Search results for: asymmetric cascade configuration
1014 Development of a Tilt-Rotor Aircraft Model Using System Identification Technique
Authors: Ferdinando Montemari, Antonio Vitale, Nicola Genito, Giovanni Cuciniello
Abstract:
The introduction of tilt-rotor aircraft into the existing civilian air transportation system will provide beneficial effects due to tilt-rotor capability to combine the characteristics of a helicopter and a fixed-wing aircraft into one vehicle. The disposability of reliable tilt-rotor simulation models supports the development of such vehicle. Indeed, simulation models are required to design automatic control systems that increase safety, reduce pilot's workload and stress, and ensure the optimal aircraft configuration with respect to flight envelope limits, especially during the most critical flight phases such as conversion from helicopter to aircraft mode and vice versa. This article presents a process to build a simplified tilt-rotor simulation model, derived from the analysis of flight data. The model aims to reproduce the complex dynamics of tilt-rotor during the in-flight conversion phase. It uses a set of scheduled linear transfer functions to relate the autopilot reference inputs to the most relevant rigid body state variables. The model also computes information about the rotor flapping dynamics, which are useful to evaluate the aircraft control margin in terms of rotor collective and cyclic commands. The rotor flapping model is derived through a mixed theoretical-empirical approach, which includes physical analytical equations (applicable to helicopter configuration) and parametric corrective functions. The latter are introduced to best fit the actual rotor behavior and balance the differences existing between helicopter and tilt-rotor during flight. Time-domain system identification from flight data is exploited to optimize the model structure and to estimate the model parameters. The presented model-building process was applied to simulated flight data of the ERICA Tilt-Rotor, generated by using a high fidelity simulation model implemented in FlightLab environment. The validation of the obtained model was very satisfying, confirming the validity of the proposed approach.Keywords: flapping dynamics, flight dynamics, system identification, tilt-rotor modeling and simulation
Procedia PDF Downloads 1991013 Investigating Geopolymerization Process of Aluminosilicates and its Impact on the Compressive Strength of the Produced Geopolymers
Authors: Heba Fouad, Tarek M. Madkour, Safwan A. Khedr
Abstract:
This paper investigates multiple factors that impact the formation of geopolymers and their compressive strength to be utilized in construction as an environmentally-friendly material. Bentonite and Kaolinite were thermally calcinated at 750 °C to obtain Metabentonite and Metakaolinite with higher reactivity. Both source materials were activated using a solution of sodium hydroxide (NaOH). Thereafter, samples were cured at different temperatures. The samples were analyzed chemically using a host of spectroscopic techniques. The bulk density and compressive strength of the produced Geopolymer pastes were studied. Findings indicate that the ratio of NaOH solution to source material affects the compressive strength, being optimal at 0.54. Moreover, controlled heat curing was proven effective to improve compressive strength. The existence of characteristic Fourier Transform Infrared Spectroscopy (FTIR) peaks at approximately 1020 cm-1 and 460 cm-1 which corresponds to the asymmetric stretching vibration of Si-O-T and bending vibration of Si-O-Si, hence, confirming the formation of the target geopolymer.Keywords: calcination of metakaolinite, compressive strength, FTIR analysis, geopolymer, green cement
Procedia PDF Downloads 1701012 Four-Electron Auger Process for Hollow Ions
Authors: Shahin A. Abdel-Naby, James P. Colgan, Michael S. Pindzola
Abstract:
A time-dependent close-coupling method is developed to calculate a total, double and triple autoionization rates for hollow atomic ions of four-electron systems. This work was motivated by recent observations of the four-electron Auger process in near K-edge photoionization of C+ ions. The time-dependent close-coupled equations are solved using lattice techniques to obtain a discrete representation of radial wave functions and all operators on a four-dimensional grid with uniform spacing. Initial excited states are obtained by relaxation of the Schrodinger equation in imaginary time using a Schmidt orthogonalization method involving interior subshells. The radial wave function grids are partitioned over the cores on a massively parallel computer, which is essential due to the large memory requirements needed to store the coupled-wave functions and the long run times needed to