Search results for: code source certification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6024

Search results for: code source certification

5604 An Investigation of the Mystic Term on 'The Conference of the Birds' of Attar on the Basis of Van Doorslaer's Map

Authors: Saber Noie

Abstract:

This research follows some objectives to consider the mystic terms as one of the main issues in translation of poems. Firstly, it is an attempt to find out what strategies have been used to find equivalents for source text mystic. Second, it is hoped that this study of the translations of the mystic terms in Attar’s poems will further address and explore the problems in translating mystic texts, proposed by other Persian poets and suggest instructional points from Davis work for translation education. In order to deal with such a breadth of work, a new conceptual tool was developed, as explained by Van Doorslaer (2007). This study shows that according to Van Doorslaer’s map, the mystic terms can be transferred to the target language (TL) with their exact content of the source language (SL) if the translator has a good choice for any term.

Keywords: metaphor, mystic, mysticism, source language (SL), target language (TL)

Procedia PDF Downloads 252
5603 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 265
5602 Investigation on Biomass as an Alternate Source for Power Generation

Authors: Narsimhulu Sanke, D. N. Reddy

Abstract:

The purpose of the paper is to discuss the biomass as a renewable source of energy for power generation. The setup is designed and fabricated in the Centre for Energy Technology (CET) and four different fuels are tested in the laboratory, but here the focus is on wood blocks (fuel) combustion with temperature, gas composition percentage by volume and the heating values.

Keywords: biomass, downdraft gasifier, power generation, renewable energy sources

Procedia PDF Downloads 538
5601 An Analysis of L1 Effects on the Learning of EFL: A Case Study of Undergraduate EFL Learners at Universities in Pakistan

Authors: Nadir Ali Mugheri, Shaukat Ali Lohar

Abstract:

In a multilingual society like Pakistan, code switching is commonly observed in different contexts. Mostly people use L1 (Native Languages) and L2 for common communications and L3 (i.e. English, Urdu, Sindhi) in formal contexts and for academic writings. Such a frequent code switching does affect EFL learners' acquisition of grammar and lexis of the target language which in the long run result in different types of errors in their writings. The current study is to investigate and identify common elements of L1 and L2 (spoken by students of the Universities in Pakistan) which create hindrances for EFL learners. Case study method was used for this research. Formal writings of 400 EFL learners (as participants from various Universities of the country) were observed. Among 400 participants, 200 were female and 200 were male EFL learners having different academic backgrounds. Errors found were categorized into different types according to grammatical items, the difference in meanings, structure of sentences and identifiers of tenses of L1 or L2 in comparison with those of the target language. The findings showed that EFL learners in Pakistani varsities have serious problems in their writings and they committed serious errors related to the grammar and meanings of the target language. After analysis of the committed errors, the results were found in the affirmation of the hypothesis that L1 or L2 does affect EFL learners. The research suggests in the end to adopt natural ways in pedagogy like task-based learning or communicative methods using contextualized material so as to avoid impediments of L1 or L2 in acquisition the target language.

Keywords: multilingualism, L2 acquisition, code switching, language acquisition, communicative language teaching

Procedia PDF Downloads 284
5600 Design, Development by Functional Analysis in UML and Static Test of a Multimedia Voice and Video Communication Platform on IP for a Use Adapted to the Context of Local Businesses in Lubumbashi

Authors: Blaise Fyama, Elie Museng, Grace Mukoma

Abstract:

In this article we present a java implementation of video telephony using the SIP protocol (Session Initiation Protocol). After a functional analysis of the SIP protocol, we relied on the work of Italian researchers of University of Parma-Italy to acquire adequate libraries for the development of our own communication tool. In order to optimize the code and improve the prototype, we used, in an incremental approach, test techniques based on a static analysis based on the evaluation of the complexity of the software with the application of metrics and the number cyclomatic of Mccabe. The objective is to promote the emergence of local start-ups producing IP video in a well understood local context. We have arrived at the creation of a video telephony tool whose code is optimized.

