Search results for: power network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10399

Search results for: power network

6469 The Language of Hip-Hop and Rap in Tunisia: Symbol of Cultural Change in Post-Arab Spring Tunisia

Authors: Zouhir Gabsi

Abstract:

The Arab Spring has had noticeable effects on Tunisia in socio-economic, political, and cultural terms. Few have predicted that the music of hip-hop and rap could engage with the socio-political situation in Tunisia, especially after the downfall of Ben Ali’s regime. Having survived as underground music since the year 2000, the genre of hip-hop and rap remains an aberration from the folkloric tradition. By adhering to the socio-economic reality of the Tunisian street, rappers attempt to claim authenticity mainly in both thematic and language uses, and by usurping the power of ‘space’ from the regime’s control. With the songs’ fast-paced rhythms, catchy phrases, puns, vulgarisms, and linguistic innovations using metaphors, hip-hop, and rap have struck a chord with Tunisia’s youth. Tunisia’s new social reality has allowed Tunisian rappers to express dissent and voice people’s despair over the socio-economic and political situation. This paper argues that rap artists use language as a vehicle to claim the authenticity of their message. It also explores how the performative nature of the language of hip-hop and rap interacts with the Tunisian culture and argues the power of music in the context of political and socio-economic grievances in post-Arab Spring Tunisia.

Keywords: Arab Spring, hip-hop, eevolution, Tunisia, Tunisian Arabic

Procedia PDF Downloads 152
6468 Oxygen Enriched Co-Combustion of Sub-Bituminous Coal/Biomass Waste Fuel Blends

Authors: Chaouki Ghenai

Abstract:

Computational Fluid Dynamic analysis of co-combustion of coal/biomass waste fuel blends is presented in this study. The main objective of this study is to investigate the effects of biomass portions (0%, 10%, 20%, 30%: weight percent) blended with coal and oxygen concentrations (21% for air, 35%, 50%, 75% and 100 % for pure oxygen) on the combustion performance and emissions. The goal is to reduce the air emissions from power plants coal combustion. Sub-bituminous Nigerian coal with calorific value of 32.51 MJ/kg and sawdust (biomass) with calorific value of 16.68 MJ/kg is used in this study. Coal/Biomass fuel blends co-combustion is modeled using mixture fraction/pdf approach for non-premixed combustion and Discrete Phase Modeling (DPM) to predict the trajectories and the heat/mass transfer of the fuel blend particles. The results show the effects of oxygen concentrations and biomass portions in the coal/biomass fuel blends on the gas and particles temperatures, the flow field, the devolitization and burnout rates inside the combustor and the CO2 and NOX emissions at the exit from the combustor. The results obtained in the course of this study show the benefits of enriching combustion air with oxygen and blending biomass waste with coal for reducing the harmful emissions from coal power plants.

Keywords: co-combustion, coal, biomass, fuel blends, CFD, air emissions

Procedia PDF Downloads 417
6467 Study of Linear Generator for Vibration Energy Harvesting of Frequency more than 50Hz

Authors: Seong-Jin Cho, Jin Ho Kim

Abstract:

Energy harvesting is the technology which gathers and converts external energies such as light, vibration and heat which are disposed into reusable electrical energy and uses such electrical energy. The vibration energy harvesting is very interesting technology because it produces very high density of energy and unaffected by the climate. Vibration energy can be harvested by the electrostatic, electromagnetic and piezoelectric systems. The electrostatic system has low energy conversion efficiency, and the piezoelectric system is expensive and needs the frequent maintenance because it is made of piezoelectric ceramic. On the other hand, the electromagnetic system has a long life time and high harvesting efficiency, and it is relatively cheap. The electromagnetic harvesting system includes the linear generator and the rotary-type generator. The rotary-type generators require the additional mechanical conversion device if it uses linear motion of vibration. But, the linear generator uses directly linear motion of vibration without a mechanical conversion device, and it has uncomplicated structure and light weight compared with the rotary-type generator. Therefore, the linear electromagnetic generator can be useful in using vibration energy harvesting. The pole transformer systems need electricity sensor system for sending voltage and power information to administrator. Therefore, the battery is essential, and its regular maintenance of replacement is required. In case of the transformer of high location in mountainous areas, the person can’t easily access it resulting in high maintenance cost. To overcome these problems, we designed and developed the linear electromagnetic generator which can replace battery in electricity sensor system for sending voltage and power information of the pole transformer. And, it uses vibration energy of frequency more than 50 Hz by the pole transformer. In order to analyze the electromagnetic characteristics of small linear electric generator, a commercial electromagnetic finite element analysis program "MAXWELL" was used. Then, through the actual production and experiment of linear generator, we confirmed output power of linear generator.

Keywords: energy harvesting, frequency, linear generator, experiment

Procedia PDF Downloads 259
6466 A New Approach to Achieve the Regime Equations in Sand-Bed Rivers

Authors: Farhad Imanshoar

Abstract:

The regime or equilibrium geometry of alluvial rivers remains a topic of fundamental scientific and engineering interest. There are several approaches to analyze the problem, namely: empirical formulas, semi-theoretical methods and rational (extreme) procedures. However, none of them is widely accepted at present, due to lack of knowledge of some physical processes associated with channel formation and the simplification hypotheses imposed in order to reduce the high quantity of involved variables. The study presented in this paper shows a new approach to estimate stable width and depth of sand-bed rivers by using developed stream power equation (DSPE). At first, a new procedure based on theoretical analysis and by considering DSPE and ultimate sediment concentration were developed. Then, experimental data for regime condition in sand-bed rivers (flow depth, flow width, sediment feed rate for several cases) were gathered. Finally, the results of this research (regime equations) are compared with the field data and other regime equations. A good agreement was observed between the field data and the values resulted from developed regime equation.