reach the convergence of the ionization process. Total, double, and triple autoionization rates are obtained by the propagation of the time-dependent close-coupled equations in real-time using integration over bound and continuum single-particle states. These states are generated by matrix diagonalization of one-electron Hamiltonians. The total autoionization rates for each L excited state is found to be slightly above the single autoionization rate for the excited configuration using configuration-average distorted-wave theory. As expected, we find the double and triple autoionization rates to be much smaller than the total autoionization rates. Future work can be extended to study electron-impact triple ionization of atoms or ions. The work was supported in part by grants from the American University of Sharjah and the US Department of Energy. Computational work was carried out at the National Energy Research Scientific Computing Center (NERSC) in Berkeley, California, USA.Keywords: hollow atoms, autoionization, auger rates, time-dependent close-coupling method
Procedia PDF Downloads 1531011 Inviscid Steady Flow Simulation Around a Wing Configuration Using MB_CNS
Authors: Muhammad Umar Kiani, Muhammad Shahbaz, Hassan Akbar
Abstract:
Simulation of a high speed inviscid steady ideal air flow around a 2D/axial-symmetry body was carried out by the use of mb_cns code. mb_cns is a program for the time-integration of the Navier-Stokes equations for two-dimensional compressible flows on a multiple-block structured mesh. The flow geometry may be either planar or axisymmetric and multiply-connected domains can be modeled by patching together several blocks. The main simulation code is accompanied by a set of pre and post-processing programs. The pre-processing programs scriptit and mb_prep start with a short script describing the geometry, initial flow state and boundary conditions and produce a discretized version of the initial flow state. The main flow simulation program (or solver as it is sometimes called) is mb_cns. It takes the files prepared by scriptit and mb_prep, integrates the discrete form of the gas flow equations in time and writes the evolved flow data to a set of output files. This output data may consist of the flow state (over the whole domain) at a number of instants in time. After integration in time, the post-processing programs mb_post and mb_cont can be used to reformat the flow state data and produce GIF or postscript plots of flow quantities such as pressure, temperature and Mach number. The current problem is an example of supersonic inviscid flow. The flow domain for the current problem (strake configuration wing) is discretized by a structured grid and a finite-volume approach is used to discretize the conservation equations. The flow field is recorded as cell-average values at cell centers and explicit time stepping is used to update conserved quantities. MUSCL-type interpolation and one of three flux calculation methods (Riemann solver, AUSMDV flux splitting and the Equilibrium Flux Method, EFM) are used to calculate inviscid fluxes across cell faces.Keywords: steady flow simulation, processing programs, simulation code, inviscid flux
Procedia PDF Downloads 4291010 Social Accountability: Persuasion and Debate to Contain Corruption
Authors: A. Lambert-Mogiliansky
Abstract:
In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.Keywords: accountability, corruption, persuasion, debate
Procedia PDF Downloads 3801009 Disaggregation the Daily Rainfall Dataset into Sub-Daily Resolution in the Temperate Oceanic Climate Region
Authors: Mohammad Bakhshi, Firas Al Janabi
Abstract:
High resolution rain data are very important to fulfill the input of hydrological models. Among models of high-resolution rainfall data generation, the temporal disaggregation was chosen for this study. The paper attempts to generate three different rainfall resolutions (4-hourly, hourly and 10-minutes) from daily for around 20-year record period. The process was done by DiMoN tool which is based on random cascade model and method of fragment. Differences between observed and simulated rain dataset are evaluated with variety of statistical and empirical methods: Kolmogorov-Smirnov test (K-S), usual statistics, and Exceedance probability. The tool worked well at preserving the daily rainfall values in wet days, however, the generated data are cumulated in a shorter time period and made stronger storms. It is demonstrated that the difference between generated and observed cumulative distribution function curve of 4-hourly datasets is passed the K-S test criteria while in hourly and 10-minutes datasets the P-value should be employed to prove that their differences were reasonable. The results are encouraging considering the overestimation of generated high-resolution rainfall data.Keywords: DiMoN Tool, disaggregation, exceedance probability, Kolmogorov-Smirnov test, rainfall
