Search results for: thermal network
7718 Identification of Thermally Critical Zones Based on Inter Seasonal Variation in Temperature
Authors: Sakti Mandal
Abstract:
Varying distribution of land surface temperature in an urbanized environment is a globally addressed phenomenon. Usually has been noticed that criticality of surface temperature increases from the periphery to the urban centre. As the centre experiences maximum severity of heat throughout the year, it also represents most critical zone in terms of thermal condition. In this present study, an attempt has been taken to propose a quantitative approach of thermal critical zonation (TCZ) on the basis of seasonal temperature variation. Here the zonation is done by calculating thermal critical value (TCV). From the Landsat 8 thermal digital data of summer and winter seasons for the year 2014, the land surface temperature maps and thermally critical zonation has been prepared, and corresponding dataset has been computed to conduct the overall study of that particular study area. It is shown that TCZ can be clearly identified and analyzed by the help of inter-seasonal temperature range. The results of this study can be utilized effectively in future urban development and planning projects as well as a framework for implementing rules and regulations by the authorities for a sustainable urban development through an environmentally affable approach.Keywords: thermal critical values (TCV), thermally critical zonation (TCZ), land surface temperature (LST), Landsat 8, Kolkata Municipal Corporation (KMC)
Procedia PDF Downloads 1977717 A Review of Literature for Online Social Network Business Continuance Intention and the Hypotheses Thereof
Authors: Akwesi Assensoh-Kodua
Abstract:
Online Social Networks (OSN) has come and gone, yet the explosion of business activities on such platforms continuous to surge high, giving advantage to the bold entrepreneurs. It is therefore a practical requirement that practitioners and researchers understand the key determinants of costumers’ online social network business activities and continuance intention. An exploratory literature research to examine OSN continuous intention of business participants on OSN revealed that the practice of doing business on social network has come to stay and the following factors are the likely drivers for this new business model: perceived trust, perceived ease of use, confirmation, habit, social norm, perceived behavioural control, expected benefit, and satisfaction are the most probable factors that can lead to online social network (OSN) continuance intention.Keywords: online social network, continuance intention, business continuance
Procedia PDF Downloads 4947716 Light Weight Fly Ash Based Composite Material for Thermal Insulation Applications
Authors: Bharath Kenchappa, Kunigal Shivakumar
Abstract:
Lightweight, low thermal conductivity and high temperature resistant materials or the system with moderate mechanical properties and capable of taking high heating rates are needed in both commercial and military applications. A single material with these attributes is very difficult to find and one needs to come with innovative ideas to make such material system using what is available. To bring down the cost of the system, one has to be conscious about the cost of basic materials. Such a material system can be called as the thermal barrier system. This paper focuses on developing, testing and characterization of material system for thermal barrier applications. The material developed is porous, low density, low thermal conductivity of 0.1062 W/m C and glass transition temperature about 310 C. Also, the thermal properties of the developed material was measured in both longitudinal and thickness direction to highlight the fact that the material shows isotropic behavior. The material is called modified Eco-Core which uses only less than 9% weight of high-char resin in the composite. The filler (reinforcing material) is a component of fly ash called Cenosphere, they are hollow micro-bubbles made of ceramic materials. Special mixing-technique is used to surface coat the fillers with a thin layer of resin to develop a point-to-point contact of particles. One could use commercial ceramic micro-bubbles instead of Cenospheres, but it is expensive. The bulk density of Cenospheres is about 0.35 g/cc and we could accomplish the composite density of about 0.4 g/cc. One percent filler weight of 3mm length standard drywall grade fibers was used to bring the added toughness. Both thermal and mechanical characterization was performed and properties are documented. For higher temperature applications (up to 1,000 C), a hybrid system was developed using an aerogel mat. Properties of combined material was characterized and documented. Thermal tests were conducted on both the bare modified Eco-Core and hybrid materials to assess the suitability of the material to a thermal barrier application. The hybrid material system was found to meet the requirement of the application.Keywords: aerogel, fly ash, porous material, thermal barrier
