Search results for: dynamic Bayesian networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6551

Search results for: dynamic Bayesian networks

1841 Biotechonomy System Dynamics Modelling: Sustainability of Pellet Production

Authors: Andra Blumberga, Armands Gravelsins, Haralds Vigants, Dagnija Blumberga

Abstract:

The paper discovers biotechonomy development analysis by use of system dynamics modelling. The research is connected with investigations of biomass application for production of bioproducts with higher added value. The most popular bioresource is wood, and therefore, the main question today is about future development and eco-design of products. The paper emphasizes and evaluates energy sector which is open for use of wood logs, wood chips, wood pellets and so on. The main aim for this research study was to build a framework to analyse development perspectives for wood pellet production. To reach the goal, a system dynamics model of energy wood supplies, processing, and consumption is built. Production capacity, energy consumption, changes in energy and technology efficiency, required labour source, prices of wood, energy and labour are taken into account. Validation and verification tests with available data and information have been carried out and indicate that the model constitutes the dynamic hypothesis. It is found that the more is invested into pellets production, the higher the specific profit per production unit compared to wood logs and wood chips. As a result, wood chips production is decreasing dramatically and is replaced by wood pellets. The limiting factor for pellet industry growth is availability of wood sources. This is governed by felling limit set by the government based on sustainable forestry principles.

Keywords: bioenergy, biotechonomy, system dynamics modelling, wood pellets

Procedia PDF Downloads 378
1840 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 22
1839 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation

Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez

Abstract:

With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).

Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling

Procedia PDF Downloads 174
1838 Budget Optimization for Maintenance of Bridges in Egypt

Authors: Hesham Abd Elkhalek, Sherif M. Hafez, Yasser M. El Fahham

Abstract:

Allocating limited budget to maintain bridge networks and selecting effective maintenance strategies for each bridge represent challenging tasks for maintenance managers and decision makers. In Egypt, bridges are continuously deteriorating. In many cases, maintenance works are performed due to user complaints. The objective of this paper is to develop a practical and reliable framework to manage the maintenance, repair, and rehabilitation (MR&R) activities of Bridges network considering performance and budget limits. The model solves an optimization problem that maximizes the average condition of the entire network given the limited available budget using Genetic Algorithm (GA). The framework contains bridge inventory, condition assessment, repair cost calculation, deterioration prediction, and maintenance optimization. The developed model takes into account multiple parameters including serviceability requirements, budget allocation, element importance on structural safety and serviceability, bridge impact on network, and traffic. A questionnaire is conducted to complete the research scope. The proposed model is implemented in software, which provides a friendly user interface. The framework provides a multi-year maintenance plan for the entire network for up to five years. A case study of ten bridges is presented to validate and test the proposed model with data collected from Transportation Authorities in Egypt. Different scenarios are presented. The results are reasonable, feasible and within acceptable domain.

Keywords: bridge management systems (BMS), cost optimization condition assessment, fund allocation, Markov chain

Procedia PDF Downloads 272
1837 Opacity Synthesis with Orwellian Observers

Authors: Moez Yeddes

Abstract:

The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.

Keywords: security policies, opacity, formal verification, orwellian observation

Procedia PDF Downloads 208
1836 Nations in Labour: Incorporating National Narratives in Sociological Models of Cultural Labour

Authors: Anna Lytvynova

Abstract:

This essay presents labour as a performatively national phenomenon from a cultural perspective. Considering Engels’ proposition of labour as the epicentre of development of social structures and communities, it theorizes the formation and sustainment of group identities through labour identities. Taking labour in the cultural sector as the starting point case study, the essay further enunciates such labour and labour identity as a form of engaged citizenship. In doing so, this piece hopes to arrive at a potential contemporary understanding of labour as having a central and dynamic role in cultural organization and citizenship. A parallel goal is to de-link sociological models of cultural labor from narratives of art and culture as something that stands separate from the 'real world' and the economy and exists in precarity. Combining discourse from cultural sociology, performance studies, and economics and grounding it in historical archive, the essay makes a primarily discursive theoretical contribution. Taking North American theatre organizations as the exemplifying starting point, this project positions cultural workers not solely as workers in a professional industry but as active citizen-subjects who are deeply involved in their society’s democratic processes. The resulting discourse can be used to shape more effective labour policies, as well as help art and cultural organizations find more effective organizational structures to engage the arts in the economic, political, and social spheres.

