Search results for: finally endeavour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4883

Search results for: finally endeavour

4373 Application of Optimization Techniques in Overcurrent Relay Coordination: A Review

Authors: Syed Auon Raza, Tahir Mahmood, Syed Basit Ali Bukhari

Abstract:

In power system properly coordinated protection scheme is designed to make sure that only the faulty part of the system will be isolated when abnormal operating condition of the system will reach. The complexity of the system as well as the increased user demand and the deregulated environment enforce the utilities to improve system reliability by using a properly coordinated protection scheme. This paper presents overview of over current relay coordination techniques. Different techniques such as Deterministic Techniques, Meta Heuristic Optimization techniques, Hybrid Optimization Techniques, and Trial and Error Optimization Techniques have been reviewed in terms of method of their implementation, operation modes, nature of distribution system, and finally their advantages as well as the disadvantages.

Keywords: distribution system, relay coordination, optimization, Plug Setting Multiplier (PSM)

Procedia PDF Downloads 394
4372 Three-Dimensional Numerical Investigation for Reinforced Concrete Slabs with Opening

Authors: Abdelrahman Elsehsah, Hany Madkour, Khalid Farah

Abstract:

This article presents a 3-D modified non-linear elastic model in the strain space. The Helmholtz free energy function is introduced with the existence of a dissipation potential surface in the space of thermodynamic conjugate forces. The constitutive equation and the damage evolution were derived as well. The modified damage has been examined to model the nonlinear behavior of reinforced concrete (RC) slabs with an opening. A parametric study with RC was carried out to investigate the impact of different factors on the behavior of RC slabs. These factors are the opening area, the opening shape, the place of opening, and the thickness of the slabs. And the numerical results have been compared with the experimental data from literature. Finally, the model showed its ability to be applied to the structural analysis of RC slabs.

Keywords: damage mechanics, 3-D numerical analysis, RC, slab with opening

Procedia PDF Downloads 170
4371 The Feasibility of Economic Science in Islam With an Emphasis on Sadr's Vantage Point

Authors: Yahya Jahangiri, Ali Almasi

Abstract:

Currently capitalism is one of the most important economic issues discussed by great scholars around the world. But Islamic approach, regarding this issue may differ both western and eastern views. A greatest scholar in Islamic economy ‘especially in Shia’ is Martyr Muhammad Baqir Al-Sadr. He wrote “Our economy” (Iqtisaduna) to present an economic point of view according to the Islamic teachings. In this regard firstly we will mention three approaches which are common in Muslim scullers about the economic science and then the main approach which is Sadr's view is described here. His claim explains that Islam and capitalism are in conflict with each other. And finally he explains the relationship between Islam and economy and he suggests the Islamic point of view in economy and its foundations as a solution for economic problems which we face today.

Keywords: Islam, economic science, capitalism, Martyr Sadr

Procedia PDF Downloads 323
4370 Scheduling in Cloud Networks Using Chakoos Algorithm

Authors: Masoumeh Ali Pouri, Hamid Haj Seyyed Javadi

Abstract:

Nowadays, cloud processing is one of the important issues in information technology. Since scheduling of tasks graph is an NP-hard problem, considering approaches based on undeterminisitic methods such as evolutionary processing, mostly genetic and cuckoo algorithms, will be effective. Therefore, an efficient algorithm has been proposed for scheduling of tasks graph to obtain an appropriate scheduling with minimum time. In this algorithm, the new approach is based on making the length of the critical path shorter and reducing the cost of communication. Finally, the results obtained from the implementation of the presented method show that this algorithm acts the same as other algorithms when it faces graphs without communication cost. It performs quicker and better than some algorithms like DSC and MCP algorithms when it faces the graphs involving communication cost.