Keywords: regime equations, developed stream power equation, sand-bed rivers, semi-theoretical methods

Procedia PDF Downloads 268
6465 Physical Activity and Sport Research with People with Impairments: Oppression–Empowerment Continuum

Authors: Gyozo Molnar, Nancy Spencer-Cavaliere

Abstract:

Research in the area of physical activity and sport, while becoming multidisciplinary, is still dominated by post-positivist approaches that have the tendency to position the researcher as an expert and the participant as subordinate thereby perpetuating an unequal balance of power. Despite physical activity’s and sport’s universal appeal, their historic practices have excluded particular groups of people who assumed lesser forms of human capital. Adapted physical activity (APA) is a field that has responded to those segregations with specific application and relevance to people with impairments. Nevertheless, to date, similar to physical activity and sport, research in APA is still dominated by post-positivist epistemology. Stemming from this, there is gradually growing criticism within the field related to the abundance of research ‘on’ people with impairments and lack of research ‘with’ and ‘by’ people with impairments. Furthermore, research questions in the field are most often pursued from a single axis of analysis and constructed by non-disabled researchers. Concurrently, while calls for interdisciplinary approaches to understanding disability are growing in popularity, there is also a clear need to take an intersectionality-informed research methodology to understanding physical activity and sport and power (im)balances therein. In other words, impairment needs to be considered in conjunction with other socially and politically constructed and historically embedded differences such as gender, race, class, etc. when analyzing physical activity and sport experiences for people with impairments. Moreover, it is reasonable to argue that non-disabled researchers must recognize and theorize ableism in its complicated intersectional manifestation to show the structural constraints that disabled scholars face in the field. Consequently, this presentation will offer an alternative approach that acknowledges and prioritizes the perspectives and experiences of people with impairments to expand the field of APA. As such, the importance of broadening epistemologies in APA and prioritizing an appreciation for multiple bits of knowledge of people with impairments through intersections of social locations (e.g., gender, race, class) will be considered.

Keywords: adapted physical activity, disability, intersectionality, post-positivist, power imbalances

Procedia PDF Downloads 237
6464 Modeling Driving Distraction Considering Psychological-Physical Constraints

Authors: Yixin Zhu, Lishengsa Yue, Jian Sun, Lanyue Tang

Abstract:

Modeling driving distraction in microscopic traffic simulation is crucial for enhancing simulation accuracy. Current driving distraction models are mainly derived from physical motion constraints under distracted states, in which distraction-related error terms are added to existing microscopic driver models. However, the model accuracy is not very satisfying, due to a lack of modeling the cognitive mechanism underlying the distraction. This study models driving distraction based on the Queueing Network Human Processor model (QN-MHP). This study utilizes the queuing structure of the model to perform task invocation and switching for distracted operation and control of the vehicle under driver distraction. Based on the assumption of the QN-MHP model about the cognitive sub-network, server F is a structural bottleneck. The latter information must wait for the previous information to leave server F before it can be processed in server F. Therefore, the waiting time for task switching needs to be calculated. Since the QN-MHP model has different information processing paths for auditory information and visual information, this study divides driving distraction into two types: auditory distraction and visual distraction. For visual distraction, both the visual distraction task and the driving task need to go through the visual perception sub-network, and the stimuli of the two are asynchronous, which is called stimulus on asynchrony (SOA), so when calculating the waiting time for switching tasks, it is necessary to consider it. In the case of auditory distraction, the auditory distraction task and the driving task do not need to compete for the server resources of the perceptual sub-network, and their stimuli can be synchronized without considering the time difference in receiving the stimuli. According to the Theory of Planned Behavior for drivers (TPB), this study uses risk entropy as the decision criterion for driver task switching. A logistic regression model is used with risk entropy as the independent variable to determine whether the driver performs a distraction task, to explain the relationship between perceived risk and distraction. Furthermore, to model a driver’s perception characteristics, a neurophysiological model of visual distraction tasks is incorporated into the QN-MHP, and executes the classical Intelligent Driver Model. The proposed driving distraction model integrates the psychological cognitive process of a driver with the physical motion characteristics, resulting in both high accuracy and interpretability. This paper uses 773 segments of distracted car-following in Shanghai Naturalistic Driving Study data (SH-NDS) to classify the patterns of distracted behavior on different road facilities and obtains three types of distraction patterns: numbness, delay, and aggressiveness. The model was calibrated and verified by simulation. The results indicate that the model can effectively simulate the distracted car-following behavior of different patterns on various roadway facilities, and its performance is better than the traditional IDM model with distraction-related error terms. The proposed model overcomes the limitations of physical-constraints-based models in replicating dangerous driving behaviors, and internal characteristics of an individual. Moreover, the model is demonstrated to effectively generate more dangerous distracted driving scenarios, which can be used to construct high-value automated driving test scenarios.

Keywords: computational cognitive model, driving distraction, microscopic traffic simulation, psychological-physical constraints

Procedia PDF Downloads 91
6463 The Systems Biology Verification Endeavor: Harness the Power of the Crowd to Address Computational and Biological Challenges

Authors: Stephanie Boue, Nicolas Sierro, Julia Hoeng, Manuel C. Peitsch

Abstract:

Systems biology relies on large numbers of data points and sophisticated methods to extract biologically meaningful signal and mechanistic understanding. For example, analyses of transcriptomics and proteomics data enable to gain insights into the molecular differences in tissues exposed to diverse stimuli or test items. Whereas the interpretation of endpoints specifically measuring a mechanism is relatively straightforward, the interpretation of big data is more complex and would benefit from comparing results obtained with diverse analysis methods. The sbv IMPROVER project was created to implement solutions to verify systems biology data, methods, and conclusions. Computational challenges leveraging the wisdom of the crowd allow benchmarking methods for specific tasks, such as signature extraction and/or samples classification. Four challenges have already been successfully conducted and confirmed that the aggregation of predictions often leads to better results than individual predictions and that methods perform best in specific contexts. Whenever the scientific question of interest does not have a gold standard, but may greatly benefit from the scientific community to come together and discuss their approaches and results, datathons are set up. The inaugural sbv IMPROVER datathon was held in Singapore on 23-24 September 2016. It allowed bioinformaticians and data scientists to consolidate their ideas and work on the most promising methods as teams, after having initially reflected on the problem on their own. The outcome is a set of visualization and analysis methods that will be shared with the scientific community via the Garuda platform, an open connectivity platform that provides a framework to navigate through different applications, databases and services in biology and medicine. We will present the results we obtained when analyzing data with our network-based method, and introduce a datathon that will take place in Japan to encourage the analysis of the same datasets with other methods to allow for the consolidation of conclusions.

Keywords: big data interpretation, datathon, systems toxicology, verification

Procedia PDF Downloads 278
6462 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 251
6461 Evaluation of an Integrated Supersonic System for Inertial Extraction of CO₂ in Post-Combustion Streams of Fossil Fuel Operating Power Plants

Authors: Zarina Chokparova, Ighor Uzhinsky

Abstract:

Carbon dioxide emissions resulting from burning of the fossil fuels on large scales, such as oil industry or power plants, leads to a plenty of severe implications including global temperature raise, air pollution and other adverse impacts on the environment. Besides some precarious and costly ways for the alleviation of CO₂ emissions detriment in industrial scales (such as liquefaction of CO₂ and its deep-water treatment, application of adsorbents and membranes, which require careful consideration of drawback effects and their mitigation), one physically and commercially available technology for its capture and disposal is supersonic system for inertial extraction of CO₂ in after-combustion streams. Due to the flue gas with a carbon dioxide concentration of 10-15 volume percent being emitted from the combustion system, the waste stream represents a rather diluted condition at low pressure. The supersonic system induces a flue gas mixture stream to expand using a converge-and-diverge operating nozzle; the flow velocity increases to the supersonic ranges resulting in rapid drop of temperature and pressure. Thus, conversion of potential energy into the kinetic power causes a desublimation of CO₂. Solidified carbon dioxide can be sent to the separate vessel for further disposal. The major advantages of the current solution are its economic efficiency, physical stability, and compactness of the system, as well as needlessness of addition any chemical media. However, there are several challenges yet to be regarded to optimize the system: the way for increasing the size of separated CO₂ particles (as they are represented on a micrometers scale of effective diameter), reduction of the concomitant gas separated together with carbon dioxide and provision of CO₂ downstream flow purity. Moreover, determination of thermodynamic conditions of the vapor-solid mixture including specification of the valid and accurate equation of state remains to be an essential goal. Due to high speeds and temperatures reached during the process, the influence of the emitted heat should be considered, and the applicable solution model for the compressible flow need to be determined. In this report, a brief overview of the current technology status will be presented and a program for further evaluation of this approach is going to be proposed.

Keywords: CO₂ sequestration, converging diverging nozzle, fossil fuel power plant emissions, inertial CO₂ extraction, supersonic post-combustion carbon dioxide capture

Procedia PDF Downloads 141
6460 Network Based Speed Synchronization Control for Multi-Motor via Consensus Theory

Authors: Liqin Zhang, Liang Yan

Abstract:

This paper addresses the speed synchronization control problem for a network-based multi-motor system from the perspective of cluster consensus theory. Each motor is considered as a single agent connected through fixed and undirected network. This paper presents an improved control protocol from three aspects. First, for the purpose of improving both tracking and synchronization performance, this paper presents a distributed leader-following method. The improved control protocol takes the importance of each motor’s speed into consideration, and all motors are divided into different groups according to speed weights. Specifically, by using control parameters optimization, the synchronization error and tracking error can be regulated and decoupled to some extent. The simulation results demonstrate the effectiveness and superiority of the proposed strategy. In practical engineering, the simplified models are unrealistic, such as single-integrator and double-integrator. And previous algorithms require the acceleration information of the leader available to all followers if the leader has a varying velocity, which is also difficult to realize. Therefore, the method focuses on an observer-based variable structure algorithm for consensus tracking, which gets rid of the leader acceleration. The presented scheme optimizes synchronization performance, as well as provides satisfactory robustness. What’s more, the existing algorithms can obtain a stable synchronous system; however, the obtained stable system may encounter some disturbances that may destroy the synchronization. Focus on this challenging technological problem, a state-dependent-switching approach is introduced. In the presence of unmeasured angular speed and unknown failures, this paper investigates a distributed fault-tolerant consensus tracking algorithm for a group non-identical motors. The failures are modeled by nonlinear functions, and the sliding mode observer is designed to estimate the angular speed and nonlinear failures. The convergence and stability of the given multi-motor system are proved. Simulation results have shown that all followers asymptotically converge to a consistent state when one follower fails to follow the virtual leader during a large enough disturbance, which illustrates the good performance of synchronization control accuracy.