Procedia PDF Downloads 2011008 Optimization of Heterojunction Solar Cell Using AMPS-1D
Authors: Benmoussa Dennai, H. Benslimane, A. Helmaoui
Abstract:
Photo voltaic conversion is the direct conversion of electromagnetic energy into electrical energy continuously. This electromagnetic energy is the most solar radiation. In this work we performed a computer modelling using AMPS 1D optimization of hetero-junction solar cells GaInP/GaAs configuration for p/ n. We studied the influence of the thickness the base layer in the cell offers on the open circuit voltage, the short circuit current and efficiency.Keywords: optimization, photovoltaic cell, GaInP / GaAs AMPS-1D, hetetro-junction
Procedia PDF Downloads 4171007 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography
Authors: Merad Boudia Omar Rafik, Feham Mohammed
Abstract:
Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysisKeywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption
Procedia PDF Downloads 2971006 Matrix-Based Linear Analysis of Switched Reluctance Generator with Optimum Pole Angles Determination
Authors: Walid A. M. Ghoneim, Hamdy A. Ashour, Asmaa E. Abdo
Abstract:
In this paper, linear analysis of a Switched Reluctance Generator (SRG) model is applied on the most common configurations (4/2, 6/4 and 8/6) for both conventional short-pitched and fully-pitched designs, in order to determine the optimum stator/rotor pole angles at which the maximum output voltage is generated per unit excitation current. This study is focused on SRG analysis and design as a proposed solution for renewable energy applications, such as wind energy conversion systems. The world’s potential to develop the renewable energy technologies through dedicated scientific researches was the motive behind this study due to its positive impact on economy and environment. In addition, the problem of rare earth metals (Permanent magnet) caused by mining limitations, banned export by top producers and environment restrictions leads to the unavailability of materials used for rotating machines manufacturing. This challenge gave authors the opportunity to study, analyze and determine the optimum design of the SRG that has the benefit to be free from permanent magnets, rotor windings, with flexible control system and compatible with any application that requires variable-speed operation. In addition, SRG has been proved to be very efficient and reliable in both low-speed or high-speed applications. Linear analysis was performed using MATLAB simulations based on the (Modified generalized matrix approach) of Switched Reluctance Machine (SRM). About 90 different pole angles combinations and excitation patterns were simulated through this study, and the optimum output results for each case were recorded and presented in detail. This procedure has been proved to be applicable for any SRG configuration, dimension and excitation pattern. The delivered results of this study provide evidence for using the 4-phase 8/6 fully pitched SRG as the main optimum configuration for the same machine dimensions at the same angular speed.Keywords: generalized matrix approach, linear analysis, renewable applications, switched reluctance generator
Procedia PDF Downloads 1981005 Bioproducts Market: European Experience and Development Prospects in Georgia
Authors: Tamar Lazariashvili
Abstract:
The paper examines the market of bioproducts in the world and in Georgia. The experience of European countries in the field of production of bioproducts is shown, the level of interest of the population in these products is presented, and the tendency of the demand for them to grow is evaluated. Objectives. The purpose of the research is to identify modern challenges and develop recommendations for development opportunities based on the analysis of the European and local market of organic products. Methodologies. General and specific methods are used in the research process: comparative analysis, induction, deduction. A desk study has been conducted. Findings. It has been revealed that the production of organic products in Georgia is significantly behind the European requirements, in the market of organic products of Georgia there is a formation of a layer of consumers who are in favor of healthy food and are ready to pay a different price. Conclusions. Based on the analysis of the bioproducts market, appropriate recommendations are proposed, namely, the introduction of innovative technologies; financial and legal support by the state; provision of consulting services on the tax system; Elimination of asymmetric information in the market and others.Keywords: bioproducts market, European experience, production of bioproducts, layer of consumers.
