Search results for: activation code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2350

Search results for: activation code

1990 Synthesis and Characterization of Green Coke-Derived Activated Carbon by KOH Activation

Authors: Richard, Iyan Subiyanto, Chairul Hudaya

Abstract:

Activated carbon has been playing a significant role for many applications, especially in energy storage devices. However, commercially activated carbons generally require complicated processes and high production costs. Therefore, in this study, an activated carbon originating from green coke waste, that is economically affordable will be used as a carbon source. To synthesize activated carbon, KOH as an activator was employed with variation of C:KOH in ratio of 1:2, 1:3, 1:4, and 1:5, respectively, with an activation temperature of 700°C. The characterizations of activated carbon are obtained from Scanning Electron Microscopy, Energy Dispersive X-Ray, Raman Spectroscopy, and Brunauer-Emmett-Teller. The optimal activated carbon sample with specific surface area of 2,024 m²/g with high carbon content ( > 80%) supported by the high porosity carbon image obtained by SEM was prepared at C:KOH ratio of 1:4. The result shows that the synthesized activated carbon would be an ideal choice for energy storage device applications. Therefore, this study is expected to reduce the costs of activated carbon production by expanding the utilization of petroleum waste.

Keywords: activated carbon, energy storage material, green coke, specific surface area

Procedia PDF Downloads 162
1989 Calculation of Secondary Neutron Dose Equivalent in Proton Therapy of Thyroid Gland Using FLUKA Code

Authors: M. R. Akbari, M. Sadeghi, R. Faghihi, M. A. Mosleh-Shirazi, A. R. Khorrami-Moghadam

Abstract:

Proton radiotherapy (PRT) is becoming an established treatment modality for cancer. The localized tumors, the same as undifferentiated thyroid tumors are insufficiently handled by conventional radiotherapy, while protons would propose the prospect of increasing the tumor dose without exceeding the tolerance of the surrounding healthy tissues. In spite of relatively high advantages in giving localized radiation dose to the tumor region, in proton therapy, secondary neutron production can have significant contribution on integral dose and lessen advantages of this modality contrast to conventional radiotherapy techniques. Furthermore, neutrons have high quality factor, therefore, even a small physical dose can cause considerable biological effects. Measuring of this neutron dose is a very critical step in prediction of secondary cancer incidence. It has been found that FLUKA Monte Carlo code simulations have been used to evaluate dose due to secondaries in proton therapy. In this study, first, by validating simulated proton beam range in water phantom with CSDA range from NIST for the studied proton energy range (34-54 MeV), a proton therapy in thyroid gland cancer was simulated using FLUKA code. Secondary neutron dose equivalent of some organs and tissues after the target volume caused by 34 and 54 MeV proton interactions were calculated in order to evaluate secondary cancer incidence. A multilayer cylindrical neck phantom considering all the layers of neck tissues and a proton beam impinging normally on the phantom were also simulated. Trachea (accompanied by Larynx) had the greatest dose equivalent (1.24×10-1 and 1.45 pSv per primary 34 and 54 MeV protons, respectively) among the simulated tissues after the target volume in the neck region.

Keywords: FLUKA code, neutron dose equivalent, proton therapy, thyroid gland

Procedia PDF Downloads 421
1988 Patient-Friendly Hand Gesture Recognition Using AI

Authors: K. Prabhu, K. Dinesh, M. Ranjani, M. Suhitha

Abstract:

During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the five gestures will be detected when shown with their hands via the webcam, which is placed for gesture detection. The personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.

Keywords: nodeMCU, AI technology, gesture, patient

Procedia PDF Downloads 159
1987 A Simulation of Land Market through Agent-Based Modeling

Authors: Zilin Zhang

Abstract:

Agent-based simulation has become a popular method of exploring the behavior of all kinds of urban systems. The city clearly is viewed as such a system. Many urban evolution processes, such as the development or the transaction of a piece of land, can be modeled with a set of rules. Such modeling approaches can be used to gain insight into urban-development and land market transactions in the real world. Our work contributes to such type of research by modeling the transactions of lands in a city and its surrounding suburbs. By replicating the demand and supply needs in the land market, we are able to demonstrate the different transaction patterns in three types of residential areas - downtown, city-suburban, and further suburban areas. In addition, we are also able to compare the vital roles of different activation conditions play in generating the various transaction patterns of the land market at the macro level. We use this simulation to loosely test our hypotheses about the nature of activation regimes by the replication of the Zi traders’ model. In the end, we hope our analytical results can be useful for city planners and policymakers to develop rational city plans and policies for shaping sustainable urban development.