Keywords: arts labour, cultural sociology, national identity, performativity

Procedia PDF Downloads 112
1835 Outsourcing the Front End of Innovation

Authors: B. Likar, K. Širok

Abstract:

The paper presents a new method for efficient innovation process management. Even though the innovation management methods, tools and knowledge are well established and documented in literature, most of the companies still do not manage it efficiently. Especially in SMEs the front end of innovation - problem identification, idea creation and selection - is often not optimally performed. Our eMIPS methodology represents a sort of "umbrella methodology"- a well-defined set of procedures, which can be dynamically adapted to the concrete case in a company. In daily practice, various methods (e.g. for problem identification and idea creation) can be applied, depending on the company's needs. It is based on the proactive involvement of the company's employees supported by the appropriate methodology and external experts. The presented phases are performed via a mixture of face-to-face activities (workshops) and online (eLearning) activities taking place in eLearning Moodle environment and using other e-communication channels. One part of the outcomes is an identified set of opportunities and concrete solutions ready for implementation. The other also very important result is connected to innovation competences for the participating employees related with concrete tools and methods for idea management. In addition, the employees get a strong experience for dynamic, efficient and solution oriented managing of the invention process. The eMIPS also represents a way of establishing or improving the innovation culture in the organization. The first results in a pilot company showed excellent results regarding the motivation of participants and also as to the results achieved.

Keywords: creativity, distance learning, front end, innovation, problem

Procedia PDF Downloads 313
1834 A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization

Authors: Hebberly Ahatlan

Abstract:

The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, IT/OT convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.

Keywords: digitalization, IT/OT convergence, semantic interoperability, VPP, energy blockchain

Procedia PDF Downloads 148
1833 Dynamic Compensation for Environmental Temperature Variation in the Coolant Refrigeration Cycle as a Means of Increasing Machine-Tool Precision

Authors: Robbie C. Murchison, Ibrahim Küçükdemiral, Andrew Cowell

Abstract:

Thermal effects are the largest source of dimensional error in precision machining, and a major proportion is caused by ambient temperature variation. The use of coolant is a primary means of mitigating these effects, but there has been limited work on coolant temperature control. This research critically explored whether CNC-machine coolant refrigeration systems adapted to actively compensate for ambient temperature variation could increase machining accuracy. Accuracy data were collected from operators’ checklists for a CNC 5-axis mill and statistically reduced to bias and precision metrics for observations of one day over a sample period of 27 days. Temperature data were collected using three USB dataloggers in ambient air, the chiller inflow, and the chiller outflow. The accuracy and temperature data were analysed using Pearson correlation, then the thermodynamics of the system were described using system identification with MATLAB. It was found that 75% of thermal error is reflected in the hot coolant temperature but that this is negligibly dependent on ambient temperature. The effect of the coolant refrigeration process on hot coolant outflow temperature was also found to be negligible. Therefore, the evidence indicated that it would not be beneficial to adapt coolant chillers to compensate for ambient temperature variation. However, it is concluded that hot coolant outflow temperature is a robust and accessible source of thermal error data which could be used for prevention strategy evaluation or as the basis of other thermal error strategies.

Keywords: CNC manufacturing, machine-tool, precision machining, thermal error

Procedia PDF Downloads 75
1832 Investigation of Vortex Induced Vibration and Galloping Characteristic for Various Shape Slender Bridge Hanger

Authors: Matza Gusto Andika, Syariefatunnisa

Abstract:

Hanger at the arch bridges is an important part to transfer load on the bridge deck onto the arch. Bridges are subjected to several types of loadings, such as dead load, temperature load, wind load, moving loads etc. Usually the hanger bridge has a typical bluff body shape such as circle, square, H beam, etc. When flow past bluff body, the flow separates from the body surface generating an unsteady broad wake. These vortices are shed to the wake periodically with some frequency that is related to the undisturbed wind speed and the size of the cross-section body by the well-known Strouhal relationship. The dynamic characteristic and hanger shape are crucial for the evaluation of vortex induced vibrations and structural vibrations. The effect of vortex induced vibration is not catastrophic as a flutter phenomenon, but it can make fatigue failure to the structure. Wind tunnel tests are conducted to investigate the VIV and galloping effect at circle, hexagonal, and H beam bluff body for hanger bridge. From this research, the hanger bridge with hexagonal shape has a minimum vibration amplitude due to VIV phenomenon compared to circle and H beam. However, when the wind bruises the acute angle of hexagon shape, the vibration amplitude of bridge hanger with hexagonal shape is higher than the other bluff body.