Procedia PDF Downloads 681004 Volatility Spillover Among the Stock Markets of South Asian Countries
Authors: Tariq Aziz, Suresh Kumar, Vikesh Kumar, Sheraz Mustafa, Jhanzeb Marwat
Abstract:
The paper provides an updated version of volatility spillover among the equity markets of South Asian countries, including Pakistan, India, Srilanka, and Bangladesh. The analysis uses both symmetric and asymmetric Generalized Autoregressive Conditional Heteroscedasticity models to investigate volatility persistence and leverage effect. The bivariate EGARCH model is used to test for volatility transmission between two equity markets. Weekly data for the period February 2013 to August 2019 is used for empirical analysis. The findings indicate that the leverage effect exists in the equity markets of all the countries except Bangladesh. The volatility spillover from the equity market of Bangladesh to all other countries is negative and significant whereas the volatility of the equity market of Sri-Lanka does influence the volatility of any other country’s equity market. Indian equity market influence only the volatility of the Sri-Lankan equity market; and there is bidirectional volatility spillover between the equity markets of Pakistan and Bangladesh. The findings are important for policy-makers and international investors.Keywords: volatility spillover, volatility persistence, garch, egarch
Procedia PDF Downloads 1391003 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods
Authors: Bandar Alahmadi, Lethia Jackson
Abstract:
Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 3391002 Limit-Cycles Method for the Navigation and Avoidance of Any Form of Obstacles for Mobile Robots in Cluttered Environment
Authors: F. Boufera, F. Debbat
Abstract:
This paper deals with an approach based on limit-cycles method for the problem of obstacle avoidance of mobile robots in unknown environments for any form of obstacles. The purpose of this approach is the improvement of limit-cycles method in order to obtain safe and flexible navigation. The proposed algorithm has been successfully tested in different configuration on simulation.Keywords: mobile robot, navigation, avoidance of obstacles, limit-cycles method
Procedia PDF Downloads 4291001 GPU Based Real-Time Floating Object Detection System
Authors: Jie Yang, Jian-Min Meng
Abstract:
A GPU-based floating object detection scheme is presented in this paper which is designed for floating mine detection tasks. This system uses contrast and motion information to eliminate as many false positives as possible while avoiding false negatives. The GPU computation platform is deployed to allow detecting objects in real-time. From the experimental results, it is shown that with certain configuration, the GPU-based scheme can speed up the computation up to one thousand times compared to the CPU-based scheme.Keywords: object detection, GPU, motion estimation, parallel processing
Procedia PDF Downloads 4741000 Performance Improvement of Long-Reach Optical Access Systems Using Hybrid Optical Amplifiers
Authors: Shreyas Srinivas Rangan, Jurgis Porins
Abstract:
The internet traffic has increased exponentially due to the high demand for data rates by the users, and the constantly increasing metro networks and access networks are focused on improving the maximum transmit distance of the long-reach optical networks. One of the common methods to improve the maximum transmit distance of the long-reach optical networks at the component level is to use broadband optical amplifiers. The Erbium Doped Fiber Amplifier (EDFA) provides high amplification with low noise figure but due to the characteristics of EDFA, its operation is limited to C-band and L-band. In contrast, the Raman amplifier exhibits a wide amplification spectrum, and negative noise figure values can be achieved. To obtain such results, high powered pumping sources are required. Operating Raman amplifiers with such high-powered optical sources may cause fire hazards and it may damage the optical system. In this paper, we implement a hybrid optical amplifier configuration. EDFA and Raman amplifiers are used in this hybrid setup to combine the advantages of both EDFA and Raman amplifiers to improve the reach of the system. Using this setup, we analyze the maximum transmit distance of the network by obtaining a correlation diagram between the length of the single-mode fiber (SMF) and the Bit Error Rate (BER). This hybrid amplifier configuration is implemented in a Wavelength Division Multiplexing (WDM) system with a BER of 10⁻⁹ by using NRZ modulation format, and the gain uniformity noise ratio (signal-to-noise ratio (SNR)), the efficiency of the pumping source, and the optical signal gain efficiency of the amplifier are studied experimentally in a mathematical modelling environment. Numerical simulations were implemented in RSoft OptSim simulation software based on the nonlinear Schrödinger equation using the Split-Step method, the Fourier transform, and the Monte Carlo method for estimating BER.Keywords: Raman amplifier, erbium doped fibre amplifier, bit error rate, hybrid optical amplifiers
Procedia PDF Downloads 70999 Synchronization of Semiconductor Laser Networks
Authors: R. M. López-Gutiérrez, L. Cardoza-Avendaño, H. Cervantes-de Ávila, J. A. Michel-Macarty, C. Cruz-Hernández, A. Arellano-Delgado, R. Carmona-Rodríguez
Abstract:
In this paper, synchronization of multiple chaotic semiconductor lasers is achieved by appealing to complex system theory. In particular, we consider dynamical networks composed by semiconductor laser, as interconnected nodes, where the interaction in the networks are defined by coupling the first state of each node. An interesting case is synchronized with master-slave configuration in star topology. Nodes of these networks are modeled for the laser and simulated by Matlab. These results are applicable to private communication.Keywords: chaotic laser, network, star topology, synchronization
Procedia PDF Downloads 566998 Optimization of Heterojunction Solar Cell Using AMPS-1D
Authors: Benmoussa Dennai, H. Benslimane, A. Helmaoui
Abstract:
Photovoltaic conversion is the direct conversion of electromagnetic energy into electrical energy continuously. This electromagnetic energy is the most solar radiation. In this work we performed a computer modelling using AMPS 1D optimization of hetero-junction solar cells GaInP / GaAs configuration for p / n. We studied the influence of the thickness the base layer in the cell offers on the open circuit voltage, the short circuit current and efficiency.Keywords: optimization, photovoltaic cell, GaInP / GaAs AMPS-1D, hetetro-junction
Procedia PDF Downloads 518997 Research on Contract's Explicit Incentive and Reputation's Implicit Incentive Mechanism towards Construction Contractors
Authors: Li Ma, Meishuang Ma, Mengying Huang
Abstract:
The quality of construction projects reflects the credit and responsibilities of construction contractors for the owners and the whole society. Because the construction contractors master more relevant information about the entrusted engineering project under construction while the owners are in unfavorable position of gaining information, asymmetric information may lead the contractors act against the owners in order to pursue their own interests. Building a powerful motivation mechanism is the key to guarantee investor economic interests and the life and property of users in construction projects. Based on principal-agent theory and game theory, the authors develop relevant mathematical models to analyze and compare the contractor’s utility functions under different combinations of contracts’ explicit incentive mechanism and reputation’s implicit incentive mechanism aiming at finding out the conditions for incentive validity. The research concludes that the most rational motivation way is to combine the explicit and implicit incentive effects of both contracts and reputation mechanism, and puts forth some measures for problems on account of China’s current situation.Keywords: construction contractors, contract, reputation, incentive mechanism
Procedia PDF Downloads 509996 Separating Permanent and Induced Magnetic Signature: A Simple Approach
Authors: O. J. G. Somsen, G. P. M. Wagemakers
Abstract:
Magnetic signature detection provides sensitive detection of metal objects, especially in the natural environment. Our group is developing a tabletop setup for magnetic signatures of various small and model objects. A particular issue is the separation of permanent and induced magnetization. While the latter depends only on the composition and shape of the object, the former also depends on the magnetization history. With common deperming techniques, a significant permanent signature may still remain, which confuses measurements of the induced component. We investigate a basic technique of separating the two. Measurements were done by moving the object along an aluminum rail while the three field components are recorded by a detector attached near the center. This is done first with the rail parallel to the Earth magnetic field and then with anti-parallel orientation. The reversal changes the sign of the induced- but not the permanent magnetization so that the two can be separated. Our preliminary results on a small iron block show excellent reproducibility. A considerable permanent magnetization was indeed present, resulting in a complex asymmetric signature. After separation, a much more symmetric induced signature was obtained that can be studied in detail and compared with theoretical calculations.Keywords: magnetic signature, data analysis, magnetization, deperming techniques
Procedia PDF Downloads 451995 Comparative Analysis of Two Modeling Approaches for Optimizing Plate Heat Exchangers
Authors: Fábio A. S. Mota, Mauro A. S. S. Ravagnani, E. P. Carvalho
Abstract:
In the present paper the design of plate heat exchangers is formulated as an optimization problem considering two mathematical modeling. The number of plates is the objective function to be minimized, considering implicitly some parameters configuration. Screening is the optimization method used to solve the problem. Thermal and hydraulic constraints are verified, not viable solutions are discarded and the method searches for the convergence to the optimum, case it exists. A case study is presented to test the applicability of the developed algorithm. Results show coherency with the literature.Keywords: plate heat exchanger, optimization, modeling, simulation
Procedia PDF Downloads 518994 A Technical Solution for Micro Mixture with Micro Fluidic Oscillator in Chemistry
Authors: Brahim Dennai, Abdelhak Bentaleb, Rachid Khelfaoui, Asma Abdenbi
Abstract:
The diffusion flux given by the Fick’s law characterizethe mixing rate. A passive mixing strategy is proposed to enhance mixing of two fluids through perturbed jet low. A numerical study of passive mixers has been presented. This paper is focused on the modeling of a micro-injection systems composed of passive amplifier without mechanical part. The micro-system modeling is based on geometrical oscillators form. An asymmetric micro-oscillator design based on a monostable fluidic amplifier is proposed. The characteristic size of the channels is generally about a few hundred of microns. The numerical results indicate that the mixing performance can be as high as 99 % within a typical mixing chamber of 0.20 mm diameter inlet and 2.0 mm distance of nozzle - spliter. In addition, the results confirm that self-rotation in the circular mixer significantly enhances the mixing performance. The novel micro mixing method presented in this study provides a simple solution to mixing problems in microsystem for application in chemistry.Keywords: micro oscillator, modeling, micro mixture, diffusion, size effect, chemical equation
Procedia PDF Downloads 430993 The Combined Effect of the Magnetic Field and Ammonium Chlorides on Deposits Zn-Ni Obtained in Different Conditions
Authors: N.Benachour, S. Chouchane, J. P. Chopart
Abstract:
The zinc-nickel deposition on stainless steel substrate was obtained in a chloride bath composed of ZnCl2 (1.8M), NiCl2.6H2O (1.1M), boric acid H3BO3 (1M) and NH4Cl (4M). One configuration was studied the amplitude or field B (0.5 et1T) is parallel to the surface of the working electrodes .the other share the study of various layer was carried out by XRD. The study of the effect of ammonium chloride in combination with the magnetohydrodynamic effect gave several deposits supposedly good physical properties.Keywords: ammonium chloride, magnetic field, nickel-zinc alloys, co-deposition
Procedia PDF Downloads 273992 Condition for Plasma Instability and Stability Approaches
Authors: Ratna Sen
Abstract:
As due to very high temperature of Plasma it is very difficult to confine it for sufficient time so that nuclear fusion reactions to take place, As we know Plasma escapes faster than the binary collision rates. We studied the ball analogy and the ‘energy principle’ and calculated the total potential energy for the whole Plasma. If δ ⃗w is negative, that is decrease in potential energy then the plasma will be unstable. We also discussed different approaches of stability analysis such as Nyquist Method, MHD approximation and Vlasov approach of plasma stability. So that by using magnetic field configurations we can able to create a stable Plasma in Tokamak for generating energy for future generations.Keywords: jello, magnetic field configuration, MHD approximation, energy principle
Procedia PDF Downloads 442991 Random Analysis of Physical and Mechanical Characteristics of Superfine Animal Fibres
Authors: Sepehr Moradi
Abstract:
The physical and mechanical property parameters, inter-relation of key dimensional and distribution profile of raw Australia Superfine Merino Wool (ASFW) and Inner Mongolia Cashmere (IMC) fibres have been studied. The relationship between the properties of these fibres is assessed using fit transformation functions obtained through correlation coefficient analysis. ASFW and IMC fibre properties are found to be both positively skewed and asymmetric in nature. Whilst fibre diameter varies along its length and both ends have a tapering shape. The basic physical features, namely linear density, true local diameter, true length and breaking load are positively correlated while their tenacity is negatively correlated. The tenacity and true length follow a second order polynomial while the true local diameter is linearly correlated. Assessment of the diameter and length is sufficient to estimate the evaluation of quality for commercial grade ASFW and IMC fibres.Keywords: Australia Superfine Merino Wool fibre, Inner Mongolia Cashmere fibre, distribution profile, physical properties
Procedia PDF Downloads 157990 Analysis of Complex Business Negotiations: Contributions from Agency-Theory
Authors: Jan Van Uden
Abstract:
The paper reviews classical agency-theory and its contributions to the analysis of complex business negotiations and gives an approach for the modification of the basic agency-model in order to examine the negotiation specific dimensions of agency-problems. By illustrating fundamental potentials for the modification of agency-theory in context of business negotiations the paper highlights recent empirical research that investigates agent-based negotiations and inter-team constellations. A general theoretical analysis of complex negotiation would be based on a two-level approach. First, the modification of the basic agency-model in order to illustrate the organizational context of business negotiations (i.e., multi-agent issues, common-agencies, multi-period models and the concept of bounded rationality). Second, the application of the modified agency-model on complex business negotiations to identify agency-problems and relating areas of risk in the negotiation process. The paper is placed on the first level of analysis – the modification. The method builds on the one hand on insights from behavior decision research (BRD) and on the other hand on findings from agency-theory as normative directives to the modification of the basic model. Through neoclassical assumptions concerning the fundamental aspects of agency-relationships in business negotiations (i.e., asymmetric information, self-interest, risk preferences and conflict of interests), agency-theory