Keywords: static analysis, coding complexity metric mccabe, Sip, uml

Procedia PDF Downloads 115
5599 Seismic Performance of Concrete Moment Resisting Frames in Western Canada

Authors: Ali Naghshineh, Ashutosh Bagchi

Abstract:

Performance-based seismic design concepts are increasingly being adopted in various jurisdictions. While the National Building Code of Canada (NBCC) is not fully performance-based, it provides some features of a performance-based code, such as displacement control and objective-based solutions. Performance evaluation is an important part of a performance-based design. In this paper, the seismic performance of a set of code-designed 4, 8 and 12 story moment resisting concrete frames located in Victoria, BC, in the western part of Canada at different hazard levels namely, SLE (Service Level Event), DLE (Design Level Event) and MCE (Maximum Considered Event) has been studied. The seismic performance of these buildings has been evaluated based on FEMA 356 and ATC 72 procedures, and the nonlinear time history analysis. Pushover analysis has been used to investigate the different performance levels of these buildings and adjust their design based on the corresponding target displacements. Since pushover analysis ignores the higher mode effects, nonlinear dynamic time history using a set of ground motion records has been performed. Different types of ground motion records, such as crustal and subduction earthquake records have been used for the dynamic analysis to determine their effects. Results obtained from push over analysis on inter-story drift, displacement, shear and overturning moment are compared to those from the dynamic analysis.

Keywords: seismic performance., performance-based design, concrete moment resisting frame, crustal earthquakes, subduction earthquakes

Procedia PDF Downloads 261
5598 Fast Algorithm to Determine Initial Tsunami Wave Shape at Source

Authors: Alexander P. Vazhenin, Mikhail M. Lavrentiev, Alexey A. Romanenko, Pavel V. Tatarintsev

Abstract:

One of the problems obstructing effective tsunami modelling is the lack of information about initial wave shape at source. The existing methods; geological, sea radars, satellite images, contain an important part of uncertainty. Therefore, direct measurement of tsunami waves obtained at the deep water bottom peruse recorders is also used. In this paper we propose a new method to reconstruct the initial sea surface displacement at tsunami source by the measured signal (marigram) approximation with the help of linear combination of synthetic marigrams from the selected set of unit sources, calculated in advance. This method has demonstrated good precision and very high performance. The mathematical model and results of numerical tests are here described.

Keywords: numerical tests, orthogonal decomposition, Tsunami Initial Sea Surface Displacement

Procedia PDF Downloads 465
5597 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 48
5596 Probabilistic Safety Assessment of Koeberg Spent Fuel Pool

Authors: Sibongiseni Thabethe, Ian Korir

Abstract:

The effective management of spent fuel pool (SFP) safety has been raised as one of the emerging issues to further enhance nuclear installation safety after the Fukushima accident on March 11, 2011. Before then, SFP safety-related issues have been mainly focused on (a) controlling the configuration of the fuel assemblies in the pool with no loss of pool coolants and (b) ensuring adequate pool storage space to prevent fuel criticality owing to chain reactions of the fission products and the ability for neutron absorption to keep the fuel cool. A probabilistic safety (PSA) assessment was performed using the systems analysis program for hands-on integrated reliability evaluations (SAPHIRE) computer code. Event and fault tree analysis was done to develop a PSA model for the Koeberg SFP. We present preliminary PSA results of events that lead to boiling and cause fuel uncovering, resulting in possible fuel damage in the Koeberg SFP.

Keywords: computer code, fuel assemblies, probabilistic risk assessment, spent fuel pool

Procedia PDF Downloads 166
5595 Post Occupancy Evaluation of the Green Office Building with Different Air-Conditioning Systems

Authors: Ziwei Huang, Jian Ge, Jie Shen, Jiantao Weng

Abstract:

Retrofitting of existing buildings plays a critical role to achieve sustainable development. This is being considered as one of the approaches to achieving sustainability in the built environment. In order to evaluate the different air-conditioning systems effectiveness and user satisfaction of the existing building which had transformed into green building effectively and accurately. This article takes the green office building in Zhejiang province, China as an example, analyzing the energy consumption, occupant satisfaction and indoor environment quality (IEQ) from the perspective of the thermal environment. This building is special because it combines ground source heat pump system and Variable Refrigerant Flow (VRF) air-conditioning system. Results showed that the ground source heat pump system(EUIa≈25.6) consumes more energy than VRF(EUIb≈23.8). In terms of a satisfaction survey, the use of the VRF air-conditioning was more satisfactory in temperature. However, the ground source heat pump is more satisfied in air quality.