Keywords: vortex induced vibration, hanger bridge, wind tunnel, galloping

Procedia PDF Downloads 251
1831 Green Closed-Loop Supply Chain Network Design Considering Different Production Technologies Levels and Transportation Modes

Authors: Mahsa Oroojeni Mohammad Javad

Abstract:

Globalization of economic activity and rapid growth of information technology has resulted in shorter product lifecycles, reduced transport capacity, dynamic and changing customer behaviors, and an increased focus on supply chain design in recent years. The design of the supply chain network is one of the most important supply chain management decisions. These decisions will have a long-term impact on the efficacy and efficiency of the supply chain. In this paper, a two-objective mixed-integer linear programming (MILP) model is developed for designing and optimizing a closed-loop green supply chain network that, to the greatest extent possible, includes all real-world assumptions such as multi-level supply chain, the multiplicity of production technologies, and multiple modes of transportation, with the goals of minimizing the total cost of the chain (first objective) and minimizing total emissions of emissions (second objective). The ε-constraint and CPLEX Solver have been used to solve the problem as a single-objective problem and validate the problem. Finally, the sensitivity analysis is applied to study the effect of the real-world parameters’ changes on the objective function. The optimal management suggestions and policies are presented.

Keywords: closed-loop supply chain, multi-level green supply chain, mixed-integer programming, transportation modes

Procedia PDF Downloads 57
1830 The Woman in Arabic Popular Proverbs, Stereotypical Roles and Actual Pain: The Woman in the Institution of Marriage as a Sample

Authors: Hanan Bishara

Abstract:

This study deals with the subject of Popular Arabic Proverbs and the stereotypical roles and images that they create about the woman in general and Arab woman in particular. Popular proverbs in general are considered to be essence of experiences of society and the extract of its collective thought establish wisdom in a distinguished concise tight mold or style that affects the majority of people and keep them alive by virtue of constant use and oral currency through which they are transmitted from one generation to another. Proverbs deal with different aspects and types of people, different social relations, including the society's attitude about the woman. Proverbs about women in the human heritage in general and the Arab heritage in particular are considered of a special characteristics and remarkable in their being dynamic ones that move in all directions of life. Most of them carry the essence of the social issues and are distributed in such a way that they have become part of the private life of the general public. This distribution covers all periods and fields of the woman's life, the social, the economic and psychological ones. The woman occupies a major space in the Popular Proverbs because she is the center of social life inside and outside the house. The woman's statuses and images in the provers are numerous and she is often described in parallel images but each one differs from the other. These images intertwine due to their varieties and multiplicity and ultimately, they constitute a general stereotypical image of the woman, which degrades her status as a woman, a mother and a wife. The study shows how Popular Proverbs in Arabic reflect the Arab woman's position and status in her society.

Keywords: Arab, proverb, popular, society, woman

Procedia PDF Downloads 174
1829 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 15
1828 The Role of Bridging Stakeholder in Water Management: Examining Social Networks in Working Groups and Co-Management

Authors: Fariba Ebrahimi, Mehdi Ghorbani

Abstract:

Comprehensive water management considers economic, environmental, technical and social sustainability of water resources for future generations. Integrated water management implies cooperative approach and involves all stakeholders and also introduces issues to managers and decision makers. Solving these issues needs integrated and system approach according to the recognition of actors or key persons in necessary to apply cooperative management of water resources. Therefore, social network analysis can be used to demonstrate the most effective actors for environmental base decisions. The linkage of diverse sets of actors and knowledge systems across management levels and institutional boundaries often poses one of the greatest challenges in adaptive water management. Bridging stakeholder can facilitate interactions among actors in management settings by lowering the transaction costs of collaboration. This research examines how network connections between group members affect in co- management. Cohesive network structures allow groups to more effectively achieve their goals and objectives Strong; centralized leadership is a better predictor of working group success in achieving goals and objectives. Finally, geometric position of each actor was illustrated in the network. The results of the research based on between centrality index have a key and bridging actor in recognition of cooperative management of water resources in Darbandsar village and also will help managers and planners of water in the case of recognition to organization and implementation of sustainable management of water resources and water security.