Keywords: simulation, agent-based modeling, housing market, city

Procedia PDF Downloads 84
1986 Annona muricata Leaves Induced Mitochondrial-Mediated Apoptosis in A549 Cells

Authors: Soheil Zorofchian Moghadamtousi, Habsah Abdul Kadir, Mohammadjavad Paydar, Elham Rouhollahi, Hamed Karimian

Abstract:

The present study was designed to evaluate the molecular mechanisms of Annona muricata leaves ethyl acetate extract (AMEAE) against lung cancer A549 cells. Cell viability analysis revealed the selective cytotoxic effect of AMEAE towards A549 cells. Treatment of A549 cells with AMEAE significantly elevated the reactive oxygen species formation, followed by attenuation of mitochondrial membrane potential via upregulation of Bax and downregulation of Bcl-2, accompanied by cytochrome c release to the cytosol. The released cytochrome c triggered the activation of caspase-9 followed by caspase-3. In addition, AMEAE-induced apoptosis was accompanied by cell cycle arrest at G1 phase. Our data showed for the first time that AMEAE inhibited the proliferation of A549 cells, leading to cell cycle arrest and programmed cell death through activation of the mitochondrial-mediated signaling pathway.

Keywords: Annona muricata, lung cancer, apoptosis, mitochondria

Procedia PDF Downloads 317
1985 Dynamic Modeling of Orthotropic Cracked Materials by X-FEM

Authors: S. Houcine Habib, B. Elkhalil Hachi, Mohamed Guesmi, Mohamed Haboussi

Abstract:

In this paper, dynamic fracture behaviors of cracked orthotropic structure are modeled using extended finite element method (X-FEM). In this approach, the finite element method model is first created and then enriched by special orthotropic crack tip enrichments and Heaviside functions in the framework of partition of unity. The mixed mode stress intensity factor (SIF) is computed using the interaction integral technique based on J-integral in order to predict cracking behavior of the structure. The developments of these procedures are programmed and introduced in a self-software platform code. To assess the accuracy of the developed code, results obtained by the proposed method are compared with those of literature.

Keywords: X-FEM, composites, stress intensity factor, crack, dynamic orthotropic behavior

Procedia PDF Downloads 565
1984 Immunomodulatory Effects of Multipotent Mesenchymal Stromal Cells on T-Cell Populations at Tissue-Related Oxygen Level

Authors: A. N. Gornostaeva, P. I. Bobyleva, E. R. Andreeva, L. B. Buravkova

Abstract:

Multipotent mesenchymal stromal cells (MSCs) possess immunomodulatory properties. The effect of MSCs on the crucial cellular immunity compartment – T-cells is of a special interest. It is known that MSC tissue niche and expected milieu of their interaction with T- cells are characterized by low oxygen concentration, whereas the in vitro experiments usually are carried out at a much higher ambient oxygen (20%). We firstly evaluated immunomodulatory effects of MSCs on T-cells at tissue-related oxygen (5%) after interaction implied cell-to-cell contacts and paracrine factors only. It turned out that MSCs under reduced oxygen can effectively suppress the activation and proliferation of PHA-stimulated T-cells and can provoke decrease in the production of proinflammatory and increase in anti-inflammatory cytokines. In hypoxia some effects were amplified (inhibition of proliferation, anti-inflammatory cytokine profile shift). This impact was more evident after direct cell-to-cell interaction; lack of intercellular contacts could revoke the potentiating effect of hypoxia.

Keywords: MSCs, T-cells, activation, low oxygen, cell-to-cell interaction, immunosuppression

Procedia PDF Downloads 380
1983 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code

Authors: Deborah Garcia-Magna

Abstract:

The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.

Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting

Procedia PDF Downloads 191
1982 Upcycling of Inorganic Waste: Lessons Learned and Outlook for the Future

Authors: Miroslava Hujová, Patricia Rabello Monich, Jozef Kraxner, Dusan Galusek, Enrico Bernardo

Abstract:

Inorganic waste upcycling offers a solution how to avoid landfilling and how to save raw materials at the same time. However, its practical implementations in Slovakia and elsewhere in Europe, are rather limited despite the potential smaller countries like Slovakia have their advantage in closely-knitted inorganic materials industry. One part of discussion should include an overview of wastes that can be possibly used for upcycling, i.e. fly ashes, red mud, glass cullets, vitrified bottom ashes etc. These wastes can be processed by a variety of strategies, the one of our choice, alkali activation, opens the possibility for the formation of novel materials at almost negligible energetic expense. In the research, these materials are characterized by comprehensive means (X-Ray Fluorescece, Diffraction methods, Thermal Analysis, Scanning Electron Microscopy, Mechanical tests and Chemical stability), which time and time again demonstrate their competitive properties against traditional materials available at the market. It is just a question for discussion why these materials do not receive more significant attention from industry and there is pressing interest for the solution of standing situation.

Keywords: upcycling, inorganic wastes, glass ceramics, alkali-activation

Procedia PDF Downloads 134
1981 Design and Development of Automatic Onion Harvester

Authors: P. Revathi, T. Mrunalini, K. Padma Priya, P. Ramya, R. Saranya

Abstract:

During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the 5 gestures will be detected when shown with their hands via a webcam which is placed for gesture detection. A personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.

Keywords: onion harvesting, automatic pluging, camera, raspberry pi

Procedia PDF Downloads 194
1980 Removal of Heavy Metal Using Continous Mode

Authors: M. Abd elfattah, M. Ossman, Nahla A. Taha

Abstract:

The present work explored the use of Egyptian rice straw, an agricultural waste that leads to global warming problem through brown cloud, as a potential feedstock for the preparation of activated carbon by physical and chemical activation. The results of this study showed that it is feasible to prepare activated carbons with relatively high surface areas and pore volumes from the Egyptian rice straw by direct chemical and physical activation. The produced activated carbon from the two methods (AC1 and AC2) could be used as potential adsorbent for the removal of Fe(III) from aqueous solution contains heavy metals and polluted water. The adsorption of Fe(III) was depended on the pH of the solution. The optimal Fe(III) removal efficiency occurs at pH 5. Based on the results, the optimum contact time is 60 minutes and adsorbent dosage is 3 g/L. The adsorption breakthrough curves obtained at different bed depths indicated increase of breakthrough time with increase in bed depths. A rise in inlet Fe(III) concentration reduces the throughput volume before the packed bed gets saturated. AC1 showed higher affinity for Fe(III) as compared to Raw rice husk.

Keywords: rice straw, activated carbon, Fe(III), fixed bed column, pyrolysis

Procedia PDF Downloads 246
1979 AI Ethical Values as Dependent on the Role and Perspective of the Ethical AI Code Founder- A Mapping Review

Authors: Moshe Davidian, Shlomo Mark, Yotam Lurie

Abstract:

With the rapid development of technology and the concomitant growth in the capability of Artificial Intelligence (AI) systems and their power, the ethical challenges involved in these systems are also evolving and increasing. In recent years, various organizations, including governments, international institutions, professional societies, civic organizations, and commercial companies, have been choosing to address these various challenges by publishing ethical codes for AI systems. However, despite the apparent agreement that AI should be “ethical,” there is debate about the definition of “ethical artificial intelligence.” This study investigates the various AI ethical codes and their key ethical values. From the vast collection of codes that exist, it analyzes and compares 25 ethical codes that were found to be representative of different types of organizations. In addition, as part of its literature review, the study overviews data collected in three recent reviews of AI codes. The results of the analyses demonstrate a convergence around seven key ethical values. However, the key finding is that the different AI ethical codes eventually reflect the type of organization that designed the code; i.e., the organizations’ role as regulator, user, or developer affects the view of what ethical AI is. The results show a relationship between the organization’s role and the dominant values in its code. The main contribution of this study is the development of a list of the key values for all AI systems and specific values that need to impact the development and design of AI systems, but also allowing for differences according to the organization for which the system is being developed. This will allow an analysis of AI values in relation to stakeholders.