Keywords: post-occupancy evaluation, green office building, air-conditioning systems, ground source heat pump system

Procedia PDF Downloads 193
5594 The Confiscation of Ill-Gotten Gains in Pollution: The Taiwan Experience and the Interaction between Economic Analysis of Law and Environmental Economics Perspectives

Authors: Chiang-Lead Woo

Abstract:

In reply to serious environmental problems, the Taiwan government quickly adjusted some articles to suit the needs of environmental protection recently, such as the amendment to article 190-1 of the Taiwan Criminal Code. The transfer of legislation comes as an improvement which canceled the limitation of ‘endangering public safety’. At the same time, the article 190-1 goes from accumulative concrete offense to abstract crime of danger. Thus, the public looks forward to whether environmental crime following the imposition of fines or penalties works efficiently in anti-pollution by the deterrent effects. However, according to the addition to article 38-2 of the Taiwan Criminal Code, the confiscation system seems controversial legislation to restrain ill-gotten gains. Most prior studies focused on comparisons with the Administrative Penalty Law and the Criminal Code in environmental issue in Taiwan; recently, more and more studies emphasize calculations on ill-gotten gains. Hence, this paper try to examine the deterrent effect in environmental crime by economic analysis of law and environmental economics perspective. This analysis shows that only if there is an extremely high probability (equal to 100 percent) of an environmental crime case being prosecuted criminally by Taiwan Environmental Protection Agency, the deterrent effects will work. Therefore, this paper suggests deliberating the confiscation system from supplementing the System of Environmental and Economic Accounting, reasonable deterrent fines, input management, real-time system for detection of pollution, and whistleblower system, environmental education, and modernization of law.

Keywords: confiscation, ecosystem services, environmental crime, ill-gotten gains, the deterrent effect, the system of environmental and economic accounting

Procedia PDF Downloads 165
5593 Numerical Study of Natural Convection of a Localized Heat Source at the up of a Nanofluid-Filled Enclosure

Authors: Marziyeh Heydari, Hossein Shokouhmand

Abstract:

This article presents a numerical study of natural convection of a heat source embedded on the up wall of an enclosure filled with nanofluid. The bottom and vertical walls of the enclosure are maintained at a relatively low temperature. The type of nanofluid and solid volume fraction of nanoparticle on the heat transfer performance is studied. The results indicated that adding nanoparticle into pure paraffin improves heat transfer. The results are presented over a wide range of Rayleigh numbers(Ra=〖10〗^3 〖-10〗^5), the volume fraction of nanoparticles (0≤ɸ≤0.4%). For an enclosure, the Nusselt number of a cu-paraffin nanofluid was reduced by increasing the volume fraction of nanoparticles above 0.2%.

Keywords: nanofluid, heat transfer, heat source, enclosure

Procedia PDF Downloads 309
5592 A Parallel Approach for 3D-Variational Data Assimilation on GPUs in Ocean Circulation Models

Authors: Rossella Arcucci, Luisa D'Amore, Simone Celestino, Giuseppe Scotti, Giuliano Laccetti

Abstract:

This work is the first dowel in a rather wide research activity in collaboration with Euro Mediterranean Center for Climate Changes, aimed at introducing scalable approaches in Ocean Circulation Models. We discuss designing and implementation of a parallel algorithm for solving the Variational Data Assimilation (DA) problem on Graphics Processing Units (GPUs). The algorithm is based on the fully scalable 3DVar DA model, previously proposed by the authors, which uses a Domain Decomposition approach (we refer to this model as the DD-DA model). We proceed with an incremental porting process consisting of 3 distinct stages: requirements and source code analysis, incremental development of CUDA kernels, testing and optimization. Experiments confirm the theoretic performance analysis based on the so-called scale up factor demonstrating that the DD-DA model can be suitably mapped on GPU architectures.

Keywords: data assimilation, GPU architectures, ocean models, parallel algorithm

Procedia PDF Downloads 406
5591 A Quasi Z-Source Based Full Bridge Isolated DC-DC Converter as a Power Module for PV System Connected to HVDC Grid

Authors: Xinke Huang, Huan Wang, Lidong Guo, Changbin Ju, Runbiao Liu, Guoen Cao, Yibo Wang, Honghua Xu

Abstract:

Grid connected photovoltaic (PV) power system is to be developed in the direction of large-scale, clustering. Large-scale PV generation systems connected to HVDC grid have many advantages compared to its counterpart of AC grid, and DC connection is the tendency. DC/DC converter as the most important device in the system, has become one of the hot spots recently. The paper proposes a Quasi Z-Source(QZS) based Boost Full Bridge Isolated DC/DC Converter(BFBIC) topology as a basis power module and combination through input parallel output series(IPOS) method to improve power capacity and output voltage to match with the HVDC grid. The topology has both traditional voltage source and current source advantages, it permit the H-bridge short through and open circuit, which adopt utility duty cycle control and achieved input current and output voltage balancing through input current sharing control strategy. A ±10kV/200kW system model is built in MATLAB/SIMULINK to verify the proposed topology and control strategy.