Keywords: co-management, water management, social network, bridging stakeholder, darbandsar village

Procedia PDF Downloads 284
1827 Resilience with Spontaneous Volunteers in Disasters-Coordination Using an It System

Authors: Leo Latasch, Mario Di Gennaro

Abstract:

Introduction: The goal of this project was to increase the resilience of the population as well as rescue organizations to make both quality and time-related improvements in handling crises. A helper network was created for this purpose. Methods: Social questions regarding the structure and purpose of helper networks were considered - specifically with regard to helper motivation, the level of commitment and collaboration between populations and agencies. The exchange of information, the coordinated use of volunteers, and the distribution of available resources will be ensured through defined communication and cooperation routines. Helper smartphones will also be used provide a picture of the situation on the ground. Results: The helper network was established and deployed based on the RESIBES information technology system. It consists of a service platform, a web portal and a smartphone app. The service platform is the central element for collaboration between the various rescue organizations, as well as for persons, associations, and companies from the population offering voluntary aid. The platform was used for: Registering helpers and resources and then requesting and assigning it in case of a disaster. These services allow the population's resources to be organized. The service platform also allows for a secure data exchange between services and external systems. Conclusions: The social and technical work priorities have allowed us to cover a full cycle of advance structural work, gaining an overview, damage management, evaluation, and feedback on experiences. This cycle allows experiences gained while handling the crisis to feed back into the cycle and improve preparations and management strategies.

Keywords: coordination, disaster, resilience, volunteers

Procedia PDF Downloads 120
1826 A Comparative Study on Deep Learning Models for Pneumonia Detection

Authors: Hichem Sassi

Abstract:

Pneumonia, being a respiratory infection, has garnered global attention due to its rapid transmission and relatively high mortality rates. Timely detection and treatment play a crucial role in significantly reducing mortality associated with pneumonia. Presently, X-ray diagnosis stands out as a reasonably effective method. However, the manual scrutiny of a patient's X-ray chest radiograph by a proficient practitioner usually requires 5 to 15 minutes. In situations where cases are concentrated, this places immense pressure on clinicians for timely diagnosis. Relying solely on the visual acumen of imaging doctors proves to be inefficient, particularly given the low speed of manual analysis. Therefore, the integration of artificial intelligence into the clinical image diagnosis of pneumonia becomes imperative. Additionally, AI recognition is notably rapid, with convolutional neural networks (CNNs) demonstrating superior performance compared to human counterparts in image identification tasks. To conduct our study, we utilized a dataset comprising chest X-ray images obtained from Kaggle, encompassing a total of 5216 training images and 624 test images, categorized into two classes: normal and pneumonia. Employing five mainstream network algorithms, we undertook a comprehensive analysis to classify these diseases within the dataset, subsequently comparing the results. The integration of artificial intelligence, particularly through improved network architectures, stands as a transformative step towards more efficient and accurate clinical diagnoses across various medical domains.

Keywords: deep learning, computer vision, pneumonia, models, comparative study

Procedia PDF Downloads 37
1825 The Consequences of Regime Change in Iraq; Formation and Continuation of Geopolitical Crises

Authors: Ali Asghar Sotoudeh

Abstract:

Since the US invasion of Iraq in 2003 and the subsequent regime change, internal conflicts between political and ethnic-religious groups have become a hallmark of Iraqi political dynamism. The most important manifestations of these conflicts are the Kurdish-central government conflicts, as well as fundamentalism since 2003. As a result, it seems not only US presence in Iraq under the pretext of fighting terrorism and expanding democracy has not had a positive effect on controlling fundamentalism and political stability in Iraq, but it has paved the way for the formation and continuation of geopolitical crises in the form of disputes over territory and sources of power. In this regard, given the importance of the study, the main purpose of this study is to examine the process of the impact of US regime-change policy on the formation and continuation of geopolitical crises in Iraq. The central question of this study is, what effect has the US regime change policy had on Iraq's domestic political processes? Findings show that regime change and subsequent imposed federalism have widened the gaps in Iraq's sectarian-ethnic system. As a result, the geopolitical crisis in the context of the dispute over geographical territory and sources of power between ethnic-religious groups has become the most important political dynamic in Iraq since the occupation. The research method in this article is descriptive-analytical, and the data collection method is library and internet resources.

Keywords: Iraq, united states, geopolitical crisis, ethno-religious conflict, political federalism

Procedia PDF Downloads 128
1824 The Influence of Online Audience Response on Journalists

Authors: Raja Arslan Ahmad Khan

Abstract:

Audience feedback and data play an increasingly crucial role, particularly in the digital age. The advent of digital media and the digitalization of news have given rise to novel forms of audience feedback, markedly different from traditional channels. The engagement of online audiences challenges the conventional role of journalists, introducing a dynamic where audiences can wield both direct and indirect influence. This struggle between the audience and journalists is evident in their contributions and interactions. Media professionals are grappling with challenges such as derogatory remarks, hate speech, online harassment, audience hostility, and attacks from online audiences. The influence of online audiences extends to shaping journalists' daily routines and work practices. Consequently, this study seeks to analyze the impact of online audience feedback on journalists at a routine level within the Malaysian context. Employing a Hierarchy of Influence model as a theoretical framework, the study will utilize a quantitative approach with a snowball survey method. The study's findings aim to enhance our understanding of how online audiences influence journalists and their work practices, encompassing aspects like journalists' autonomy and integrity, editorial decision-making, performance and accountability, daily routines, work practices, as well as the psychological and emotional costs they bear. It's important to note that the study has limitations due to the use of the snowball survey method and its focus within the specific context of Malaysia, making it relatively small in scale.