Keywords: artificial intelligence, ethical codes, principles, values

Procedia PDF Downloads 101
1978 Effect of Fly Ash Fineness on Sorption Properties of Geopolymers Based on Liquid Glass

Authors: Miroslava Zelinkova, Marcela Ondova

Abstract:

Fly ash (FA) thanks to the significant presence of SiO2 and Al2O3 as the main components is a potential raw material for geopolymers production. Mechanical activation is a method for improving FA reactivity and also the porosity of final mixture; those parameters can be analysed through sorption properties. They have direct impact on the durability of fly ash based geopolymer mortars. In the paper, effect of FA fineness on sorption properties of geopolymers based on sodium silicate, as well as relationship between fly ash fineness and apparent density, compressive and flexural strength of geopolymers are presented. The best results in the evaluated area reached the sample H1, which contents the highest portion of particle under 20μm (100% of GFA). The interdependence of individual tested properties was confirmed for geopolymer mixtures corresponding to those in the cement based mixtures: higher is portion of fine particles < 20μm, higher is strength, density and lower are sorption properties. The compressive strength as well as sorption parameters of the geopolymer can be reasonably controlled by grinding process and also ensured by the higher share of fine particle (to 20μm) in total mass of the material.

Keywords: alkali activation, geopolymers, fly ash, particle fineness

Procedia PDF Downloads 217
1977 Determination of Material Constants and Zener-Hollomon Parameter of AA2017 Aluminium Alloy under Hot Compression Test

Authors: C. H. Shashikanth, M. J. Davidson, V. Suresh Babu

Abstract:

The formability of metals depends on a number of variables such as strain, strain rate, and temperature. Though most of the metals are formable at room temperature, few are not. To evaluate the workability of such metals at elevated temperatures, thermomechanical experiments should be carried out to find out the forming temperatures and strain rates. Though a number of constitutive relations are available to correlate the material parameters and the corresponding formability at elevated temperatures, the constitutive rule proposed by Arrhenius has been used in this work. Thus, in the present work, the material constants such as A (constant), α (stress multiplier), β (constant), and n (stress exponent) of AA 2017 has been found by conducting a series of hot compression tests at different temperatures such as 400°C, 450°C, 500°C, and 550°C and at different strain rates such as 0.16, 0.18, and 0.2. True stress (σt), true strains (εt) deformation activation energy (Q), and the Zener-Hollomon parameter (Z value) were also calculated. The results indicate that the value of ln (Z) decreases as the temperature increases and it increases as the strain rate increases.

Keywords: hot compression test, aluminium alloy, flow stress, activation energy

Procedia PDF Downloads 615
1976 Automatic Fluid-Structure Interaction Modeling and Analysis of Butterfly Valve Using Python Script

Authors: N. Guru Prasath, Sangjin Ma, Chang-Wan Kim

Abstract:

A butterfly valve is a quarter turn valve which is used to control the flow of a fluid through a section of pipe. Generally, butterfly valve is used in wide range of applications such as water distribution, sewage, oil and gas plants. In particular, butterfly valve with larger diameter finds its immense applications in hydro power plants to control the fluid flow. In-lieu with the constraints in cost and size to run laboratory setup, analysis of large diameter values will be mostly studied by computational method which is the best and inexpensive solution. For fluid and structural analysis, CFD and FEM software is used to perform large scale valve analyses, respectively. In order to perform above analysis in butterfly valve, the CAD model has to recreate and perform mesh in conventional software’s for various dimensions of valve. Therefore, its limitation is time consuming process. In-order to overcome that issue, python code was created to outcome complete pre-processing setup automatically in Salome software. Applying dimensions of the model clearly in the python code makes the running time comparatively lower and easier way to perform analysis of the valve. Hence, in this paper, an attempt was made to study the fluid-structure interaction (FSI) of butterfly valves by varying the valve angles and dimensions using python code in pre-processing software, and results are produced.

Keywords: butterfly valve, flow coefficient, automatic CFD analysis, FSI analysis

Procedia PDF Downloads 236
1975 SUMOylation Enhances Nurr1/1a Mediated Transactivation in a Neuronal Cell Type

Authors: Jade Edey, Andrew Bennett, Gareth Hathway

Abstract:

Nuclear receptor-related 1 protein (also known as Nurr1 or NR4A2) is an orphan nuclear receptor which plays a vital role in the development, survival and maintenance of dopaminergic (DA) neurons particularly in the substantia nigra (SN). Increasing research has investigated Nurr1’s additional role within microglia and astrocytes where it has been suggested to act as a negative regulator of inflammation; potentially offering neuroprotection. Considering both DA neurodegeneration and neuroinflammation are commonly accepted constituents of Parkinson’s Disease (PD), understanding the mechanisms by which Nurr1 regulates inflammatory processes could provide an attractive therapeutic target. Nurr1 regulates inflammation via a transrepressive mechanism possibly dependent upon SUMOylation. In addition, Nurr1 can transactivate numerous genes involved in DA synthesis, such as Tyrosine Hydroxylase (TH). A C-terminal splice variant of Nurr1, Nurr-1a, has been reported in both neuronal and glial cells. However, research into its transcriptional activity is minimal. We employed in vitro methods such as SUMO-Pulldown experiments alongside Luciferase reporter assays to investigate the SUMOylation status and transactivation capabilities of Nurr1 and Nurr-1a respectively. The SUMO-Pulldown assay demonstrated Nurr-1a undergoes significantly more SUMO modification than its full-length variant. Consequently, despite having less transcriptional activation than Nurr1, Nurr1a may play a more prominent role in repression of microglial inflammation. Contrary to published literature we also identified that SUMOylation enhances transcriptional activation by Nurr1 and Nurr1a. SUMOylation-dependent increases in Nurr1 and Nurr1a transcriptional activation were only evident in neuronal SHSY5Y cells but not in HEK293 cells. This research provides novel insight into the regulation of Nurr-1a and indicates differential effects of SUMOylation dependent regulation in neuronal and inflammatory cells.

Keywords: nuclear receptors, Parkinson’s disease, inflammation, transcriptional regulation

Procedia PDF Downloads 150
1974 Assessment of Adequacy of Pile Load Determination Formulas

Authors: Ashraf Eid

Abstract:

Many formulas are set to estimate the pile load capacity based on the in-situ pile load tests. However, discrepancy is obvious between the results of these applications. Some formulas are more adequate than others with respect to soil formation and its characteristics. In this research, attempts were undertaken to evaluate the adequacy of the most well-known formulas based on a series of pile load tests carried out in Port Said city in the northeast of Egypt for major residential projects. Comparisons were undertaken between the different formulas supported by the results of in-situ Cone Penetration Tests (CPT). Based on this study, a guide for engineers for using the proper formula can be adopted with consideration of soil type and characteristics. The Egyptian Code which relies on the results of some formulas is involved in the study as a guiding aspect in the pile design.

Keywords: pile load formula, load test of piles, CPT, Egyptian code

Procedia PDF Downloads 145
1973 Detecting Logical Errors in Haskell

Authors: Vanessa Vasconcelos, Mariza A. S. Bigonha

Abstract:

In order to facilitate both processes, this paper presents HaskellFL, a tool that uses fault localization techniques to locate a logical error in Haskell code. The Haskell subset used in this work is sufficiently expressive for those studying functional programming to get immediate help debugging their code and to answer questions about key concepts associated with the functional paradigm. HaskellFL was tested against functional programming assignments submitted by students enrolled at the functional programming class at the Federal University of Minas Gerais and against exercises from the Exercism Haskell track that are publicly available on GitHub. Furthermore, the EXAM score was chosen to evaluate the tool’s effectiveness, and results showed that HaskellFL reduced the effort needed to locate an error for all tested scenarios. Results also showed that the Ochiai method was more effective than Tarantula.

Keywords: debug, fault localization, functional programming, Haskell

Procedia PDF Downloads 291
1972 Radiative Reactions Analysis at the Range of Astrophysical Energies

Authors: A. Amar

Abstract:

Analysis of the elastic scattering of protons on 10B nuclei has been done in the framework of the optical model and single folding model at the beam energies up to 17 MeV. We could enhance the optical potential parameters using Esis88 Code, as well as SPI GENOA Code. Linear relationship between volume real potential (V0) and proton energy (Ep) has been obtained. Also, surface imaginary potential WD is proportional to the proton energy (Ep) in the range 0.400 and 17 MeV. The radiative reaction 10B(p,γ)11C has been analyzed using potential model. A comparison between 10B(p,γ)11C and 6Li(p,γ)7Be has been made. Good agreement has been found between theoretical and experimental results in the whole range of energy. The radiative resonance reaction 7Li(p,γ)8Be has been studied.

Keywords: elastic scattering of protons on 10B nuclei, optical potential parameters, potential model, radiative reaction

Procedia PDF Downloads 205
1971 Bypassing Docker Transport Layer Security Using Remote Code Execution

Authors: Michael J. Hahn

Abstract:

Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.