Procedia PDF Downloads 1117715 Optimizing Network Latency with Fast Path Assignment for Incoming Flows
Abstract:
Various flows in the network require to go through different types of middlebox. The improper placement of network middlebox and path assignment for flows could greatly increase the network latency and also decrease the performance of network. Minimizing the total end to end latency of all the ows requires to assign path for the incoming flows. In this paper, the flow path assignment problem in regard to the placement of various kinds of middlebox is studied. The flow path assignment problem is formulated to a linear programming problem, which is very time consuming. On the other hand, a naive greedy algorithm is studied. Which is very fast but causes much more latency than the linear programming algorithm. At last, the paper presents a heuristic algorithm named FPA, which takes bottleneck link information and estimated bandwidth occupancy into consideration, and achieves near optimal latency in much less time. Evaluation results validate the effectiveness of the proposed algorithm.Keywords: flow path, latency, middlebox, network
Procedia PDF Downloads 2077714 Luminescence and Local Environment: Identification of Thermal History
Authors: Veronique Jubera, Guillaume Salek, Manuel Gaudon, Alain Garcia, Alain Demourgues
Abstract:
Luminescence of transition metal and rare earth elements cover ultraviolet to far infrared wavelengths. Applications of phosphors are numerous. One can cite lighting, sensing, laser, energy, medical or military applications. But regarding each domain, specific criteria are required and they can be achieved with a strong control of the chemical composition. Emission of doped materials can be tailored with modifications of the local environment of the cations. For instance, the increase of the crystal field effect shifts the divalent manganese radiative transitions from the green to the red color. External factor as heat-treatment can induce changes of the doping element location or modify the unit cell crystalline symmetry. By controlling carefully the synthesis route, it is possible to initiate emission shift and to establish the thermal history of a compound. We propose to demonstrate through the luminescence of divalent manganese and trivalent rare earth doped oxide, that it is possible to follow the thermal history of a material. After optimization of the synthesis route, structural and optical properties are discussed. Finally, thermal calibration graphs are successfully established on these doped compounds. This makes these materials promising probe for thermal sensing.Keywords: emission, thermal sensing, transition metal, rare eath element
Procedia PDF Downloads 3857713 Design of Local Interconnect Network Controller for Automotive Applications
Authors: Jong-Bae Lee, Seongsoo Lee
Abstract:
Local interconnect network (LIN) is a communication protocol that combines sensors, actuators, and processors to a functional module in automotive applications. In this paper, a LIN ver. 2.2A controller was designed in Verilog hardware description language (Verilog HDL) and implemented in field-programmable gate array (FPGA). Its operation was verified by making full-scale LIN network with the presented FPGA-implemented LIN controller, commercial LIN transceivers, and commercial processors. When described in Verilog HDL and synthesized in 0.18 μm technology, its gate size was about 2,300 gates.Keywords: local interconnect network, controller, transceiver, processor
Procedia PDF Downloads 2897712 Evaluation of Thermal Comfort and Energy Consumption in Classroom
Authors: I. Kadek Candra Parmana Wiguna, Wiwik Budiawan, Heru Prastawa
Abstract:
Semarang has become not only a metropolitan city but also a centre of government that has experienced significant changes in urban land use. Temperature increases in urban areas result from the expansion of development. The average temperature in Semarang reached 27.10°C to 29.60°C in 2022. The state of thermal sensation is very dependent on the mode of operation; Industrial Engineering building is mostly equipped with an air conditioner (AC). This study aims to analyze the thermal comfort level and energy consumption of air conditioners in classroom of industrial engineering. Participants in this study amounted to 31 students with data collection for 4 weeks. Results of the physical environment are Ta in: 25.52°C, Ta out: 32.71 °C, Rh in: 61.14%, Rh out: 59.43%, and Av in: 0.037 m/s. The results of clothing insulation are 41% of the respondents belonged to the categories 0.31 - 0.5 clo (summer domming) and 0.51 - 0.70 clo (spring clothing). Regarding the predicted mean vote (PMV), the average value is 0.63, and only 14.85% result of the predicted percentage dissatisfied (PPD). The neutral temperature with measurement Griffith’s constant 0.5/°C was 27.16°C, but the statistical test results show that the comfort temperature to use TSV ≤ 0 which is 28.55°C. The highest average power (watt) measurement results during week 3, which is 1613.65 watts. It is concluded in this study that the thermal comfort conditions in the classroom are adequate and acceptable to more than 90% of respondents.Keywords: thermal comfort, PMV/PPD, air conditioner, TSV