Keywords: cloud computing, scheduling, tasks graph, chakoos algorithm

Procedia PDF Downloads 58
4369 Structural and Magnetic Properties of Bi0.82La0.2Fe1-xCrxO3 Nanoparticles

Authors: H. Nematifar, D. Sanavi Khoshnoud, S. Feyz

Abstract:

Bi0.82La0.2Fe1-xCrxO3 (BLFCxO, x = 0.0, 0.02, 0.05 and 0.08) nanoparticles were successfully synthesized by a sol-gel method. The X-ray diffraction (XRD) patterns indicate that the lattice parameters decrease for x ≤ 0.05, firstly, and then they increase for x > 0.05. A transformation from rhombohedral structure to orthorhombic structure occurs at x = 0.08. The transmission electron microscopy (TEM) analysis shows that the average nanoparticle size is about 60-70 nm. The remnant magnetisation (Mr) increases gradually with x to 0.02, then decreases with further increasing x up to 0.05, and finally enchases abruptly in x = 0.08. The coercivity (HC) increases gradually with x to 0.05, and then significantly reduced with increasing Cr substitution. The magnetic ordering temperature (TN) decreases with Cr doping concentration. The M-H curves of all samples exhibit a wasp-waist hysteresis loop in low magnetic region. This property can play an important role for the applications of some multiferroic nano-device.

Keywords: BiFeO3, sol-gel preparation, nanoparticles, magnetic materials, thermal analysis

Procedia PDF Downloads 308
4368 Routing in IP/LEO Satellite Communication Systems: Past, Present and Future

Authors: Mohammed Hussein, Abualseoud Hanani

Abstract:

In Low Earth Orbit (LEO) satellite constellation system, routing data from the source all the way to the destination constitutes a daunting challenge because LEO satellite constellation resources are spare and the high speed movement of LEO satellites results in a highly dynamic network topology. This situation limits the applicability of traditional routing approaches that rely on exchanging topology information upon change or setup of a connection. Consequently, in recent years, many routing algorithms and implementation strategies for satellite constellation networks with Inter Satellite Links (ISLs) have been proposed. In this article, we summarize and classify some of the most representative solutions according to their objectives, and discuss their advantages and disadvantages. Finally, with a look into the future, we present some of the new challenges and opportunities for LEO satellite constellations in general and routing protocols in particular.

Keywords: LEO satellite constellations, dynamic topology, IP routing, inter-satellite-links

Procedia PDF Downloads 376
4367 The Relationship between the Speed of Light and Cosmic Background Potential

Authors: Youping Dai, Xinping Dai, Xiaoyun Li

Abstract:

In this paper, the effect of Cosmic Background Gravitational Potential (CBGP) was discussed. It is helpful to reveal the equivalence of gravitational and inertial mass, and to understand the origin of inertia. The derivation is similar to the classic approach adopted by Landau in the book 'Classical Theory of Fields'.The main differences are that we used CBGP = Lambda^2 instead of c^2, and used CBGP energy E = m*Lambda^2 instead of kinetic energy E = (1/2)m*v^2 as initial assumptions (where Lambda has the same units for measuring velocity). It showed that Lorentz transformation, rest energy and Newtonian mechanics are all affected by $CBGP$, and the square of the speed of light is equal to CBGP too. Finally, the top value of cosmic mass density and cosmic radius were discussed.

Keywords: the origin of inertia, Mach's principle, equivalence principle, cosmic background potential

Procedia PDF Downloads 373
4366 Nanotechnology Innovations for the Sustainable Buildings of the Future

Authors: Ayşin Sev, Meltem Ezel

Abstract:

Sustainability, being the urgent issue of our time, is closely related with the innovations in technology. Nanotechnology (NT), although not a new science, can be regarded relatively a new science for buildings with brand new materials and applications. This paper tends to give a research review of current and near future applications of nanotechnology (NT) for achieving high-performance and healthy buildings for a sustainable future. In the introduction, the driving forces for the sustainability of construction industry are explained. Then, the term NT is defined, and significance of innovations in NT for a sustainable construction industry is revealed. After presenting the application areas of NT and nanomaterials for buildings with a number of cases, challenges in the adoption of this technology are put forward, and finally the impacts of nanoparticles and nanomaterials on human health and environment are discussed.