helps to draw solutions on stated worst-case-scenarios taken from the daily negotiation routine. As agency-theory is the only universal approach able to identify trade-offs between certain aspects of economic cooperation, insights obtained provide a deeper understanding of the forces that shape business negotiation complexity. The need for a modification of the basic model is illustrated by highlighting selected issues of business negotiations from agency-theory perspective: Negotiation Teams require a multi-agent approach under the condition that often decision-makers as superior-agents are part of the team. The diversity of competences and decision-making authority is a phenomenon that overrides the assumptions of classical agency-theory and varies greatly in context of certain forms of business negotiations. Further, the basic model is bound to dyadic relationships preceded by the delegation of decision-making authority and builds on a contractual created (vertical) hierarchy. As a result, horizontal dynamics within the negotiation team playing an important role for negotiation success are therefore not considered in the investigation of agency-problems. Also, the trade-off between short-term relationships within the negotiation sphere and the long-term relationships of the corporate sphere calls for a multi-period perspective taking into account the sphere-specific governance-mechanisms already established (i.e., reward and monitoring systems). Within the analysis, the implementation of bounded rationality is closely related to findings from BRD to assess the impact of negotiation behavior on underlying principal-agent-relationships. As empirical findings show, the disclosure and reservation of information to the agent affect his negotiation behavior as well as final negotiation outcomes. Last, in context of business negotiations, asymmetric information is often intended by decision-makers acting as superior-agents or principals which calls for a bilateral risk-approach to agency-relations.Keywords: business negotiations, agency-theory, negotiation analysis, interteam negotiations
Procedia PDF Downloads 139989 A Statistical-Algorithmic Approach for the Design and Evaluation of a Fresnel Solar Concentrator-Receiver System
Authors: Hassan Qandil
Abstract:
Using a statistical algorithm incorporated in MATLAB, four types of non-imaging Fresnel lenses are designed; spot-flat, linear-flat, dome-shaped and semi-cylindrical-shaped. The optimization employs a statistical ray-tracing methodology of the incident light, mainly considering effects of chromatic aberration, varying focal lengths, solar inclination and azimuth angles, lens and receiver apertures, and the optimum number of prism grooves. While adopting an equal-groove-width assumption of the Poly-methyl-methacrylate (PMMA) prisms, the main target is to maximize the ray intensity on the receiver’s aperture and therefore achieving higher values of heat flux. The algorithm outputs prism angles and 2D sketches. 3D drawings are then generated via AutoCAD and linked to COMSOL Multiphysics software to simulate the lenses under solar ray conditions, which provides optical and thermal analysis at both the lens’ and the receiver’s apertures while setting conditions as per the Dallas-TX weather data. Once the lenses’ characterization is finalized, receivers are designed based on its optimized aperture size. Several cavity shapes; including triangular, arc-shaped and trapezoidal, are tested while coupled with a variety of receiver materials, working fluids, heat transfer mechanisms, and enclosure designs. A vacuum-reflective enclosure is also simulated for an enhanced thermal absorption efficiency. Each receiver type is simulated via COMSOL while coupled with the optimized lens. A lab-scale prototype for the optimum lens-receiver configuration is then fabricated for experimental evaluation. Application-based testing is also performed for the selected configuration, including that of a photovoltaic-thermal cogeneration system and solar furnace system. Finally, some future research work is pointed out, including the coupling of the collector-receiver system with an end-user power generator, and the use of a multi-layered genetic algorithm for comparative studies.Keywords: COMSOL, concentrator, energy, fresnel, optics, renewable, solar
Procedia PDF Downloads 155988 Open Source Cloud Managed Enterprise WiFi
Authors: James Skon, Irina Beshentseva, Michelle Polak
Abstract:
Wifi solutions come in two major classes. Small Office/Home Office (SOHO) WiFi, characterized by inexpensive WiFi routers, with one or two service set identifiers (SSIDs), and a single shared passphrase. These access points provide no significant user management or monitoring, and no aggregation of monitoring and control for multiple routers. The other solution class is managed enterprise WiFi solutions, which involve expensive Access Points (APs), along with (also costly) local or cloud based management components. These solutions typically provide portal based login, per user virtual local area networks (VLANs), and sophisticated monitoring and control across a large group of APs. The cost for deploying and managing such managed enterprise solutions is typically about 10 fold that of inexpensive consumer APs. Low revenue organizations, such as schools, non-profits, non-government organizations (NGO's), small businesses, and even homes cannot easily afford quality