Procedia PDF Downloads 337711 Applying Renowned Energy Simulation Engines to Neural Control System of Double Skin Façade
Authors: Zdravko Eškinja, Lovre Miljanić, Ognjen Kuljača
Abstract:
This paper is an overview of simulation tools used to model specific thermal dynamics that occurs while controlling double skin façade. Research has been conducted on simplified construction with single zone where one side is glazed. Heat flow and temperature responses are simulated in three different simulation tools: IDA-ICE, EnergyPlus and HAMBASE. The excitation of observed system, used in all simulations, was a temperature step of exterior environment. Air infiltration, insulation and other disturbances are excluded from this research. Although such isolated behaviour is not possible in reality, experiments are carried out to gain novel information about heat flow transients which are not observable under regular conditions. Results revealed new possibilities for adapting the parameters of the neural network regulator. Along numerical simulations, the same set-up has been also tested in a real-time experiment with a 1:18 scaled model and thermal chamber. The comparison analysis brings out interesting conclusion about simulation accuracy in this particular case.Keywords: double skin façade, experimental tests, heat control, heat flow, simulated tests, simulation tools
Procedia PDF Downloads 2317710 Thermal Performance of Plate-Fin Heat Sink with Lateral Perforation
Authors: Sakkarin Chingulpitak, Somchai Wongwises
Abstract:
Over the past several decades, the development of electronic devices has led to higher performance. Therefore, an electronic cooling system is important for the electronic device. A heat sink which is a part of the electronic cooling system is continuously studied in the research field to enhance the heat transfer. To author’s best knowledge, there have been only a few articles which reported the thermal performance of plate-fin heat sink with perforation. This research aims to study on the flow and heat transfer characteristics of the solid-fin heat sink (SFHS) and laterally perforated plate-fin heat sink (LAP-PFHS). The SFHS and LAP-PFHSs are investigated on the same fin dimensions. The LAP-PFHSs are performed with a 27 perforation number and two different diameters of circular perforation (3 mm and 5 mm). The experimental study is conducted under various Reynolds numbers from 900 to 2,000 and the heat input of 50W. The experimental results show that the LAP-PFHS with perforation diameter of 5 mm gives the minimum thermal resistance about 25% lower than SFHS. The thermal performance factor which takes into account the ratio of the Nusselt number and ratio of friction factor is used to find the suitable design parameters. The experimental results show that the LAP-PFHS with the perforation diameter of 3 mm provides the thermal performance of 15% greater than SFHS. In addition, the simulation study is presented to investigate the effect of the air flow behavior inside the perforation on the thermal performance of LAP-PFHS.Keywords: heat sink, parallel flow, circular perforation, non-bypass flow
Procedia PDF Downloads 1487709 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)
Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed
Abstract:
The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.Keywords: DSDV, AODV, DSR NS-2, PDF, push time
Procedia PDF Downloads 4337708 High Power Thermal Energy Storage for Industrial Applications Using Phase Change Material Slurry
Authors: Anastasia Stamatiou, Markus Odermatt, Dominic Leemann, Ludger J. Fischer, Joerg Worlitschek
Abstract:
The successful integration of thermal energy storage in industrial processes is expected to play an important role in the energy turnaround. Latent heat storage technologies can offer more compact thermal storage at a constant temperature level, in comparison to conventional, sensible thermal storage technologies. The focus of this study is the development of latent heat storage solutions based on the Phase Change Slurry (PCS) concept. Such systems promise higher energy densities both as refrigerants and as storage media while presenting better heat transfer characteristics than conventional latent heat storage technologies. This technology is expected to deliver high thermal power and high-temperature stability which makes it ideal for storage of process heat. An evaluation of important batch processes in industrial applications set the focus on materials with a melting point in the range of 55 - 90 °C. Aluminium ammonium sulfate dodecahydrate (NH₄Al(SO₄)₂·12H₂O) was chosen as the first interesting PCM for the next steps of this study. The ability of this material to produce slurries at the relevant temperatures was demonstrated in a continuous mode in a laboratory test-rig. Critical operational and design parameters were identified.Keywords: esters, latent heat storage, phase change materials, thermal properties