Keywords: nanomaterial, self-healing concrete, self cleaning sensor, nanosensor, steel, wood, aerogel, flexible solar panel

Procedia PDF Downloads 452
4365 Kalman Filter Design in Structural Identification with Unknown Excitation

Authors: Z. Masoumi, B. Moaveni

Abstract:

This article is about first step of structural health monitoring by identifying structural system in the presence of unknown input. In the structural system identification, identification of structural parameters such as stiffness and damping are considered. In this study, the Kalman filter (KF) design for structural systems with unknown excitation is expressed. External excitations, such as earthquakes, wind or any other forces are not measured or not available. The purpose of this filter is its strengths to estimate the state variables of the system in the presence of unknown input. Also least squares estimation (LSE) method with unknown input is studied. Estimates of parameters have been adopted. Finally, using two examples advantages and drawbacks of both methods are studied.

Keywords: Kalman filter (KF), least square estimation (LSE), structural health monitoring (SHM), structural system identification

Procedia PDF Downloads 313
4364 Existential and Possessive Constructions in Modern Standard Arabic Two Strategies Reflecting the Ontological (Non-)Autonomy of Located or Possessed Entities

Authors: Fayssal Tayalati

Abstract:

Although languages use very divergent constructional strategies, all existential constructions appear to invariably involve an implicit or explicit locative constituent. This locative constituent either surface as a true locative phrase or are realized as a possessor noun phrase. However, while much research focuses on the supposed underlying syntactic relation of locative and possessive existential constructions, not much is known about possible semantic factors that could govern the choice between these constructions. The main question that we address in this talk concerns the choice between the two related constructions in Modern Standard Arabic (MAS). Although both are used to express the existence of something somewhere, we can distinguish three contexts: First, for some types of entities, only the EL construction is possible (e.g. (1a) ṯammata raǧulun fī l-ḥadīqati vs. (1b) *(kāna) ladā l-ḥadīqati raǧulun). Second, for other types of entities, only the possessive construction is possible (e.g. (2a) ladā ṭ-ṭawilati aklun dāʾiriyyun vs. (2b) *ṯammata šaklun dāʾiriyyun ladā/fī ṭ-ṭawilati). Finally, for still other entities, both constructions can be found (e.g. (3a) ṯammata ḥubbun lā yūṣafu ladā ǧārī li-zawǧati-hi and (3b) ladā ǧārī ḥubbun lā yūṣafu li-zawǧati-hi). The data covering a range of ontologically different entities (concrete objects, events, body parts, dimensions, essential qualities, feelings, etc.) shows that the choice between the existential locative and the possessive constructions is closely linked to the conceptual autonomy of the existential theme with respect to its location or to the whole that it is a part of. The construction with ṯammata is the only possible one to express the existence of a fully autonomous (i.e. nondependent) entity (concrete objects (e.g.1) and abstract objects such as events, especially the ones that Grimshaw called ‘simple events’). The possessive construction with (kāna) ladā is the only one used to express the existence of fully non-autonomous (i.e. fully dependent on a whole) entities (body parts, dimensions (e.g. 2), essential qualities). The two constructions alternate when the existential theme is conceptually dependent but separable of the whole, either because it has an autonomous (independent) existence of the given whole (spare parts of an object), or because it receives a relative autonomy in the speech through a modifier (accidental qualities, feelings (e.g. 3a, 3b), psychological states, among some other kinds of themes). In this case, the modifier expresses an approximate boundary on a scale, and provides relative autonomy to the entity. Finally, we will show that kinship terms (e.g. son), which at first sight may seem to constitute counterexamples to our hypothesis, are nonetheless supported by it. The ontological (non-)autonomy of located or possessed entities is also reflected by morpho-syntactic properties, among them the use and the choice of determiners, pluralisation and the behavior of entities in the context of associative anaphora.