Keywords: online audiences, feedback, influence, journalists, Malaysia

Procedia PDF Downloads 42
1823 An Advanced Exponential Model for Seismic Isolators Having Hardening or Softening Behavior at Large Displacements

Authors: Nicolò Vaiana, Giorgio Serino

Abstract:

In this paper, an advanced Nonlinear Exponential Model (NEM), able to simulate the uniaxial dynamic behavior of seismic isolators having a continuously decreasing tangent stiffness with increasing displacement in the relatively large displacements range and a hardening or softening behavior at large displacements, is presented. The mathematical model is validated by comparing the experimental force-displacement hysteresis loops obtained during cyclic tests, conducted on a helical wire rope isolator and a recycled rubber-fiber reinforced bearing, with those predicted analytically. Good agreement between the experimental and simulated results shows that the proposed model can be an effective numerical tool to predict the force-displacement relationship of seismic isolation devices within the large displacements range. Compared to the widely used Bouc-Wen model, unable to simulate the response of seismic isolators at large displacements, the proposed one allows to avoid the numerical solution of a first order nonlinear ordinary differential equation for each time step of a nonlinear time history analysis, thus reducing the computation effort. Furthermore, the proposed model can simulate the smooth transition of the hysteresis loops from small to large displacements by adopting only one set of five parameters determined from the experimental hysteresis loops having the largest amplitude.

Keywords: base isolation, hardening behavior, nonlinear exponential model, seismic isolators, softening behavior

Procedia PDF Downloads 306
1822 Comparative Study of Seismic Isolation as Retrofit Method for Historical Constructions

Authors: Carlos H. Cuadra

Abstract:

Seismic isolation can be used as a retrofit method for historical buildings with the advantage that minimum intervention on super-structure is required. However, selection of isolation devices depends on weight and stiffness of upper structure. In this study, two buildings are considered for analyses to evaluate the applicability of this retrofitting methodology. Both buildings are located at Akita prefecture in the north part of Japan. One building is a wooden structure that corresponds to the old council meeting hall of Noshiro city. The second building is a brick masonry structure that was used as house of a foreign mining engineer and it is located at Ani town. Ambient vibration measurements were performed on both buildings to estimate their dynamic characteristics. Then, target period of vibration of isolated systems is selected as 3 seconds is selected to estimate required stiffness of isolation devices. For wooden structure, which is a light construction, it was found that natural rubber isolators in combination with friction bearings are suitable for seismic isolation. In case of masonry building elastomeric isolator can be used for its seismic isolation. Lumped mass systems are used for seismic response analysis and it is verified in both cases that seismic isolation can be used as retrofitting method of historical construction. However, in the case of the light building, most of the weight corresponds to the reinforced concrete slab that is required to install isolation devices.

Keywords: historical building, finite element method, masonry structure, seismic isolation, wooden structure

Procedia PDF Downloads 140
1821 A Modelling Study to Compare the Storm Surge along Oman Coast Due to Ashobaa and Nanauk Cyclones

Authors: R. V. Suresh Reddi, Vishnu S. Das, Mathew Leslie

Abstract:

The weather systems within the Arabian Sea is very dynamic in terms of monsoon and cyclone events. The storms generated in the Arabian Sea are more likely to progress in the north-west or west direction towards Oman. From the database of Joint Typhoon Warning Center (JTWC), the number of cyclones that hit the Oman coast or pass within close vicinity is noteworthy and therefore they must be considered when looking at coastal/port engineering design and development projects. This paper provides a case study of two cyclones, i.e., Nanauk (2014) and Ashobaa (2015) to assess the impact on storm surge off the Oman coast. These two cyclones have been selected since they are comparable in terms of maximum wind, cyclone duration, central pressure and month of occurrence. They are of similar strength but differ in track, allowing the impact of proximity to the coast to be considered. Of the two selected cyclones, Ashobaa is the 'extreme' case with close proximity while Nanauk remains further offshore and is considered as a more typical case. The available 'best-track' data from JTWC is obtained for the 2 selected cyclones, and the cyclone winds are generated using a 'Cyclone Wind Generation Tool' from MIKE (modelling software) from DHI (Danish Hydraulic Institute). Using MIKE 21 Hydrodynamic model powered by DHI the storm surge is estimated at selected offshore locations along the Oman coast.