Keywords: PV Generation System, Cascaded DC/DC converter, HVDC, Quasi Z Source Converter

Procedia PDF Downloads 389
5590 Study of a Photovoltaic System Using MPPT Buck-Boost Converter

Authors: A. Bouchakour, L. Zaghba, M. Brahami, A. Borni

Abstract:

The work presented in this paper present the design and the simulation of a centrifugal pump coupled to a photovoltaic (PV) generator via a MPPT controller. The PV system operating is just done in sunny period by using water storage instead of electric energy storage. The process concerns the modelling, identification and simulation of a photovoltaic pumping system, the centrifugal pump is driven by an asynchronous three-phase voltage inverter sine triangle PWM motor through. Two configurations were simulated. For the first, it is about the alimentation of the motor pump group from electrical power supply. For the second, the pump unit is connected directly to the photovoltaic panels by integration of a MPPT control. A code of simulation of the solar pumping system was initiated under the Matlab-Simulink environment. Very convivial and flexible graphic interfaces allow an easy use of the code and knowledge of the effects of change of the sunning and temperature on the pumping system.

Keywords: photovoltaic generator, chopper, electrical motor, centrifugal pump

Procedia PDF Downloads 373
5589 Forecasting Materials Demand from Multi-Source Ordering

Authors: Hui Hsin Huang

Abstract:

The downstream manufactures will order their materials from different upstream suppliers to maintain a certain level of the demand. This paper proposes a bivariate model to portray this phenomenon of material demand. We use empirical data to estimate the parameters of model and evaluate the RMSD of model calibration. The results show that the model has better fitness.

Keywords: recency, ordering time, materials demand quantity, multi-source ordering

Procedia PDF Downloads 530
5588 Intelligent Software Architecture and Automatic Re-Architecting Based on Machine Learning

Authors: Gebremeskel Hagos Gebremedhin, Feng Chong, Heyan Huang

Abstract:

Software system is the combination of architecture and organized components to accomplish a specific function or set of functions. A good software architecture facilitates application system development, promotes achievement of functional requirements, and supports system reconfiguration. We describe three studies demonstrating the utility of our architecture in the subdomain of mobile office robots and identify software engineering principles embodied in the architecture. The main aim of this paper is to analyze prove architecture design and automatic re-architecting using machine learning. Intelligence software architecture and automatic re-architecting process is reorganizing in to more suitable one of the software organizational structure system using the user access dataset for creating relationship among the components of the system. The 3-step approach of data mining was used to analyze effective recovery, transformation and implantation with the use of clustering algorithm. Therefore, automatic re-architecting without changing the source code is possible to solve the software complexity problem and system software reuse.

Keywords: intelligence, software architecture, re-architecting, software reuse, High level design

Procedia PDF Downloads 114
5587 Authentication of Physical Objects with Dot-Based 2D Code

Authors: Michał Glet, Kamil Kaczyński

Abstract:

Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.

Keywords: anti-forgery, authentication, paper documents, security

Procedia PDF Downloads 128
5586 Turbulence Modeling of Source and Sink Flows

Authors: Israt Jahan Eshita

Abstract:

Flows developed between two parallel disks have many engineering applications. Two types of non-swirling flows can be generated in such a domain. One is purely source flow in disc type domain (outward flow). Other is purely sink flow in disc type domain (inward flow). This situation often appears in some turbo machinery components such as air bearings, heat exchanger, radial diffuser, vortex gyroscope, disc valves, and viscosity meters. The main goal of this paper is to show the mesh convergence, because mesh convergence saves time, and economical to run and increase the efficiency of modeling for both sink and source flow. Then flow field is resolved using a very fine mesh near-wall, using enhanced wall treatment. After that we are going to compare this flow using standard k-epsilon, RNG k-epsilon turbulence models. Lastly compare some experimental data with numerical solution for sink flow. The good agreement of numerical solution with the experimental works validates the current modeling.