Keywords: cloud, cryptography, Docker, Linux, security

Procedia PDF Downloads 192
1970 Biogas Control: Methane Production Monitoring Using Arduino

Authors: W. Ait Ahmed, M. Aggour, M. Naciri

Abstract:

Extracting energy from biomass is an important alternative to produce different types of energy (heat, electricity, or both) assuring low pollution and better efficiency. It is a new yet reliable approach to reduce green gas emission by extracting methane from industry effluents and use it to power machinery. We focused in our project on using paper and mill effluents, treated in a UASB reactor. The methane produced is used in the factory’s power supply. The aim of this work is to develop an electronic system using Arduino platform connected to a gas sensor, to measure and display the curve of daily methane production on processing. The sensor will send the gas values in ppm to the Arduino board so that the later sends the RS232 hardware protocol. The code developed with processing will transform the values into a curve and display it on the computer screen.

Keywords: biogas, Arduino, processing, code, methane, gas sensor, program

Procedia PDF Downloads 311
1969 Large-Scale Simulations of Turbulence Using Discontinuous Spectral Element Method

Authors: A. Peyvan, D. Li, J. Komperda, F. Mashayek

Abstract:

Turbulence can be observed in a variety fluid motions in nature and industrial applications. Recent investment in high-speed aircraft and propulsion systems has revitalized fundamental research on turbulent flows. In these systems, capturing chaotic fluid structures with different length and time scales is accomplished through the Direct Numerical Simulation (DNS) approach since it accurately simulates flows down to smallest dissipative scales, i.e., Kolmogorov’s scales. The discontinuous spectral element method (DSEM) is a high-order technique that uses spectral functions for approximating the solution. The DSEM code has been developed by our research group over the course of more than two decades. Recently, the code has been improved to run large cases in the order of billions of solution points. Running big simulations requires a considerable amount of RAM. Therefore, the DSEM code must be highly parallelized and able to start on multiple computational nodes on an HPC cluster with distributed memory. However, some pre-processing procedures, such as determining global element information, creating a global face list, and assigning global partitioning and element connection information of the domain for communication, must be done sequentially with a single processing core. A separate code has been written to perform the pre-processing procedures on a local machine. It stores the minimum amount of information that is required for the DSEM code to start in parallel, extracted from the mesh file, into text files (pre-files). It packs integer type information with a Stream Binary format in pre-files that are portable between machines. The files are generated to ensure fast read performance on different file-systems, such as Lustre and General Parallel File System (GPFS). A new subroutine has been added to the DSEM code to read the startup files using parallel MPI I/O, for Lustre, in a way that each MPI rank acquires its information from the file in parallel. In case of GPFS, in each computational node, a single MPI rank reads data from the file, which is specifically generated for the computational node, and send them to other ranks on the node using point to point non-blocking MPI communication. This way, communication takes place locally on each node and signals do not cross the switches of the cluster. The read subroutine has been tested on Argonne National Laboratory’s Mira (GPFS), National Center for Supercomputing Application’s Blue Waters (Lustre), San Diego Supercomputer Center’s Comet (Lustre), and UIC’s Extreme (Lustre). The tests showed that one file per node is suited for GPFS and parallel MPI I/O is the best choice for Lustre file system. The DSEM code relies on heavily optimized linear algebra operation such as matrix-matrix and matrix-vector products for calculation of the solution in every time-step. For this, the code can either make use of its matrix math library, BLAS, Intel MKL, or ATLAS. This fact and the discontinuous nature of the method makes the DSEM code run efficiently in parallel. The results of weak scaling tests performed on Blue Waters showed a scalable and efficient performance of the code in parallel computing.

Keywords: computational fluid dynamics, direct numerical simulation, spectral element, turbulent flow

Procedia PDF Downloads 131
1968 Review of K0-Factors and Related Nuclear Data of the Selected Radionuclides for Use in K0-NAA

Authors: Manh-Dung Ho, Van-Giap Pham, Van-Doanh Ho, Quang-Thien Tran, Tuan-Anh Tran

Abstract:

The k0-factors and related nuclear data, i.e. the Q0-factors and effective resonance energies (Ēr) of the selected radionuclides which are used in the k0-based neutron activation analysis (k0-NAA), were critically reviewed to be integrated in the “k0-DALAT” software. The k0- and Q0-factors of some short-lived radionuclides: 46mSc, 110Ag, 116m2In, 165mDy, and 183mW, were experimentally determined at the Dalat research reactor. The other radionuclides selected are: 20F, 36S, 49Ca, 60mCo, 60Co, 75Se, 77mSe, 86mRb, 115Cd, 115mIn, 131Ba, 134mCs, 134Cs, 153Gd, 153Sm, 159Gd, 170Tm, 177mYb, 192Ir, 197mHg, 239U and 239Np. The reviewed data as compared with the literature data were biased within 5.6-7.3% in which the experimental re-determined factors were within 6.1 and 7.3%. The NIST standard reference materials: Oyster Tissue (1566b), Montana II Soil (2711a) and Coal Fly Ash (1633b) were used to validate the new reviewed data showing that the new data gave an improved k0-NAA using the “k0-DALAT” software with a factor of 4.5-6.8% for the investigated radionuclides.

Keywords: neutron activation analysis, k0-based method, k0 factor, Q0 factor, effective resonance energy

Procedia PDF Downloads 121
1967 An Energy Efficient Spectrum Shaping Scheme for Substrate Integrated Waveguides Based on Spread Reshaping Code

Authors: Yu Zhao, Rainer Gruenheid, Gerhard Bauch

Abstract:

In the microwave and millimeter-wave transmission region, substrate-integrated waveguide (SIW) is a very promising candidate for the development of circuits and components. It facilitates the transmission at the data rates in excess of 200 Gbit/s. An SIW mimics a rectangular waveguide by approximating the closed sidewalls with a via fence. This structure suppresses the low frequency components and makes the channel of the SIW a bandpass or high pass filter. This channel characteristic impedes the conventional baseband transmission using non-return-to-zero (NRZ) pulse shaping scheme. Therefore, mixers are commonly proposed to be used as carrier modulator and demodulator in order to facilitate a passband transmission. However, carrier modulation is not an energy efficient solution, because modulation and demodulation at high frequencies consume a lot of energy. For the first time to our knowledge, this paper proposes a spectrum shaping scheme of low complexity for the channel of SIW, namely spread reshaping code. It aims at matching the spectrum of the transmit signal to the channel frequency response. It facilitates the transmission through the SIW channel while it avoids using carrier modulation. In some cases, it even does not need equalization. Simulations reveal a good performance of this scheme, such that, as a result, eye opening is achieved without any equalization or modulation for the respective transmission channels.

Keywords: bandpass channel, eye-opening, switching frequency, substrate-integrated waveguide, spectrum shaping scheme, spread reshaping code

Procedia PDF Downloads 156
1966 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 35
1965 OpenMP Parallelization of Three-Dimensional Magnetohydrodynamic Code FOI-PERFECT

Authors: Jiao F. Huang, Shi Chen, Shu C. Duan, Gang H. Wang

Abstract:

Due to its complex spatial structure as well as dynamic temporal evolution, an analytic solution of an X-pinch process is out of question, and numerical simulation becomes an important tool in X-pinch studies. Intrinsically, simulations of X-pinch are three-dimensional (3D) because of the specific structure of its load. Furthermore, in order to resolve both its μm-scales and ns-durations, fine spatial mesh grid and short time steps are usually adopted. The resulting large computational scales make the parallelization of codes a vital problem to be solved if any practical simulations are to be carried out. In this work, we report OpenMP parallelization of our 3D magnetohydrodynamic (MHD) code FOI-PERFECT. Results of test runs confirm that computational efficiency has been improved after parallelization, and both the sequential and parallel versions give the same physical results under the same initial conditions.

Keywords: MHD simulation, OpenMP, parallelization, X-pinch

Procedia PDF Downloads 335
1964 Kinetic Analysis of Wood Pellets by Isothermal Calorimetry for Evaluating its Self-heating Potential

Authors: Can Yao, Chang Dong Sheng

Abstract:

The heat released by wood pellets during storage will cause self-heating and even self-ignition. In this work, the heat release rates of pine, fir wood and mahogany pellets at 30–70℃ were measured by TAM air isothermal calorimeter, and the kinetic analysis was performed by iso-conversion ratio and non-steady-state methods to evaluate its self-heating potential. The results show that the reaction temperature can significantly affect the heat release rate. The higher the temperature, the greater the heat release rate. The heat release rates of different kinds of wood pellets are obviously different, and the order of the heat release rates for the three pellets at 70℃ is pine > fir wood > mahogany. The kinetic analysis of the iso-conversion ratio method indicates that the distribution of activation energy for pine, fir wood and mahogany pellets under the release of 0.1–1.0 J/g specific heat are 58–102 kJ/mol, 59–108 kJ/mol and 59–112 kJ/mol, respectively. Their activation energies obtained from the non-steady-state kinetic analysis are 13.43 kJ/mol, 19.19 kJ/mol and 21.09 kJ/mol, respectively. Both kinetic analyses show that the magnitude of self-heating risk for the three pellet fuels is pine pellets > fir wood pellets > mahogany pellets.