Keywords: costal engineering, cyclone, storm surge, modelling

Procedia PDF Downloads 130
1820 An Integrated Architecture of E-Learning System to Digitize the Learning Method

Authors: M. Touhidul Islam Sarker, Mohammod Abul Kashem

Abstract:

The purpose of this paper is to improve the e-learning system and digitize the learning method in the educational sector. The learner will login into e-learning platform and easily access the digital content, the content can be downloaded and take an assessment for evaluation. Learner can get access to these digital resources by using tablet, computer, and smart phone also. E-learning system can be defined as teaching and learning with the help of multimedia technologies and the internet by access to digital content. E-learning replacing the traditional education system through information and communication technology-based learning. This paper has designed and implemented integrated e-learning system architecture with University Management System. Moodle (Modular Object-Oriented Dynamic Learning Environment) is the best e-learning system, but the problem of Moodle has no school or university management system. In this research, we have not considered the school’s student because they are out of internet facilities. That’s why we considered the university students because they have the internet access and used technologies. The University Management System has different types of activities such as student registration, account management, teacher information, semester registration, staff information, etc. If we integrated these types of activity or module with Moodle, then we can overcome the problem of Moodle, and it will enhance the e-learning system architecture which makes effective use of technology. This architecture will give the learner to easily access the resources of e-learning platform anytime or anywhere which digitizes the learning method.

Keywords: database, e-learning, LMS, Moodle

Procedia PDF Downloads 161
1819 Optimization of Topology-Aware Job Allocation on a High-Performance Computing Cluster by Neural Simulated Annealing

Authors: Zekang Lan, Yan Xu, Yingkun Huang, Dian Huang, Shengzhong Feng

Abstract:

Jobs on high-performance computing (HPC) clusters can suffer significant performance degradation due to inter-job network interference. Topology-aware job allocation problem (TJAP) is such a problem that decides how to dedicate nodes to specific applications to mitigate inter-job network interference. In this paper, we study the window-based TJAP on a fat-tree network aiming at minimizing the cost of communication hop, a defined inter-job interference metric. The window-based approach for scheduling repeats periodically, taking the jobs in the queue and solving an assignment problem that maps jobs to the available nodes. Two special allocation strategies are considered, i.e., static continuity assignment strategy (SCAS) and dynamic continuity assignment strategy (DCAS). For the SCAS, a 0-1 integer programming is developed. For the DCAS, an approach called neural simulated algorithm (NSA), which is an extension to simulated algorithm (SA) that learns a repair operator and employs them in a guided heuristic search, is proposed. The efficacy of NSA is demonstrated with a computational study against SA and SCIP. The results of numerical experiments indicate that both the model and algorithm proposed in this paper are effective.

Keywords: high-performance computing, job allocation, neural simulated annealing, topology-aware

Procedia PDF Downloads 85
1818 Development of Sustainable Building Environmental Model (SBEM) in Hong Kong

Authors: Kwok W. Mui, Ling T. Wong, F. Xiao, Chin T. Cheung, Ho C. Yu

Abstract:

This study addresses a concept of the Sustainable Building Environmental Model (SBEM) developed to optimize energy consumption in air conditioning and ventilation (ACV) systems without any deterioration of indoor environmental quality (IEQ). The SBEM incorporates two main components: an adaptive comfort temperature control module (ACT) and a new carbon dioxide demand control module (nDCV). These two modules take an innovative approach to maintain satisfaction of the Indoor Environmental Quality (IEQ) with optimum energy consumption, they provide a rational basis of effective control. A total of 2133 sets of measurement data of indoor air temperature (Ta), relative humidity (Rh) and carbon dioxide concentration (CO2) were conducted in some Hong Kong offices to investigate the potential of integrating the SBEM. A simulation was used to evaluate the dynamic performance of the energy and air conditioning system with the integration of the SBEM in an air-conditioned building. It allows us make a clear picture of the control strategies and performed any pre-tuned of controllers before utilized in real systems. With the integration of SBEM, it was able to save up to 12.3% in simulation and 15% in field measurement of overall electricity consumption, and maintain the average carbon dioxide concentration within 1000ppm and occupant dissatisfaction in 20%.