Keywords: hydraulic diameter, k-epsilon model, meshes convergence, Reynolds number, RNG model, sink flow, source flow, wall y+

Procedia PDF Downloads 534
5585 Use of Acid Mine Drainage as a Source of Iron to Initiate the Solar Photo-Fenton Treatment of Municipal Wastewater: Circular Economy Effect

Authors: Tooba Aslam, Efthalia Chatzisymeon

Abstract:

Untreated Municipal Wastewater (MWW) is renowned as the utmost harmful pollution caused to environmental water due to the high presence of nutrients and organic contaminants. Removal of Chemical Oxygen Demand (COD) from synthetic as well as municipal wastewater is investigated by using acid mine drainage as a source of iron to initiate the solar photo-Fenton treatment of municipal wastewater. In this study, Acid Mine Drainage (AMD) and different minerals enriched in iron, such as goethite, hematite, magnetite, and magnesite, have been used as the source of iron to initiate the photo-Fenton process. Co-treatment of real municipal wastewater and acid mine drainage /minerals is widely examined. The effects of different parameters such as minerals recovery from AMD, AMD as a source of iron, H₂O₂ concentration, and COD concentrations on the COD percentage removal of the process are studied. The results show that, out of all the four minerals, only hematite (1g/L) could remove 30% of the pollutants at about 100 minutes and 1000 ppm of H₂O₂. The addition of AMD as a source of iron is performed and compared with both synthetic as well as real wastewater from South Africa under the same conditions, i.e., 1000 ppm of H₂O₂, ambient temperature, 2.8 pH, and solar simulator. In the case of synthetic wastewater, the maximum removal (56%) is achieved with 50 ppm of iron (AMD source) at 160 minutes. On the other hand, in real wastewater, the removal efficiency is 99% with 30 ppm of iron at 90 minutes and 96% with 50 ppm of iron at 120 minutes. In conclusion, overall, the co-treatment of AMD and MWW by solar photo-Fenton treatment appears to be an effective and promising method to remove organic materials from Municipal wastewater.

Keywords: municipal wastewater treatment, acid mine drainage, co-treatment, COD removal, solar photo-Fenton, circular economy

Procedia PDF Downloads 85
5584 Influence of Flame-Holder on Existence Important Parameters in a Duct Combustion Simulator

Authors: Mohammad Mahdi Doustdar, Mohammad Mojtahedpoor

Abstract:

The effects of flame-holder position, the ratio of flame holder diameter to combustion chamber diameter and injection angle on fuel propulsive droplets sizing and effective mass fraction have been studied by a cold flow. We named the mass of fuel vapor inside the flammability limit as the effective mass fraction. An empty cylinder as well as a flame-holder which are as a simulator for duct combustion has been considered. The airflow comes into the cylinder from one side and injection operation will be done by four nozzles which are located on the entrance of cylinder. To fulfill the calculations a modified version of KIVA-3V code which is a transient, three-dimensional, multi phase, multi component code for the analysis of chemically reacting flows with sprays, is used.

Keywords: KIVA-3V, flame-holder, duct combustion, effective mass fraction, mean diameter of droplets

Procedia PDF Downloads 615
5583 Seismicity and Source Parameter of Some Events in Abu Dabbab Area, Red Sea Coast

Authors: Hamed Mohamed Haggag

Abstract:

Prior to 12 November 1955, no earthquakes have been reported from the Abu Dabbab area in the International Seismological Center catalogue (ISC). The largest earthquake in Abu Dabbab area occurred on November 12, 1955 with magnitude Mb 6.0. The closest station from the epicenter was at Helwan (about 700 km to the north), so the depth of this event is not constrained and no foreshocks or aftershocks were recorded. Two other earthquakes of magnitude Mb 4.5 and 5.2 took place in the same area on March 02, 1982 and July 02, 1984, respectively. Since the installation of Aswan Seismic Network stations in 1982, (250-300 km to the south-west of Abu Dabbab area) then the Egyptian Natoinal Seismic Network stations, it was possible to record some activity from Abu Dabbab area. The recorded earthquakes at Abu Dabbab area as recorded from 1982 to 2014 shows that the earthquake epicenters are distributed in the same direction of the main trends of the faults in the area, which is parallel to the Red Sea coast. The spectral analysis was made for some earthquakes. The source parameters, seismic moment (Mo), source dimension (r), stress drop (Δδ), and apparent stress (δ) are determined for these events. The spectral analysis technique was completed using MAG software program.