Keywords: consensus control, distributed follow, fault-tolerant control, multi-motor system, speed synchronization

Procedia PDF Downloads 125
6459 Aerodynamic Interference of Propellers Group with Adjustable Mutual Position

Authors: Michal Biały, Krzysztof Skiba, Zdzislaw Kaminski

Abstract:

The research results of the influence of the adjustable mutual position of the propellers for getting optimal lift force on a specially designed bench. The bench consists of frame with electric motors and with attached propellers. Engines were arranged in a matrix of two columns and three rows. The distance between the columns averages from 0 to 20”, while the engine was placed at a height of 8”, 15.5” and 23.6”. By adjusting the tilt of an electric motor, an angle of the propeller in the range of 0° to 60°, by 15° was controlled. Propellers with a diameter of 8" and pitch of 4.5” were driven by brushless model engines Roxxy BL-Outrunner 2827/26 with a power of 110W (each). Rotational speed control of electric motors were realized parallel for all propellers. The speed adjustment was realized using an aggregate of radio-controlled regulators. Electric power supplied to the engines from zero to maximum power, by the setting for every 14W, was controlled by radio system. Measurement system was placed on a laboratory scale. The lift was measured and recorded by an electronic scale. The lift force for different configurations of propellers arrangement was recorded during the test. All propellers were driven in one rotational direction and in different directions when they were in the same pairs. Propellers were driven concurrently and contra-concurrently along one of the columns and along the selected rows. During the tests, except the lift, parameters such as: rotational speed of propellers, voltage and current to the electric engines were recorded. The main aim of the research was to show the influence of aerodynamic interference between the propellers to receive lift force depending on the drive configuration of individual propellers. The research has shown that, this interference exists. The increase of the lift force for a distance between columns above 26.6” was noticed during the driving propellers in different directions. The optimum tilt angle of the propeller was 45°. Furthermore there has been also approx. 12% increase of the lift for propellers driven alternately in column and contra-concurrently in relation to the contra-rotating drive in the row.

Keywords: aerodynamic, interference, lift force, propeller, propulsion system

Procedia PDF Downloads 344
6458 Slave Museums and a Site of Democratic Pedagogy: Engagement, Healing and Tolerance

Authors: Elaine Stavro

Abstract:

In our present world where acts of incivility, intolerance and anger towards minority communities is on the rise, the ways museum practices cultivate ethical generosity is of interest. Democratic theorists differ as to how they believe respect can be generated through active participation. Allowing minority communities a role in determining what artifacts will be displayed and how they will be displayed has been an important step in generating respect. In addition, the rise of indigenous museums, slave museums and curators who represent these communities, contribute to the communication of their history of oppression. These institutional practices have been supplemented by the handling of objects, recognition stories and multisensory exhibitions. Psychoanalysis, object relations theorists believe that the handling of objects: amenable objects and responsive listeners will trigger the expression of anomie, alienation and traumatizing experiences. Not only memorializing but engaging with one’s lose in a very personal way can facilitate the process of mourning. Manchester Museum (UK) gathered together Somalian refugees, who in the process of handling their own objects and those offered at the museum, began to tell their stories. Democratic theorists (especially affect theorists or vital materialists or Actor Network theorists) believe that things can be social actants- material objects have agentic capacities that humans should align with. In doing so, they challenge social constructivism that attributes power to interpreted things, but like them they assume an openness or responsiveness to Otherness can be cultivated. Rich sensory experiences, corporeal engagement (devices that involve bodily movement or objects that involve handling) auditory experiences (songs) all contribute to improve one’s responsiveness and openness to Others. This paper will focus specifically on slave museums/ and exhibits in the U.K, the USA., South Africa to explore and evaluate their democratic strategies in cultivating tolerant practices via the various democratic avenues outlined above.

Keywords: democratic pedagogy, slave exhibitions, affect/emotion, object handling

Procedia PDF Downloads 460
6457 Air Conditioning Variation of 1kW Open-Cathode Proton Exchange Membrane (PEM) Fuel Cell

Authors: Mohammad Syahirin Aisha, Khairul Imran Sainan

Abstract:

The PEM fuel cell is a device that generate electric by electrochemical reaction between hydrogen fuel and oxygen in the fuel cell stack. PEM fuel cell consists of an anode (hydrogen supply), a cathode (oxygen supply) and an electrolyte that allow charges move between the two positions of the fuel cell. The only product being developed after the reaction is water (H2O) and heat as the waste which does not emit greenhouse gasses. The performance of fuel cell affected by numerous parameters. This study is restricted to cathode parameters that affect fuel cell performance. At the anode side, the reactant is not going through any changes. Experiments with variation in air velocity (3m/s, 6m/s and 9m/s), temperature (10oC, 20oC, 35oC) and relative humidity (50%, 60%, and 70%) have been carried out. The experiments results are presented in the form of fuel cell stack power output over time, which demonstrate the impacts of the various air condition on the execution of the PEM fuel cell. In this study, the experimental analysis shows that with variation of air conditions, it gives different fuel cell performance behavior. The maximum power output of the experiment was measured at an ambient temperature of 25oC with relative humidity and 9m/s velocity of air.

Keywords: air-breathing PEM fuel cell, cathode side, performance, variation in air condition

Procedia PDF Downloads 461
6456 Study of the Clogging of Localized Irrigation Pipelines at the Agricultural Region of Agadir

Authors: Ali Driouiche, Abdallah Hadfi

Abstract:

During this work on scaling phenomenon observed in the irrigation water pipes in the agricultural region of Greater Agadir, a follow-up was carried out during a year of the physico-chemical quality of these waters. Sampling was conducted from 120 sampling points, well distributed in the study area and involved 120 water samples. The parameters measured for each sample are temperature, pH, conductivity, total hardness and the concentrations of the ions HCO₃₋, Ca²⁺, Mg²⁺, Na⁺, K⁺, SO₄₋, NO₃₋, Cl₋ and OH₋. Indeed, the monitoring of the physico-chemical quality shows that the total hardness varies between 20 and 65 °F and the complete alkalimetric title varies from 14 °F to 42 °F. For the kinetic study of the scaling power, an object of this work, 6 samples which have high hardness were selected from the 120 samples analyzed. This study was carried out using the controlled degassing method Laboratoire de Chimie et de Génie de l’Environnement (LCGE) where it was developed) and showed that the studied waters are calcifying. The germination time Tg varies between 16 and 34 minutes. The highlighting of new scale inhibitors to prevent the formation of scale in the pipelines of the agricultural sector of Greater Agadir will also be discussed.