Keywords: sustainable building environmental model (SBEM), adaptive comfort temperature (ACT), new demand control ventilation (nDCV), energy saving

Procedia PDF Downloads 625
1817 Evaluation of the Notifiable Diseases Surveillance System, South, Haiti, 2022

Authors: Djeamsly Salomon

Abstract:

Background: Epidemiological surveillance is a dynamic national system used to observe all aspects of the evolution of priority health problems, through: collection, analysis, systematic interpretation of information, and dissemination of results with necessary recommendations. The study was conducted to assess the mandatory disease surveillance system in the Sud Department. Methods: A study was conducted from March to May 2021 with key players involved in surveillance at the level of health institutions in the department . The CDC's 2021 updated guideline was used to evaluate the system. We collected information about the operation, attributes, and usefulness of the surveillance system using interviewer-administered questionnaires. Epi-Info7.2 and Excel 2016 were used to generate the mean, frequencies and proportions. Results: Of 30 participants, 23 (77%) were women. The average age was 39 years[30-56]. 25 (83%) had training in epidemiological surveillance. (50%) of the forms checked were signed by the supervisor. Collection tools were available at (80%). Knowledge of at least 7 notifiable diseases was high (100%). Among the respondents, 29 declared that the collection tools were simple, 27 had already filled in a notification form. The maximum time taken to fill out a form was 10 minutes. The feedback between the different levels was done at (60%). Conclusion: The surveillance system is useful, simple, acceptable, representative, flexible, stable and responsive. The data generated was of high quality. However, it is threatened by the lack of supervision of sentinel sites, lack of investigation and weak feedback. This evaluation demonstrated the urgent need to improve supervision in the sites and to feedback information. Strengthen epidemiological surveillance.

Keywords: evaluation, notifiable diseases, surveillance, system

Procedia PDF Downloads 61
1816 Performance Enhancement of Hybrid Racing Car by Design Optimization

Authors: Tarang Varmora, Krupa Shah, Karan Patel

Abstract:

Environmental pollution and shortage of conventional fuel are the main concerns in the transportation sector. Most of the vehicles use an internal combustion engine (ICE), powered by gasoline fuels. This results into emission of toxic gases. Hybrid electric vehicle (HEV) powered by electric machine and ICE is capable of reducing emission of toxic gases and fuel consumption. However to build HEV, it is required to accommodate motor and batteries in the vehicle along with engine and fuel tank. Thus, overall weight of the vehicle increases. To improve the fuel economy and acceleration, the weight of the HEV can be minimized. In this paper, the design methodology to reduce the weight of the hybrid racing car is proposed. To this end, the chassis design is optimized. Further, attempt is made to obtain the maximum strength with minimum material weight. The best configuration out of the three main configurations such as series, parallel and the dual-mode (series-parallel) is chosen. Moreover, the most suitable type of motor, battery, braking system, steering system and suspension system are identified. The racing car is designed and analyzed in the simulating software. The safety of the vehicle is assured by performing static and dynamic analysis on the chassis frame. From the results, it is observed that, the weight of the racing car is reduced by 11 % without compromising on safety and cost. It is believed that the proposed design and specifications can be implemented practically for manufacturing hybrid racing car.

Keywords: design optimization, hybrid racing car, simulation, vehicle, weight reduction

Procedia PDF Downloads 277
1815 The Development of Communication and Mobile Phones in Iran: The Role of Internet in Smart Mobile Phones in Social and Human Development and Social Mobility of Different Classes of Iranian Women

Authors: Zahra Tork

Abstract:

Before the spread of the Internet and the use of mobile phones, women were generally far from society and many restrictions were applied to them, but after the spread of the Internet and the cultural and social changes brought about by it, women in society got a new one and many restrictions regarding them disappeared; As we can see today, many women, like men, have a high social base, they earn for themselves, they can travel alone, stay out late at night, take personal and family photos or videos on virtual pages. Publish themselves (while before this, showing or publishing photos of women was considered dishonorable or indecent). In this article, an attempt is made to examine the effect of the internet on mobile phones and virtual social networks in changing beliefs, norms and social values and their relationship with the social mobility of women and the effect of these factors on social and human development be paid. For this reason, social and human development is discussed first, and then the role of the media in development is explained, and finally, the social mobility of women is discussed. Since the purpose of this study is to better understand the social mobility of Iranian women through the development of the Internet in mobile phones, a qualitative study using focus groups has been adopted. The results of this research indicated that the Internet has caused changes in the value and cultural system of the Iranian people, and women have also redefined their roles and identity. In this new definition, many of the past restrictions have disappeared and women have gained the same freedoms as men. Finally, these factors (change in values and norms and redefinition of the role of women) joined hands and caused the social mobility of women in Iran.