Keywords: Abu Dabbab, seismicity, seismic moment, source parameter

Procedia PDF Downloads 455
5582 The Resistance Reader Program Based on Image Processing

Authors: Janpen Srijan, Nahathai Tanmang, Thanit Purathanang, Anun Dowchern, Saksit Summart, Seangduan Kampimpa

Abstract:

This paper presents the resistance reader program based on image processing by using MATLAB. The proposed program is divided into six parts; the first part is the web camera; the second part is a watt selection before shooting the resistor; the third part is a part of finding the position of the color on the mid-point of resistor; the fourth part is a part of identifying color code of the resistor; the fifth part is a part of taking the number of values for each color for resistance calculation and the last part is a part of displaying result of resistance value. The experimental result of the resistance reader program based on image processing was able to display the resistance value of resistor. The accuracy of proposed program is 85 percent for 1 watt resistor. It has 15 percent of reading error because a problem with the color code of some resistor was too bright.

Keywords: resistance reader program, image processing, resistor, MATLAB

Procedia PDF Downloads 379
5581 Torsional Design Method of Asymmetric and Irregular Building under Horizontal Earthquake Action

Authors: Radhwane Boudjelthia

Abstract:

Based upon elaborate analysis on torsional design methods of asymmetric and irregular structure under horizontal earthquake action, it points out that the main design principles of an asymmetric building subjected to horizontal earthquake are: the torsion of vertical members induced by the torsion angle of the floor (rigid diaphragm) cannot exceed the allowable value, the inter-story displacement at outermost frame or shear wall should be less than that required by design code, stresses in plane of the slab should be controlled within acceptable extent under different intensity earthquakes. That current seismic design code only utilizes the torsion displacement ratio to control the floor torsion, which seems not reasonable enough since its connotation is the multiple of the floor torsion angle and the distance of floor mass center to the edge frame or shear wall.

Keywords: earthquake, building, seismic forces, displacement, resonance, response

Procedia PDF Downloads 343
5580 Factor Influencing the Certification to ISO 9000:2008 among SME in Malaysia

Authors: Dolhadi Bin Zainudin

Abstract:

The study attempts to predict the relationship between influencing factors in the adoption of ISO 9000:2008 and to identify which how these factors play the main role in achieving ISO 9000 standard. A survey using structured questionnaire was employed. A total of 255 respondents from 255 small and medium enterprises participated in this study. With regards to influencing factors, a discriminant analysis was conducted and the results showed that three out of nine critical success factors is statistically significant between ISO 9000:2008 and non-ISO 9000 certified companies which are communication for quality, information and analysis and organizational culture.

Keywords: ISO 9000, quality management, factors, small and medium enterprise, Malaysia, influencing factors

Procedia PDF Downloads 333
5579 Effects of Viscous Dissipation and Concentration Based Internal Heat Source on Convective Instability in A Porous Medium with Throughflow

Authors: N. Deepika, P. A. L. Narayana

Abstract:

Linear stability analysis of double diffusive convection in a horizontal porous layer saturated with fluid is examined by considering the effects of viscous dissipation, concentration based internal heat source and vertical throughflow. The basic steady state solution for Governing equations is computed. Linear stability analysis has been implemented numerically by using Runge-kutta method. Critical thermal Rayleigh number Rac is obtained for various values of solutal Rayleigh number Sa, vertical Peclet number Pe, Gebhart number Ge, Lewis number Le and measure of concentration based internal heat source $\gamma$. It is observed that Ge has destabilizing effect for upward throughflow and stabilizing effect for downward throughflow. For sufficient value of Pe, $\gamma$ has considerable destabilizing effect for upward throughflow, insignificant destabilizing effect for downward throughflow.