Keywords: agadir, clogging pipes, localized irrigation, scaling power

Procedia PDF Downloads 121
6455 Multi-Agent System Based Distributed Voltage Control in Distribution Systems

Authors: A. Arshad, M. Lehtonen. M. Humayun

Abstract:

With the increasing Distributed Generation (DG) penetration, distribution systems are advancing towards the smart grid technology for least latency in tackling voltage control problem in a distributed manner. This paper proposes a Multi-agent based distributed voltage level control. In this method a flat architecture of agents is used and agents involved in the whole controlling procedure are On Load Tap Changer Agent (OLTCA), Static VAR Compensator Agent (SVCA), and the agents associated with DGs and loads at their locations. The objectives of the proposed voltage control model are to minimize network losses and DG curtailments while maintaining voltage value within statutory limits as close as possible to the nominal. The total loss cost is the sum of network losses cost, DG curtailment costs, and voltage damage cost (which is based on penalty function implementation). The total cost is iteratively calculated for various stricter limits by plotting voltage damage cost and losses cost against varying voltage limit band. The method provides the optimal limits closer to nominal value with minimum total loss cost. In order to achieve the objective of voltage control, the whole network is divided into multiple control regions; downstream from the controlling device. The OLTCA behaves as a supervisory agent and performs all the optimizations. At first, a token is generated by OLTCA on each time step and it transfers from node to node until the node with voltage violation is detected. Upon detection of such a node, the token grants permission to Load Agent (LA) for initiation of possible remedial actions. LA will contact the respective controlling devices dependent on the vicinity of the violated node. If the violated node does not lie in the vicinity of the controller or the controlling capabilities of all the downstream control devices are at their limits then OLTC is considered as a last resort. For a realistic study, simulations are performed for a typical Finnish residential medium-voltage distribution system using Matlab ®. These simulations are executed for two cases; simple Distributed Voltage Control (DVC) and DVC with optimized loss cost (DVC + Penalty Function). A sensitivity analysis is performed based on DG penetration. The results indicate that costs of losses and DG curtailments are directly proportional to the DG penetration, while in case 2 there is a significant reduction in total loss. For lower DG penetration, losses are reduced more or less 50%, while for higher DG penetration, loss reduction is not very significant. Another observation is that the newer stricter limits calculated by cost optimization moves towards the statutory limits of ±10% of the nominal with the increasing DG penetration as for 25, 45 and 65% limits calculated are ±5, ±6.25 and 8.75% respectively. Observed results conclude that the novel voltage control algorithm proposed in case 1 is able to deal with the voltage control problem instantly but with higher losses. In contrast, case 2 make sure to reduce the network losses through proposed iterative method of loss cost optimization by OLTCA, slowly with time.

Keywords: distributed voltage control, distribution system, multi-agent systems, smart grids

Procedia PDF Downloads 312
6454 Analyzing the Commentator Network Within the French YouTube Environment

Authors: Kurt Maxwell Kusterer, Sylvain Mignot, Annick Vignes

Abstract:

To our best knowledge YouTube is the largest video hosting platform in the world. A high number of creators, viewers, subscribers and commentators act in this specific eco-system which generates huge sums of money. Views, subscribers, and comments help to increase the popularity of content creators. The most popular creators are sponsored by brands and participate in marketing campaigns. For a few of them, this becomes a financially rewarding profession. This is made possible through the YouTube Partner Program, which shares revenue among creators based on their popularity. We believe that the role of comments in increasing the popularity is to be emphasized. In what follows, YouTube is considered as a bilateral network between the videos and the commentators. Analyzing a detailed data set focused on French YouTubers, we consider each comment as a link between a commentator and a video. Our research question asks what are the predominant features of a video which give it the highest probability to be commented on. Following on from this question, how can we use these features to predict the action of the agent in commenting one video instead of another, considering the characteristics of the commentators, videos, topics, channels, and recommendations. We expect to see that the videos of more popular channels generate higher viewer engagement and thus are more frequently commented. The interest lies in discovering features which have not classically been considered as markers for popularity on the platform. A quick view of our data set shows that 96% of the commentators comment only once on a certain video. Thus, we study a non-weighted bipartite network between commentators and videos built on the sub-sample of 96% of unique comments. A link exists between two nodes when a commentator makes a comment on a video. We run an Exponential Random Graph Model (ERGM) approach to evaluate which characteristics influence the probability of commenting a video. The creation of a link will be explained in terms of common video features, such as duration, quality, number of likes, number of views, etc. Our data is relevant for the period of 2020-2021 and focuses on the French YouTube environment. From this set of 391 588 videos, we extract the channels which can be monetized according to YouTube regulations (channels with at least 1000 subscribers and more than 4000 hours of viewing time during the last twelve months).In the end, we have a data set of 128 462 videos which consist of 4093 channels. Based on these videos, we have a data set of 1 032 771 unique commentators, with a mean of 2 comments per a commentator, a minimum of 1 comment each, and a maximum of 584 comments.