Procedia PDF Downloads 2987707 The Using of Liquefied Petroleum Gas (LPG) on a Low Heat Loss Si Engine
Authors: Hanbey Hazar, Hakan Gul
Abstract:
In this study, Thermal Barrier Coating (TBC) application is performed in order to reduce the engine emissions. Piston, exhaust, and intake valves of a single-cylinder four-cycle gasoline engine were coated with chromium carbide (Cr3C2) at a thickness of 300 µm by using the Plasma Spray coating method which is a TBC method. Gasoline engine was converted into an LPG system. The study was conducted in 4 stages. In the first stage, the piston, exhaust, and intake valves of the gasoline engine were coated with Cr3C2. In the second stage, gasoline engine was converted into the LPG system and the emission values in this engine were recorded. In the third stage, the experiments were repeated under the same conditions with a standard (uncoated) engine and the results were recorded. In the fourth stage, data obtained from both engines were loaded on Artificial Neural Networks (ANN) and estimated values were produced for every revolution. Thus, mathematical modeling of coated and uncoated engines was performed by using ANN. While there was a slight increase in exhaust gas temperature (EGT) of LPG engine due to TBC, carbon monoxide (CO) values decreased.Keywords: LPG fuel, thermal barrier coating, artificial neural network, mathematical modelling
Procedia PDF Downloads 4257706 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 4847705 An Experimental Study of the External Thermal Insulation System’s (ETICS) Efficiency in Buildings during Spring Conditions
Authors: Carmen Viñas Arrebola, Antonio Rodriguez Sanchez, Sheila Varela Lujan, Mariano Gonzalez Cortina, Cesar Porras Amores
Abstract:
The research group TEMA from the School of Building (UPM) is working in the line of energy efficiency and comfort in building. The need to reduce energy consumption in the building construction implies designing new constructive systems. These systems help to reduce both consumption and energy losses in order to achieve adequate thermal comfort for people in any type of building. In existing buildings the best option is the rehabilitation focused on thermal insulation. The aim of this paper is to design, monitor and analyze the first results of thermal behavior of the ETICS system in façades. This retrofitting solution consists of adding thermal insulation on the outside of the building, helping to create a continuous envelope on the façades. The analysis is done by comparing a rehabilitated part of the building with ETICS system and another part which has not been rehabilitated, and it is taken as reference. Both of them have the same characteristics. Temperature measurements were taken with type K thermocouples according to the previous design of the monitoring and in the same period of time. The pilot building of the study is situated in Benimamet Street, in San Cristobal de Los Ángeles, in the south of Madrid. It was built in the late 50s. The 51st entrance hall, which is restored, and the 47th entrance hall, in original conditions, have been studied.Keywords: comfort in building, energy efficiency in building, ETICS, thermal properties
Procedia PDF Downloads 3157704 Micromechanical Investigation on the Influence of Thermal Stress on Elastic Properties of Fiber-Reinforced Composites
Authors: Arber Sejdiji, Jan Schmitz-Huebsch, Christian Mittelstedt
Abstract:
Due to its use in a broad range of temperatures, the prediction of elastic properties of fiber composite materials under thermal load is significant. Especially the transversal stiffness dominates the potential of use for fiber-reinforced composites (FRC). A numerical study on the influence of thermal stress on transversal stiffness of fiber-reinforced composites is presented. In the numerical study, a representative volume element (RVE) is used to estimate the elastic properties of a unidirectional ply with finite element method (FEM). For the investigation, periodic boundary conditions are applied to the RVE. Firstly, the elastic properties under pure mechanical load are derived numerically and compared to results, which are obtained by analytical methods. Thereupon thermo-mechanical load is implemented into the model to investigate the influence of temperature change with low temperature as a key aspect. Regarding low temperatures, the transversal stiffness increases intensely, especially when thermal stress is dominant over mechanical stress. This paper outlines the employed numerical methods as well as the derived results.Keywords: elastic properties, micromechanics, thermal stress, representative volume element
Procedia PDF Downloads 1087703 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 2097702 Optimal and Critical Path Analysis of State Transportation Network Using Neo4J