Keywords: isothermal calorimeter, kinetics, self-heating, wood pellets

Procedia PDF Downloads 161
1963 Applications for Accounting of Inherited Object-Oriented Class Members

Authors: Jehad Al Dallal

Abstract:

A class in an Object-Oriented (OO) system is the basic unit of design, and it encapsulates a set of attributes and methods. In OO systems, instead of redefining the attributes and methods that are included in other classes, a class can inherit these attributes and methods and only implement its unique attributes and methods, which results in reducing code redundancy and improving code testability and maintainability. Such mechanism is called Class Inheritance. However, some software engineering applications may require accounting for all the inherited class members (i.e., attributes and methods). This paper explains how to account for inherited class members and discusses the software engineering applications that require such consideration.

Keywords: class flattening, external quality attribute, inheritance, internal quality attribute, object-oriented design

Procedia PDF Downloads 266
1962 Abusing Business Rescue Proceedings by a Director and Its Impact on the Ethics of Good Corporate Governance

Authors: Simphiwe Phungula

Abstract:

In the past few years, the impact of Covid 19 in South Africa has given rise to the need for business rescue proceedings where businesses are financially distressed. Even more, the looting unrest and floods in certain parts of South Africa have also played an impact on businesses’ financial stress. To help financially distressed companies in South Africa, the Companies Act (“the Act”) has introduced a business rescue procedure aimed at helping those ailing companies. This mechanism is aimed at rehabilitating financially distressed companies so that they become solvent again and if it is not possible, results in a better return for the company’s creditors or shareholders than would result from the immediate liquidation of the company. Unfortunately, since the introduction of business rescue, evidence has shown that sometimes companies resort to business rescue proceedings to seek refuge from creditors even if the facts do not justify that the company should commence business rescue. In most cases, the abuse of business rescue is done by directors who pass a resolution that the company should embark on business rescue even if evidence shows that the company should not commence the proceedings. This is done notwithstanding the principles of King Code IV which requires ethics and good governance on the part of directors. This paper demonstrates how the abuse of business rescue can impact the principles of good governance and ethics of King Code IV. It argues that directors should rethink their corporate practices, and ethical standards when passing a resolution to commence business rescue proceedings.

Keywords: business rescue, king code, corporate governance, ethics

Procedia PDF Downloads 95
1961 Code-Switching among Local UCSI Stem and N-Stem Undergraduates during Knowledge Sharing

Authors: Adeela Abu Bakar, Minder Kaur, Parthaman Singh

Abstract:

In the Malaysian education system, a formal setting of English language learning takes place in a content-based classroom (CBC). Until recently, there is less study in Malaysia, which researched the effects of code-switching (CS) behaviour towards the students’ knowledge sharing (KS) with their peers. The aim of this study is to investigate the frequency, reasons, and effect that CS, from the English language to Bahasa Melayu, has among local STEM and N-STEM undergraduates towards KS in a content-based classroom. The study implies a mixed-method research design with questionnaire and interviews as the instruments. The data is collected through distribution of questionnaires and interviews with the undergraduates. The quantitative data is analysed using SPSS in simple frequencies and percentages, whereas qualitative data involves organizing the data into themes, followed by analysis. Findings found that N-STEM undergraduates code-switch more as compared to STEM undergraduates. In addition to that, both the STEM and N-STEM undergraduates agree that CS acts as a catalyst towards KS in a content-based classroom. However, they also acknowledge that excess use of CS can be a hindrance towards KS. The findings of the study can benefit STEM and N-STEM undergraduates, education policymakers, language teachers, university educators, and students with significant insights into the role of CS towards KS in a content-based classroom. Some of the recommendations that can be applied for future studies are that the number of participants can be increased, an observation to be included for the data collection.

Keywords: switching, content-based classroom, content and language integrated learning, knowledge sharing, STEM and N-STEM undergraduates

Procedia PDF Downloads 130