Keywords: YouTube, social networks, economics, consumer behaviour

Procedia PDF Downloads 68
6453 Similarity Solutions of Nonlinear Stretched Biomagnetic Flow and Heat Transfer with Signum Function and Temperature Power Law Geometries

Authors: M. G. Murtaza, E. E. Tzirtzilakis, M. Ferdows

Abstract:

Biomagnetic fluid dynamics is an interdisciplinary field comprising engineering, medicine, and biology. Bio fluid dynamics is directed towards finding and developing the solutions to some of the human body related diseases and disorders. This article describes the flow and heat transfer of two dimensional, steady, laminar, viscous and incompressible biomagnetic fluid over a non-linear stretching sheet in the presence of magnetic dipole. Our model is consistent with blood fluid namely biomagnetic fluid dynamics (BFD). This model based on the principles of ferrohydrodynamic (FHD). The temperature at the stretching surface is assumed to follow a power law variation, and stretching velocity is assumed to have a nonlinear form with signum function or sign function. The governing boundary layer equations with boundary conditions are simplified to couple higher order equations using usual transformations. Numerical solutions for the governing momentum and energy equations are obtained by efficient numerical techniques based on the common finite difference method with central differencing, on a tridiagonal matrix manipulation and on an iterative procedure. Computations are performed for a wide range of the governing parameters such as magnetic field parameter, power law exponent temperature parameter, and other involved parameters and the effect of these parameters on the velocity and temperature field is presented. It is observed that for different values of the magnetic parameter, the velocity distribution decreases while temperature distribution increases. Besides, the finite difference solutions results for skin-friction coefficient and rate of heat transfer are discussed. This study will have an important bearing on a high targeting efficiency, a high magnetic field is required in the targeted body compartment.

Keywords: biomagnetic fluid, FHD, MHD, nonlinear stretching sheet

Procedia PDF Downloads 161
6452 Analysis on Heat Transfer in Solar Parabolic Trough Collectors

Authors: Zaid H. Yaseen, Jamel A. Orfi, Zeyad A. Alsuhaibani

Abstract:

Solar power has a huge potential to be employed in the fields of electricity production, water desalination, and multi-generation. There are various types of solar collectors, and parabolic trough collectors (PTCs) are common among these types. In PTCs, a mirror is used to direct the incident radiation on an absorber tube to utilize the heat in power generation. In this work, a PTC covered with a glass tube is presented and analyzed. Results showed that temperatures of 510℃ for steam can be reached for certain parameters. The work also showed the viability of using Benzene as the working fluid in the absorber tube. Also, some analysis regarding changing the absorber’s tube diameter and the efficiency of the solar collector was demonstrated in this work. The effect of changing the heat transfer correlations for the convection phenomena of the working fluid was illustrated. In fact, two heat transfer correlations, the Dittus-Boelter and Gnielinski correlations, were used, and the outcomes showed a resemblance in the results for the maximum attainable temperature in the working fluid.

Keywords: absorber tube, glass tube, incident radiation, parabolic trough collector

Procedia PDF Downloads 10
6451 GIS-Driven Analysis for Locating Suitable Areas for Renewable Energy

Authors: Saleh Nabiyev

Abstract:

Renewable energy is becoming increasingly important in today's world due to its significant impact on the green economy, ecology, environment, and climate change. Renewable energy sources, such as solar and wind, are clean and sustainable, making them an ideal solution to reduce carbon emissions and mitigate the effects of climate change. The Karabakh region is located in the South Caucasus and covers an area of approximately 11,500 km². The region has a mountainous terrain, which can affect the availability of wind and solar resources. The Karabakh region has significant wind power potential, particularly in its mountainous areas where wind speeds are typically higher. According to a study conducted by the European Commission Joint Research Centre, the average wind speed in the Karabakh region is between 4 and 6 meters per second (m/s) at a height of 50 meters above ground level (AGL). However, wind speeds can be higher in some areas, reaching up to 10 m/s in some mountainous areas. The region also has significant solar power potential, with an average of 2,000 to 2,200 hours of sunshine per year. The region's high altitude and clear skies make it particularly suitable for the development of solar power projects. In this research, the application of satellite images, solar radiation, wind speed and direction, as well as various other materials to determine suitable areas for alternative energy sources, is investigated. The methodology for selecting suitable locations for solar and wind energy consists of four main parts: identification of factors, evaluation of factors, data preparation, and application of suitability analysis. At the end of the research, the territory of the Kalbajar and Lachin districts is suitable for wind energy. The southern plain part of Karabakh is highly evaluated in terms of solar energy potential, especially Jabrayil district. Generally, outcomes taken from this research are essential data for increasing of rational using natural resources, as well as combating climate change.

Keywords: GIS, remote sensing, suitability analysis, solar energy, wind energy

Procedia PDF Downloads 31
6450 Water Body Detection and Estimation from Landsat Satellite Images Using Deep Learning

Authors: M. Devaki, K. B. Jayanthi

Abstract:

The identification of water bodies from satellite images has recently received a great deal of attention. Different methods have been developed to distinguish water bodies from various satellite images that vary in terms of time and space. Urban water identification issues body manifests in numerous applications with a great deal of certainty. There has been a sharp rise in the usage of satellite images to map natural resources, including urban water bodies and forests, during the past several years. This is because water and forest resources depend on each other so heavily that ongoing monitoring of both is essential to their sustainable management. The relevant elements from satellite pictures have been chosen using a variety of techniques, including machine learning. Then, a convolution neural network (CNN) architecture is created that can identify a superpixel as either one of two classes, one that includes water or doesn't from input data in a complex metropolitan scene. The deep learning technique, CNN, has advanced tremendously in a variety of visual-related tasks. CNN can improve classification performance by reducing the spectral-spatial regularities of the input data and extracting deep features hierarchically from raw pictures. Calculate the water body using the satellite image's resolution. Experimental results demonstrate that the suggested method outperformed conventional approaches in terms of water extraction accuracy from remote-sensing images, with an average overall accuracy of 97%.