Authors: Pallavi Bhogaram, Xiaolong Wu, Min He, Onyedikachi Okenwa
Abstract:
A transportation network is a realization of a spatial network, describing a structure which permits either vehicular movement or flow of some commodity. Examples include road networks, railways, air routes, pipelines, and many more. The transportation network plays a vital role in maintaining the vigor of the nation’s economy. Hence, ensuring the network stays resilient all the time, especially in the face of challenges such as heavy traffic loads and large scale natural disasters, is of utmost importance. In this paper, we used the Neo4j application to develop the graph. Neo4j is the world's leading open-source, NoSQL, a native graph database that implements an ACID-compliant transactional backend to applications. The Southern California network model is developed using the Neo4j application and obtained the most critical and optimal nodes and paths in the network using centrality algorithms. The edge betweenness centrality algorithm calculates the critical or optimal paths using Yen's k-shortest paths algorithm, and the node betweenness centrality algorithm calculates the amount of influence a node has over the network. The preliminary study results confirm that the Neo4j application can be a suitable tool to study the important nodes and the critical paths for the major congested metropolitan area.Keywords: critical path, transportation network, connectivity reliability, network model, Neo4j application, edge betweenness centrality index
Procedia PDF Downloads 1347701 Social Network Analysis in Water Governance
Authors: Faribaebrahimi, Mehdi Ghorbani, Mohsen Mohsenisaravi
Abstract:
Ecosystem management is complex because of natural and human issues. To cope with this complexity water governance is recommended since it involves all stakeholders including people, governmental and non-governmental organization who related to environmental systems. Water governance emphasizes on water co-management through consideration of all the stakeholders in the form of social and organizational network. In this research, to illustrate indicators of water governance in Dorood watershed, in Shemiranat region of Iran, social network analysis had been applied. The results revealed that social cohesion among pastoralists in Dorood is medium because of trust links, while link sustainability is weak to medium. According to the results, some pastoralists have high social power and therefore are key actors in the utilization network, regarding to centrality index and trust links. The results also demonstrated that Agricultural Development Office and (Shemshak-Darbandsar Islamic) Council are key actors in rangeland co-management, based on centrality index in rangeland institutional network at regional scale in Shemiranat district.Keywords: social network analysis, water governance, organizational network, water co-management
Procedia PDF Downloads 3517700 Analysis of the Omnichannel Delivery Network with Application to Last Mile Delivery
Authors: Colette Malyack, Pius Egbelu
Abstract:
Business-to-Customer (B2C) delivery options have improved to meet increased demand in recent years. The change in end users has forced logistics networks to focus on customer service and sentiment that would have previously been the priority of the company or organization of origin. This has led to increased pressure on logistics companies to extend traditional B2B networks into a B2C solution while accommodating additional costs, roadblocks, and customer sentiment; the result has been the creation of the omnichannel delivery network encompassing a number of traditional and modern methods of package delivery. In this paper the many solutions within the omnichannel delivery network are defined and discussed. It can be seen through this analysis that the omnichannel delivery network can be applied to reduce the complexity of package delivery and provide customers with more options. Applied correctly the result is a reduction in cost to the logistics company over time, even with an initial increase in cost to obtain the technology.Keywords: network planning, last mile delivery, omnichannel delivery network, omnichannel logistics
Procedia PDF Downloads 1507699 Organic Thin-Film Transistors with High Thermal Stability
Authors: Sibani Bisoyi, Ute Zschieschang, Alexander Hoyer, Hagen Klauk
Abstract:
Abstract— Organic thin-film transistors (TFTs) have great potential to be used for various applications such as flexible displays or sensors. For some of these applications, the TFTs must be able to withstand temperatures in excess of 100 °C, for example to permit the integration with devices or components that require high process temperatures, or to make it possible that the devices can be subjected to the standard sterilization protocols required for biomedical applications. In this work, we have investigated how the thermal stability of low-voltage small-molecule semiconductor dinaphtho[2,3-b:2’,3’-f]thieno[3,2-b]thiophene (DNTT) TFTs is affected by the encapsulation of the TFTs and by the ambient in which the thermal stress is performed. We also studied to which extent the thermal stability of the TFTs depends on the channel length. Some of the TFTs were encapsulated with a layer of vacuum-deposited Teflon, while others were left without encapsulation, and the thermal stress was performed either in nitrogen or in air. We found that the encapsulation with Teflon has virtually no effect on the thermal stability of our TFTs. In contrast, the ambient in which the thermal stress is conducted was found to have a measurable effect, but in a surprising way: When the thermal stress is carried out in nitrogen, the mobility drops to 70% of its initial value at a temperature of 160 °C and to close to zero at 170 °C, whereas when the stress is performed in air, the mobility remains at 75% of its initial value up to a temperature of 160 °C and at 60% up to 180 °C. To understand this behavior, we studied the effect of the thermal stress on the semiconductor thin-film morphology by scanning electron microscopy. While the DNTT films remain continuous and conducting when the heating is carried out in air, the semiconductor morphology undergoes a dramatic change, including the formation of large, thick crystals of DNTT and a complete loss of percolation, when the heating is conducted in nitrogen. We also found that when the TFTs are heated to a temperature of 200 °C in air, all TFTs with a channel length greater than 50 µm are destroyed, while TFTs with a channel length of less than 50 µm survive, whereas when the TFTs are heated to the same temperature (200 °C) in nitrogen, only the TFTs with a channel smaller than 8 µm survive. This result is also linked to the thermally induced changes in the semiconductor morphology.Keywords: organic thin-film transistors, encapsulation, thermal stability, thin-film morphology
Procedia PDF Downloads 3497698 Thermal Performance Investigation on Cross V-Shape Solar Air Collectors
Authors: Xi Luo, Xu Ji, Yunfeng Wang, Guoliang Li, Chongqiang Yan, Ming Li
Abstract:
Two different kinds of cross V-shape solar air collectors are designed and constructed. In the transverse cross V-shape collector, the V-shape bottom plate is along the air flow direction and the absorbing plate is perpendicular to the air flow direction. In the lengthway cross V-shape collector, the V-shape absorbing plate is along the air flow direction and the bottom plate is perpendicular to the air flow direction. Based on heat balance, the mathematical model is built to evaluate their performances. These thermal performances of the two cross V-shape solar air collectors and an extra traditional flat-plate solar air collector are characterized under various operating conditions by experiments. The experimental results agree well with the calculation values. The experimental results prove that the thermal efficiency of transverse cross V-shape collector precedes that of others. The air temperature at any point along the flow direction of the transverse cross V-shape collector is higher than that of the lengthway cross V-shape collector. For the transverse cross V-shape collector, the most effective length of flow channel is 0.9m. For the lengthway cross V-shape collector, a longer flow channel is necessary to achieve a good thermal performance.Keywords: cross v-shape, performance, solar air collector, thermal efficiency
Procedia PDF Downloads 3147697 Optimization of Interface Radio of Universal Mobile Telecommunication System Network
Authors: O. Mohamed Amine, A. Khireddine
Abstract:
Telecoms operators are always looking to meet their share of the other customers, they try to gain optimum utilization of the deployed equipment and network optimization has become essential. This project consists of optimizing UMTS network, and the study area is an urban area situated in the center of Algiers. It was initially questions to become familiar with the different communication systems (3G) and the optimization technique, its main components, and its fundamental characteristics radios were introduced.Keywords: UMTS, UTRAN, WCDMA, optimization
Procedia PDF Downloads 3847696 Understanding the Selectional Preferences of the Twitter Mentions Network
Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das
Abstract:
Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.Keywords: information diffusion, personality and values, social network analysis, twitter mentions network
Procedia PDF Downloads 3747695 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case
Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan
Abstract:
The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.Keywords: cloud computing, protocols, UDP multicast, virtualization
Procedia PDF Downloads 5907694 The Use of Thermal Infrared Wavelengths to Determine the Volcanic Soils
Authors: Levent Basayigit, Mert Dedeoglu, Fadime Ozogul
Abstract:
In this study, an application was carried out to determine the Volcanic Soils by using remote sensing. The study area was located on the Golcuk formation in Isparta-Turkey. The thermal bands of Landsat 7 image were used for processing. The implementation of the climate model that was based on the water index was used in ERDAS Imagine software together with pixel based image classification. Soil Moisture Index (SMI) was modeled by using the surface temperature (Ts) which was obtained from thermal bands and vegetation index (NDVI) derived from Landsat 7. Surface moisture values were grouped and classified by using scoring system. Thematic layers were compared together with the field studies. Consequently, different moisture levels for volcanic soils were indicator for determination and separation. Those thermal wavelengths are preferable bands for separation of volcanic soils using moisture and temperature models.Keywords: Landsat 7, soil moisture index, temperature models, volcanic soils
Procedia PDF Downloads 3067693 Urban Land Cover from GF-2 Satellite Images Using Object Based and Neural Network Classifications
Authors: Lamyaa Gamal El-Deen Taha, Ashraf Sharawi
Abstract:
China launched satellite GF-2 in 2014. This study deals with comparing nearest neighbor object-based classification and neural network classification methods for classification of the fused GF-2 image. Firstly, rectification of GF-2 image was performed. Secondly, a comparison between nearest neighbor object-based classification and neural network classification for classification of fused GF-2 was performed. Thirdly, the overall accuracy of classification and kappa index were calculated. Results indicate that nearest neighbor object-based classification is better than neural network classification for urban mapping.Keywords: GF-2 images, feature extraction-rectification, nearest neighbour object based classification, segmentation algorithms, neural network classification, multilayer perceptron
Procedia PDF Downloads 3897692 Electrical Resistivity of Solid and Liquid Pt: Insight into Electrical Resistivity of ε-Fe
Authors: Innocent C. Ezenwa, Takashi Yoshino
Abstract:
Knowledge of the transport properties of Fe and its alloys at extreme high pressure (P), temperature (T) conditions are essential for understanding the generation and sustainability of the magnetic field of the rocky planets with a metallic core. Since Pt, an unfilled d-band late transition metal with an electronic structure of Xe4f¹⁴5d⁹6s¹, is paramagnetic and remains close-packed structure at ambient conditions and high P-T, it is expected that its transport properties at these conditions would be similar to those of ε-Fe. We investigated the T-dependent electrical resistivity of solid and liquid Pt up to 8 GPa and found it constant along its melting curve both on the liquid and solid sides in agreement with theoretical prediction and experimental results estimated from thermal conductivity measurements. Our results suggest that the T-dependent resistivity of ε-Fe is linear and would not saturate at high P, T conditions. This, in turn, suggests that the thermal conductivity of liquid Fe at Earth’s core conditions may not be as high as previously suggested by models employing saturation resistivity. Hence, thermal convection could have powered the geodynamo before the birth of the inner core. The electrical resistivity and thermal conductivity on the liquid and solid sides of the inner core boundary of the Earth would be significantly different in values.Keywords: electrical resistivity, thermal conductivity, transport properties, geodynamo and geomagnetic field
Procedia PDF Downloads 1437691 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks
Authors: Sungchul Ha, Hyunwoo Kim
Abstract:
In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.Keywords: MANETs, IDS, power control, minimum spanning tree
Procedia PDF Downloads 3727690 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network
Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang
Abstract:
As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.Keywords: GUI, deep learning, GAN, data augmentation
Procedia PDF Downloads 1847689 Multiple Query Optimization in Wireless Sensor Networks Using Data Correlation
Authors: Elaheh Vaezpour
Abstract:
Data sensing in wireless sensor networks is done by query deceleration the network by the users. In many applications of the wireless sensor networks, many users send queries to the network simultaneously. If the queries are processed separately, the network’s energy consumption will increase significantly. Therefore, it is very important to aggregate the queries before sending them to the network. In this paper, we propose a multiple query optimization framework based on sensors physical and temporal correlation. In the proposed method, queries are merged and sent to network by considering correlation among the sensors in order to reduce the communication cost between the sensors and the base station.Keywords: wireless sensor networks, multiple query optimization, data correlation, reducing energy consumption
Procedia PDF Downloads 334