Keywords: development of communication in Iran, development of mobile phones, development of the Internet, women's social group, social mobility

Procedia PDF Downloads 57
1814 The Paradox of Environmental Social Governance (ESG) in Addressing Environmental Justice

Authors: Barbara Ballan

Abstract:

Environmental Justice (EJ) and Environmental Social Governance (ESG) are trending terms used to address the impacts of corporate actions and environmental and social regulations on the people and the planet. ESG is a private governance invention (though increasingly required by public law) that aims to disclose environmental and social criteria while fostering value for businesses. On the other hand, EJ was borne as a social movement that evolved into a regulatory tool employed by EJ advocates and governmental agencies to assess inequalities in environmental impacts and regulations. However, EJ usage is expanding, and private environmental governance in the form of ESG disclosure frameworks is incorporating EJ criteria, indexes, and tools as part of its metric-driven approach. There is an existing tension between (1) the notion of social justice at the heart of the environmental justice movement and (2) the nature of for-profit corporations which generate value by externalizing costs, translated to environmental injustices. This study aims to explore the paradoxical relation of ESG, including EJ criteria, despite their opposing notions, in response to the need for innovative mechanisms to address today’s pressing social and environmental challenges. To that end, this study will evaluate and critically assess the inclusion of EJ in ESG reporting. Furthermore, it identifies gaps in ESG frameworks and proposes the integration of EJ tools to address these deficiencies. This work is intended to help both businesses looking to expand their ESG frameworks and include EJ criteria to inform corporate decisions and assure long-term corporate viability, as well as EJ supporters in understanding the complex dynamic of ESG disclosure for the pursuit of EJ objectives.

Keywords: environmental justice, ESG, sustainability reporting, corporate law, environmental law, social justice

Procedia PDF Downloads 26
1813 Building Information Modeling and Its Application in the State of Kuwait

Authors: Michael Gerges, Ograbe Ahiakwo, Martin Jaeger, Ahmad Asaad

Abstract:

Recent advances of Building Information Modeling (BIM) especially in the Middle East have increased remarkably. Dubai has been taking a lead on this by making it mandatory for BIM to be adopted for all projects that involve complex architecture designs. This is because BIM is a dynamic process that assists all stakeholders in monitoring the project status throughout different project phases with great transparency. It focuses on utilizing information technology to improve collaboration among project participants during the entire life cycle of the project from the initial design, to the supply chain, resource allocation, construction and all productivity requirements. In view of this trend, the paper examines the extent of applying BIM in the State of Kuwait, by exploring practitioners’ perspectives on BIM, especially their perspectives on main barriers and main advantages. To this end structured interviews were carried out based on questionnaires and with a range of different construction professionals. The results revealed that practitioners perceive improved communication and mitigated project risks by encouraged collaboration between project participants. However, it was also observed that the full implementation of BIM in the State of Kuwait requires concerted efforts to make clients demanding BIM, counteract resistance to change among construction professionals and offer more training for design team members. This paper forms part of an on-going research effort on BIM and its application in the State of Kuwait and it is on this basis that further research on the topic is proposed.

Keywords: building information modeling, BIM, construction industry, Kuwait

Procedia PDF Downloads 356
1812 Effect of Geometry on the Aerodynamic Performance of Darrieus H Yype Vertical Axis Wind Turbine

Authors: Belkheir Noura, Rabah Kerfah, Boumehani Abdellah

Abstract:

The influence of solidity variations on the aerodynamic performance of H type vertical axis wind turbine is studied in this paper. The wind turbine model used in this paper is the three-blade wind turbine with the symmetrical airfoil, NACA0021. The length of the chord is 0.265m. Numerical investigations were implemented for the different solidity by changing the radius and blade number. A two-dimensional model of the wind turbine is employed. The approach a Reynolds-Averaged Navier–Stokes equations, completed by the K- ώ SST turbulence model, is used. Motion mesh model capability of a computational fluid dynamics (CFD) solver is used. For each value of the solidity, the aerodynamics performances and the characteristics of the flow field are studied at several values of the tip speed ratio, λ = 0.5 to λ = 3, with an incoming wind speed of 8 m/s. The results show that increasing the number of blades will reduce the maximum value of the power coefficient of the wind turbine. Also, for the VAWT with a lower solidity can obtain the maximum Cp at a high tip speed ratio. The effects of changing the radius and blade number on aerodynamic performance are almost the same. Finally, for the validation, experimental data from the literature and computational results were compared. In conclusion, to study the influence of the solidity in the performances of the wind turbine is to provide the reference for the design of H type vertical axis wind turbines.

Keywords: wind energy, darrieus h type vertical axis wind turbine, computational fluid dynamic, solidity

Procedia PDF Downloads 72