Keywords: water body, Deep learning, satellite images, convolution neural network

Procedia PDF Downloads 89
6449 Using Geospatial Analysis to Reconstruct the Thunderstorm Climatology for the Washington DC Metropolitan Region

Authors: Mace Bentley, Zhuojun Duan, Tobias Gerken, Dudley Bonsal, Henry Way, Endre Szakal, Mia Pham, Hunter Donaldson, Chelsea Lang, Hayden Abbott, Leah Wilcynzski

Abstract:

Air pollution has the potential to modify the lifespan and intensity of thunderstorms and the properties of lightning. Using data mining and geovisualization, we investigate how background climate and weather conditions shape variability in urban air pollution and how this, in turn, shapes thunderstorms as measured by the intensity, distribution, and frequency of cloud-to-ground lightning. A spatiotemporal analysis was conducted in order to identify thunderstorms using high-resolution lightning detection network data. Over seven million lightning flashes were used to identify more than 196,000 thunderstorms that occurred between 2006 - 2020 in the Washington, DC Metropolitan Region. Each lightning flash in the dataset was grouped into thunderstorm events by means of a temporal and spatial clustering algorithm. Once the thunderstorm event database was constructed, hourly wind direction, wind speed, and atmospheric thermodynamic data were added to the initiation and dissipation times and locations for the 196,000 identified thunderstorms. Hourly aerosol and air quality data for the thunderstorm initiation times and locations were also incorporated into the dataset. Developing thunderstorm climatologies using a lightning tracking algorithm and lightning detection network data was found to be useful for visualizing the spatial and temporal distribution of urban augmented thunderstorms in the region.

Keywords: lightning, urbanization, thunderstorms, climatology

Procedia PDF Downloads 75
6448 Hydrothermal Synthesis of Carbon Sphere/Nickel Cobalt Sulfide Core/Shell Microstructure and Its Electrochemical Performance

Authors: Charmaine Lamiel, Van Hoa Nguyen, Marjorie Baynosa, Jae-Jin Shim

Abstract:

Electrochemical supercapacitors have attracted considerable attention because of their high potential as an efficient energy storage system. The combination of carbon-based material and transition metal oxides/sulfides are studied because they have long and improved cycle life as well as high energy and power densities. In this study, a hierarchical mesoporous carbon sphere/nickel cobalt sulfide (CS/Ni-Co-S) core/shell structure was synthesized using a facile hydrothermal method without any further sulfurization or post-heat treatment. The CS/Ni-Co-S core/shell microstructures exhibited a high capacitance of 724 F g−1 at 2 A g−1 in a 6 M KOH electrolyte. After 2000 charge-discharge cycles, it retained 86.1% of its original capacitance, with high Coulombic efficiency of 97.9%. The electrode exhibited a high energy density of 58.0 Wh kg−1 at an energy density of 1440 W kg−1, and high power density of 7200 W kg−1 at an energy density of 34.2 Wh kg−1. The successful synthesis was considered to be simple and cost-effective which supports the viability of this composite as an alternative activated material for high performance supercapacitors.

Keywords: carbon sphere, electrochemical, hydrothermal, nickel cobalt sulfide, supercapacitor

Procedia PDF Downloads 303
6447 A Study of the Establishment of the Evaluation Index System for Tourist Attraction Disaster Resilience

Authors: Chung-Hung Tsai, Ya-Ping Li

Abstract:

Tourism industry is highly depended on the natural environment and climate. Compared to other industries, it is more susceptible to environment and climate. Taiwan belongs to a sea island country and located in the subtropical monsoon zone. The events of climate variability, frequency of typhoons and rainfalls raged are caused regularly serious disaster. In traditional disaster assessment, it usually focuses on the disaster damage and risk assessment, which is short of the features from different industries to understand the impact of the restoring force in post-disaster resilience and the main factors that constitute resilience. The object of this study is based on disaster recovery experience of tourism area and to understand the main factors affecting the tourist area of disaster resilience. The combinations of literature review and interviews with experts are prepared an early indicator system of the disaster resilience. Then, it is screened through a Fuzzy Delphi Method and Analytic Network Process for weight analysis. Finally, this study will establish the tourism disaster resilience evaluation index system considering the Taiwan's tourism industry characteristics. We hope that be able to enhance disaster resilience after tourist areas and increases the sustainability of industrial development. It is expected to provide government departments the tourism industry as the future owner of the assets in extreme climates responses.

Keywords: resilience, Fuzzy Delphi Method, Analytic Network Process, industrial development

Procedia PDF Downloads 404
6446 A Framework for Chinese Domain-Specific Distant Supervised Named Entity Recognition

Authors: Qin Long, Li Xiaoge

Abstract:

The Knowledge Graphs have now become a new form of knowledge representation. However, there is no consensus in regard to a plausible and definition of entities and relationships in the domain-specific knowledge graph. Further, in conjunction with several limitations and deficiencies, various domain-specific entities and relationships recognition approaches are far from perfect. Specifically, named entity recognition in Chinese domain is a critical task for the natural language process applications. However, a bottleneck problem with Chinese named entity recognition in new domains is the lack of annotated data. To address this challenge, a domain distant supervised named entity recognition framework is proposed. The framework is divided into two stages: first, the distant supervised corpus is generated based on the entity linking model of graph attention neural network; secondly, the generated corpus is trained as the input of the distant supervised named entity recognition model to train to obtain named entities. The link model is verified in the ccks2019 entity link corpus, and the F1 value is 2% higher than that of the benchmark method. The re-pre-trained BERT language model is added to the benchmark method, and the results show that it is more suitable for distant supervised named entity recognition tasks. Finally, it is applied in the computer field, and the results show that this framework can obtain domain named entities.