enterprise WiFi solutions, though they may need to provide quality WiFi access to their population. Using available lower cost Wifi solutions can significantly reduce their ability to provide reliable, secure network access. This project explored and created a new approach for providing secured managed enterprise WiFi based on low cost hardware combined with both new and existing (but modified) open source software. The solution provides a cloud based management interface which allows organizations to aggregate the configuration and management of small, medium and large WiFi solutions. It utilizes a novel approach for user management, giving each user a unique passphrase. It provides unlimited SSID's across an unlimited number of WiFI zones, and the ability to place each user (and all their devices) on their own VLAN. With proper configuration it can even provide user local services. It also allows for users' usage and quality of service to be monitored, and for users to be added, enabled, and disabled at will. As inferred above, the ultimate goal is to free organizations with limited resources from the expense of a commercial enterprise WiFi, while providing them with most of the qualities of such a more expensive managed solution at a fraction of the cost.Keywords: wifi, enterprise, cloud, managed
Procedia PDF Downloads 97987 A Comparative Study of a Defective Superconductor/ Semiconductor-Dielectric Photonic Crystal
Authors: S. Sadegzadeh, A. Mousavi
Abstract:
Temperature-dependent tunable photonic crystals have attracted widespread interest in recent years. In this research, transmission characteristics of a one-dimensional photonic crystal structure with a single defect have been studied. Here, we assume two different defect layers: InSb as a semiconducting layer and HgBa2Ca2Cu3O10 as a high-temperature superconducting layer. Both the defect layers have temperature-dependent refractive indexes. Two different types of dielectric materials (Si as a high-refractive index dielectric and MgF2 as a low-refractive index dielectric) are used to construct the asymmetric structures (Si/MgF2)NInSb(Si/MgF2)N named S.I, and (Si/MgF2)NHgBa2Ca2Cu3O10(Si/MgF2)N named S.II. It is found that in response to the temperature changes, transmission peaks within the photonic band gap of the S.II structure, in contrast to S.I, show a small wavelength shift. Furthermore, the results show that under the same conditions, S.I structure generates an extra defect mode in the transmission spectra. Besides high efficiency transmission property of S.II structure, it can be concluded that the semiconductor-dielectric photonic crystals are more sensitive to temperature variation than superconductor types.Keywords: defect modes, photonic crystals, semiconductor, superconductor, transmission
Procedia PDF Downloads 292986 Thermal Analysis of a Channel Partially Filled with Porous Media Using Asymmetric Boundary Conditions and LTNE Model
Authors: Mohsen Torabi, Kaili Zhang
Abstract:
This work considers forced convection in a channel partially filled with porous media from local thermal non-equilibrium (LTNE) point of view. The channel is heated with constant heat flux from the lower side and is isolated on the top side. The wall heat flux is considered to be divided between the solid and fluid phases based on their temperature gradients and effective thermal conductivities. The general forms of the velocity and temperature fields are analytically obtained. To obtain the constant parameters for temperature equations, a numerical solution is considered. Using different thermophysical parameters, both velocity and temperature fields are comprehensively illustrated. Discussions regarding bifurcation phenomenon are provided. Since this geometry has not been considered yet, the present analysis is a useful addition to the literature on thermal performance of porous systems from LTNE perspective.Keywords: local thermal non-equilibrium, forced convection, thermal bifurcation, porous-fluid interface, combined analytical-numerical solution
Procedia PDF Downloads 365985 Hydraulic Resources Management under Imperfect Competition with Thermal Plants in the Wholesale Electricity Market
Authors: Abdessalem Abbassi, Ahlem Dakhlaoui, Lota D. Tamini
Abstract:
In this paper, we analyze infinite discrete-time games between hydraulic and thermal power operators in the wholesale electricity market under Cournot competition. We consider a deregulated electrical industry where certain demand is satisfied by hydraulic and thermal technologies. The hydraulic operator decides the production in each season of each period that maximizes the sum of expected profits from power generation with respect to the stochastic dynamic constraint on the water stored in the dam, the environmental constraint and the non-negative output constraint. In contrast, the thermal plant is operated with quadratic cost function, with respect to the capacity production constraint and the non-negativity output constraint. We show that under imperfect competition, the hydraulic operator has a strategic storage of water in the peak season. Then, we quantify the strategic inter-annual and intra-annual water transfer and compare the numerical results. Finally, we show that the thermal operator can restrict the hydraulic output without compensation.Keywords: asymmetric risk aversion, electricity wholesale market, hydropower dams, imperfect competition
Procedia PDF Downloads 359