abstract:

Microwave Kinetic Inductance Detectors (MKIDs) are considered as one of the most promising photon detectors of the future in many Astronomical applications such as exoplanet detections. The MKID advantages stem from their single photon sensitivity (ranging from UV to optical and near infrared), photon energy resolution and high temporal capability (~microseconds). There has been substantial progress in the development of these detectors and MKIDs with Megapixel arrays is now possible. The unique capability of recording an incident photon and its energy (or wavelength) while also registering its time of arrival to within a microsecond enables an array of MKIDs to produce a four-dimensional data block of x, y, z and t comprising x, y spatial, z axis per pixel spectral and t axis per pixel which is temporal. This offers the possibility that the spectrum and brightness variation for any detected piece of space debris as a function of time might offer a unique identifier or fingerprint. Such a fingerprint signal from any object identified in multiple detections by different observers has the potential to determine the orbital features of the object and be used for their tracking. Modelling performed so far shows that with a 20 cm telescope located at an Astronomical observatory (e.g. La Palma, Canary Islands) we could detect sub cm objects at GEO. By considering a Lambertian sphere with a 10 % reflectivity (albedo of the Moon) we anticipate the following for a GEO object: 10 cm object imaged in a 1 second image capture; 1.2 cm object for a 70 second image integration or 0.65 cm object for a 4 minute image integration. We present details of our modelling and the potential instrument for a dedicated GEO surveillance system.

Keywords: space debris, orbital debris, detection system, observation, microwave kinetic inductance detectors, MKID

Procedia PDF Downloads 73
26930 Conflicts Identification Approach among Stakeholders in Goal-Oriented Requirements Analysis

Authors: Muhammad Suhaib

Abstract:

Requirements Analysis are the most important part of software Engineering for both system application development, and project requirements. Conflicts often arise during the requirements gathering and analysis phase. This research aims to identify conflicts during the requirements gathering phase in software development life cycle, Research, Development, and Technology converted the world into a global village. During requirements elicitation/gathering phase it’s very difficult to understand the main objective of stakeholders, after completion of requirements elicitation task final results are used for Software Requirements Specification (SRS), SRS is the highly important outcome of the requirements analysis phase. this is the foundation between the developers and stakeholders or customers, proposed methodology will be helpful to identify those conflicts in a very easy manner during the initial phase of the project.

Keywords: goal oriented requirements analysis, conflicts identification model, requirements analysis, requirements engineering

Procedia PDF Downloads 116
26929 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 149
26928 The SBO/LOCA Analysis of TRACE/SNAP for Kuosheng Nuclear Power Plant

Authors: J. R. Wang, H. T. Lin, Y. Chiang, H. C. Chen, C. Shih

Abstract:

Kuosheng Nuclear Power Plant (NPP) is located on the northern coast of Taiwan. Its nuclear steam supply system is a type of BWR/6 designed and built by General Electric on a twin unit concept. First, the methodology of Kuosheng NPP SPU (Stretch Power Uprate) safety analysis TRACE/SNAP model was developed in this research. Then, in order to estimate the safety of Kuosheng NPP under the more severe condition, the SBO (Station Blackout) + LOCA (Loss-of-Coolant Accident) transient analysis of Kuosheng NPP SPU TRACE/SNAP model was performed. Besides, the animation model of Kuosheng NPP was presented using the animation function of SNAP with TRACE/SNAP analysis results.

Keywords: TRACE, safety analysis, BWR/6, severe accident

Procedia PDF Downloads 686
26927 Deformulation and Comparative Analysis of Apparently Similar Polymers Using Multiple Modes of Pyrolysis-Gc/Ms

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in deformulation, comparative analysis as well as reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro-furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. This presentation demonstrates the study of two similar polymers by performing different mode of operations in the same system: Evolve gas analysis (EGA), Flash pyrolysis, Thermal desorption analysis, and Heart-cutting analysis. Unknown polymer materials and their chemical compositions are identified.

Keywords: gas chromatography/mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 237
26926 Finite Element Analysis of Rom Silo Subjected to 5000 Tons Monotic Loads at an Anonymous Mine in Zimbabwe

Authors: T. Mushiri, K. Tengende, C. Mbohwa, T. Garikayi

Abstract:

This paper introduces finite element analysis of Run off Mine (ROM) silo subjected to dynamic loading. The proposed procedure is based on the use of theoretical equations to come up with pressure and forces exerted by Platinum Group Metals (PGMs) ore to the silo wall. Finite Element Analysis of the silo involves the use of CAD software (AutoCAD) for3D creation and CAE software (T-FLEX) for the simulation work with an optimization routine to minimize the mass and also ensure structural stiffness and stability. In this research an efficient way to design and analysis of a silo in 3D T-FLEX (CAD) program was created the silo to stay within the constrains and so as to know the points of failure due dynamic loading.

Keywords: reinforced concrete silo, finite element analysis, T-FLEX software, AutoCAD

Procedia PDF Downloads 456
26925 Componential Analysis on Defining Sustainable Furniture in Traditional Malay Houses of Melaka

Authors: Nabilah Zainal Abidin, Fawazul Khair Ibrahim, Raja Nafida Raja Shahminan

Abstract:

This paper discusses on how componential analysis is used in architecture, mainly in determining the absence and presence of furniture in Traditional Malay Houses. The house samples were retrieved from the reports archived by the Centre of Built Environment in the Malay World (KALAM) of Universiti Teknologi Malaysia (UTM). Findings from the analysis indicate that furniture available in the spaces of the houses is determined by the culture of the people and the availability of certain furniture is influenced by the activities that are carried out within the space.

Keywords: componential analysis, sustainable furniture, traditional malay house

Procedia PDF Downloads 569
26924 The Richtmyer-Meshkov Instability Impacted by the Interface with Different Components Distribution

Authors: Sheng-Bo Zhang, Huan-Hao Zhang, Zhi-Hua Chen, Chun Zheng

Abstract:

In this paper, the Richtmyer-Meshkov instability has been studied numerically by using the high-resolution Roe scheme based on the two-dimensional unsteady Euler equation, which was caused by the interaction between shock wave and the helium circular light gas cylinder with different component distributions. The numerical results further discuss the deformation process of the gas cylinder, the wave structure of the flow field and quantitatively analyze the characteristic dimensions (length, height, and central axial width) of the gas cylinder, the volume compression ratio of the cylinder over time. In addition, the flow mechanism of shock-driven interface gas mixing is analyzed from multiple perspectives by combining it with the flow field pressure, velocity, circulation, and gas mixing rate. Then the effects of different initial component distribution conditions on interface instability are investigated. The results show when the diffusion interface transit to the sharp interface, the reflection coefficient gradually increases on both sides of the interface. When the incident shock wave interacts with the cylinder, the transmission of the shock wave will transit from conventional transmission to unconventional transmission. At the same time, the reflected shock wave is gradually strengthened, and the transmitted shock wave is gradually weakened, which leads to an increase in the Richtmyer-Meshkov instability. Moreover, the Atwood number on both sides of the interface also increases as the diffusion interface transit to the sharp interface, which leads to an increase in the Rayleigh-Taylor instability and the Kelvin-Helmholtz instability. Therefore, the increase in instability will lead to an increase the circulation, resulting in an increase in the growth rate of gas mixing rate.

Keywords: shock wave, He light cylinder, Richtmyer-Meshkov instability, Gaussian distribution

Procedia PDF Downloads 56