Keywords: distant named entity recognition, entity linking, knowledge graph, graph attention neural network

Procedia PDF Downloads 95
6445 Sexual Cognitive Behavioral Therapy: Psychological Performance and Openness to Experience

Authors: Alireza Monzavi Chaleshtari, Mahnaz Aliakbari Dehkordi, Amin Asadi Hieh, Majid Kazemnezhad

Abstract:

This research was conducted with the aim of determining the effectiveness of sexual cognitive behavioral therapy on psychological performance and openness to experience in women. The type of research was experimental in the form of pre-test-post-test. The statistical population of this research was made up of all working and married women with membership in the researcher's Instagram social network who had problems in marital-sexual relationships (N=900). From the statistical community, which includes working and married women who are members of the researcher's Instagram social network who have problems in marital-sexual relationships, there are 30 people including two groups (15 people in the experimental group and 15 people in the control group) as available sampling and selected randomly. They were placed in two experimental and control groups. The anxiety, stress, and depression scale (DASS) and the Costa and McCree personality questionnaire were used to collect data, and the cognitive behavioral therapy protocol of Dr. Mehrnaz Ali Akbari was used for the treatment sessions. To analyze the data, the covariance test was used in the SPSS22 software environment. The results showed that sexual cognitive behavioral therapy has a positive and significant effect on psychological performance and openness to experience in women. Conclusion: It can be concluded that interventions such as cognitive-behavioral sex can be used to treat marital problems.

Keywords: sexual cognitive behavioral therapy, psychological function, openness to experience, women

Procedia PDF Downloads 78
6444 Juridical Protection to Consumers in Electronic Contracts: Need of a Uniform International Law

Authors: Parul Sinha

Abstract:

Electronic commerce facilitates increased choice and information on goods or services for consumers but at the same time it compounds the inequality of bargaining power many consumers face when contracting with sellers. Due to the ‘inequality of bargaining power’ experienced by consumers when contracting by electronic means with business sellers in different jurisdictions, it may be difficult to determine where either the consumer is domiciled or the place where the seller is situated or conducts its business. The question arises in such situation that if one party wants to sue the other, then where can one sue? Which court has jurisdiction to try international conflicts arising from electronic contracts concluded through the internet? Will the same rules applicable to conventional contracts apply? Or should other considerations be taken into account? In all these situations the degree of consumer protection in electronic contracts comes into picture. In the light of the above, the paper discusses the jurisdiction and choice of law rules applied in EU and United States. Further, the paper considers the current uncertainty plaguing questions of jurisdiction in India. Therefore, the jurisdiction and choice of law rules for electronic contracts must be applied consistently and provide an automatic, harmonised rule in favour of the consumer’s jurisdiction and law. Lastly, the paper suggests the need for a uniform law in order to achieve effective juridical protection.

Keywords: electronic commerce, electronic contracts, jurisdiction, consumer protection

Procedia PDF Downloads 250
6443 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques

Authors: Tomas Trainys, Algimantas Venckauskas

Abstract:

Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.

Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.

Procedia PDF Downloads 150
6442 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
6441 Multi-Agent Searching Adaptation Using Levy Flight and Inferential Reasoning

Authors: Sagir M. Yusuf, Chris Baber

Abstract:

In this paper, we describe how to achieve knowledge understanding and prediction (Situation Awareness (SA)) for multiple-agents conducting searching activity using Bayesian inferential reasoning and learning. Bayesian Belief Network was used to monitor agents' knowledge about their environment, and cases are recorded for the network training using expectation-maximisation or gradient descent algorithm. The well trained network will be used for decision making and environmental situation prediction. Forest fire searching by multiple UAVs was the use case. UAVs are tasked to explore a forest and find a fire for urgent actions by the fire wardens. The paper focused on two problems: (i) effective agents’ path planning strategy and (ii) knowledge understanding and prediction (SA). The path planning problem by inspiring animal mode of foraging using Lévy distribution augmented with Bayesian reasoning was fully described in this paper. Results proof that the Lévy flight strategy performs better than the previous fixed-pattern (e.g., parallel sweeps) approaches in terms of energy and time utilisation. We also introduced a waypoint assessment strategy called k-previous waypoints assessment. It improves the performance of the ordinary levy flight by saving agent’s resources and mission time through redundant search avoidance. The agents (UAVs) are to report their mission knowledge at the central server for interpretation and prediction purposes. Bayesian reasoning and learning were used for the SA and results proof effectiveness in different environments scenario in terms of prediction and effective knowledge representation. The prediction accuracy was measured using learning error rate, logarithm loss, and Brier score and the result proves that little agents mission that can be used for prediction within the same or different environment. Finally, we described a situation-based knowledge visualization and prediction technique for heterogeneous multi-UAV mission. While this paper proves linkage of Bayesian reasoning and learning with SA and effective searching strategy, future works is focusing on simplifying the architecture.

Keywords: Levy flight, distributed constraint optimization problem, multi-agent system, multi-robot coordination, autonomous system, swarm intelligence

Procedia PDF Downloads 144
6440 Electrochemical Study of Al-Doped K₂CO₃ Activated Coconut Husk Carbon-Based Composite Anode Material for Battery Applications

Authors: Alpha Matthew

Abstract:

The Composites of Al-Doped K₂CO₃ activated coconut husk carbon, Al₀.₁:(K₂CO₃C)₀.₉ and AI₀.₃:(K₂CO₃C)₀.₇, were prepared using the hydrothermal method and drop casting deposition technique. The electrochemical performance of the Al-doped K₂CO₃ activated coconut husk carbon composite as a promising anode material for lithium-ion batteries was characterised by cyclic voltammetry analysis, electrochemical impedance spectroscopy, and galvanostatic charge discharge analysis. The charges that are retained in the anode material during charging showed a linear decline in charge capacity as the charging current intensity increased. Ionic polarisation was the reason for the observed drop in the charge and discharge capabilities at the current density of 5 A/g. Having greater specific capacitance and energy density, the composite Al₀.₁:(K₂CO₃C)₀.₉ is a better anode material for electrochemical applications compared to AI₀.₃:(K₂CO₃C)₀.₇, also its comparatively higher power density at a scan rate of 5 mV/s is mostly explained by its lower equivalent series resistance.

Keywords: coconut carbon husk, power density, energy density, battery, anode electrode

Procedia PDF Downloads 23