Keywords: porous medium, concentration based internal heat source, vertical throughflow, viscous dissipation

Procedia PDF Downloads 456
5578 Analysis of Spectral Radiative Entropy Generation in a Non-Gray Participating Medium with Heat Source (Furnaces)

Authors: Asadollah Bahrami

Abstract:

In the present study, spectral radiative entropy generation is analyzed in a furnace filled with a mixture of H₂O, CO₂ and soot at radiative equilibrium. For the angular and spatial discretization of the radiative transfer equation and radiative entropy generation equations, the discrete ordinates method and the finite volume method are used, respectively. Spectral radiative properties are obtained using the correlated-k (CK) non-gray model with updated parameters based on the HITEMP2010 high-resolution database. In order to evaluate the effects of the location of the heat source, boundary condition and wall emissivity on radiative entropy generation, five cases are considered with different conditions. The spectral and total radiative entropy generation in the system are calculated for all cases and the effects of mentioned parameters on radiative entropy generation are attentively analyzed and finally, the optimum condition is especially presented. The most important results can be stated as follows: Results demonstrate that the wall emissivity has a considerable effect on the radiative entropy generation. Also, irreversible radiative transfer at the wall with lower temperatures is the main source of radiative entropy generation in the furnaces. In addition, the effect of the location of the heat source on total radiative entropy generation is less than other factors. Eventually, it can be said that characterizing the effective parameters of radiative entropy generation provides an approach to minimizing the radiative entropy generation and enhancing the furnace's performance practicality.

Keywords: spectral radiative entropy generation, non-gray medium, correlated k(CK) model, heat source

Procedia PDF Downloads 95
5577 Accounting Information Systems of Kuwaiti Companies: Obstacles and Barriers

Authors: Haya Y Alobaid

Abstract:

The aim of this paper is to identify and discuss the obstacles to the ability of the accounting information systems of Kuwaiti companies to deal with electronic commerce, and then to propose appropriate solutions to overcome the barriers. The study revealed a remarkable decrease in external auditors who have professional certification. The results also showed an agreement regarding the accounting systems and the ability to deal with e-commerce, with a different degree of importance, despite the presence of obstacles to the ability of accounting systems in dealing with different companies.

Keywords: accounting information systems, obstacle and barriers, electronic commerce, Kuwait companies

Procedia PDF Downloads 238
5576 Magnetic Investigation and 2½D Gravity Profile Modelling across the Beattie Magnetic Anomaly in the Southeastern Karoo Basin, South Africa

Authors: Christopher Baiyegunhi, Oswald Gwavava

Abstract:

The location/source of the Beattie magnetic anomaly (BMA) and interconnectivity of geologic structures at depth have been a topic of investigation for over 30 years. Up to now, no relationship between geological structures (interconnectivity of dolerite intrusions) at depth has been established. Therefore, the environmental impact of fracking the Karoo for shale gas could not be assessed despite the fact that dolerite dykes are groundwater localizers in the Karoo. In this paper, we shed more light to the unanswered questions concerning the possible location of the source of the BMA, the connectivity of geologic structures like dolerite dykes and sills at depth and this relationship needs to be established before the tectonic evolution of the Karoo basin can be fully understood and related to fracking of the Karoo for shale gas. The result of the magnetic investigation and modelling of four gravity profiles that crosses the BMA in the study area reveals that the anomaly, which is part of the Beattie magnetic anomaly tends to divide into two anomalies and continue to trend in an NE-SW direction, the dominant gravity signatures is of long wavelength that is due to a deep source/interface inland and shallows towards the coast, the average depth to the top of the shallow and deep magnetic sources was estimated to be approximately 0.6 km and 15 km, respectively. The BMA become stronger with depth which could be an indication that the source(s) is deep possibly a buried body in the basement. The bean-shaped anomaly also behaves in a similar manner like the BMA thus it could possibly share the same source(s) with the BMA.

Keywords: Beattie magnetic anomaly, magnetic sources, modelling, Karoo Basin

Procedia PDF Downloads 552
5575 Performance Improvement of Cooperative Scheme in Wireless OFDM Systems

Authors: Ki-Ro Kim, Seung-Jun Yu, Hyoung-Kyu Song

Abstract:

Recently, the wireless communication systems are required to have high quality and provide high bit rate data services. Researchers have studied various multiple antenna scheme to meet the demand. In practical application, it is difficult to deploy multiple antennas for limited size and cost. Cooperative diversity techniques are proposed to overcome the limitations. Cooperative communications have been widely investigated to improve performance of wireless communication. Among diversity schemes, space-time block code has been widely studied for cooperative communication systems. In this paper, we propose a new cooperative scheme using pre-coding and space-time block code. The proposed cooperative scheme provides improved error performance than a conventional cooperative scheme using space-time block coding scheme.

Keywords: cooperative communication, space-time block coding, pre-coding

Procedia PDF Downloads 356