Keywords: existence, possession, autonomous entities, non-autonomous entities

Procedia PDF Downloads 345
4363 Investigation of Astrocyte Physiology on Stiffness-Controlled Cellulose Acetate Nanofiber as a Tissue Scaffold

Authors: Sun Il Yu, Jung Hyun Joo, Hwa Sung Shin

Abstract:

Astrocytes are known as dominant cells in CNS and play a role as a supporter of CNS activity and regeneration. Recently, three-dimensional culture of astrocytes were actively applied to understand in vivo astrocyte works. Electrospun nanofibers are attractive for 3D cell culture system because they have a high surface to volume ratio and porous structure, and have already been used for 3D astrocyte cultures. In this research, the stiffness of cellulose acetate (CA) nanofiber was controlled by heat treatment. As stiffness increased, astrocyte cell viability and adhesion increased. Reactivity of astrocyte was also upregulated in stiffer CA nanofiber in terms of GFAP, an intermediate filament protein. Finally, we demonstrated that stiffness-controllable CA is attractive for astrocyte tissue engineering.

Keywords: astrocyte, cellulose acetate, nanofiber, tissue scaffold

Procedia PDF Downloads 351
4362 Determination of Antibiotic Residues in Carcasses of Cows Slaughtered in Amol City by Four-Plate-Test Method

Authors: Arezou Ghadi, Nasrollah Vahedi, Azam Sinkakarimi

Abstract:

For determination of antibiotic residues in slaughtered cow carcasses of Amol city in Iran, sampling has done from 100 heads of cow. For this purpose, the microbiological F.P.T (Four-Plate Test) method was used. Basis of this method, a clear zone is creating around the leachate on the plate that already has cultured a uniform layer of under test bacteria on agar plate. In this study from 100 heads of cow carcasses, at least 75 cases (75%) in one of the tested organs (muscle-liver-kidney) have been antibiotic residues. Also, it has been found that kidney have the most positive cases (60%) than other organs (liver and muscle), then the liver (58%) and finally are muscles (51%).

Keywords: antibiotic residues, agar plate test, cow carcass

Procedia PDF Downloads 448
4361 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory

Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa

Abstract:

Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.

Keywords: laboratory, physical protection system, security culture, security function

Procedia PDF Downloads 181
4360 The Female Jihad: A Case Study of Jamaah Islamiyah’s Women in Indonesia

Authors: Milda Istiqomah

Abstract:

The current trends demonstrate that the number of women involved in terrorism is steadily increasing. There are at least two types of roles that women assume in terrorism; the ‘visible role’ and ‘invisible role’. Both roles are very important to the sustainability of terrorism and terrorist organizations. The findings of this paper are based on the analysis of multiple case study from two terrorism verdicts in Indonesia, media reports and academic journals. This paper argues that women in Jemaah Islamiyah (JI) play an important role in both categories. They are involved in this organization by marital and kinship linkages which aim to secure the networks and regenerate the Jihadi ideology within JI. Finally, this paper states that the role of women in JI is significant due to its importance in delivering the idea of Jihad to younger generations.

Keywords: terrorism, women, jihadi movement, case study

Procedia PDF Downloads 122
4359 Corporate Profitability through Effective Supply Chain Performance

Authors: Tareq N. Issa

Abstract:

The main pressuring challenges of global competition and high returns have forced businesses to shift their strategic competitive advantage from physical distribution management to integrated logistics management, finally moving into supply chain management. Conventionally, corporate profitability is a function of cost, capital employed, revenue and customer service. This article gives an insight into the effect of supply chain management on each of the above variables. It investigates the impact of the changing levels/ effects of these variables on corporate profitability and the means of measuring supply chain financial effectiveness. Information technology tools form the basis for supply chain optimal performance through alignment of supply chain systems in this ever increasing complexity in business decisions.

Keywords: corporate profitability, sypply chain systems, business decisions, competitive advanage

Procedia PDF Downloads 329
4358 Behavior Consistency Analysis for Workflow Nets Based on Branching Processes

Authors: Wang Mimi, Jiang Changjun, Liu Guanjun, Fang Xianwen

Abstract:

Loop structure often appears in the business process modeling, analyzing the consistency of corresponding workflow net models containing loop structure is a problem, the existing behavior consistency methods cannot analyze effectively the process models with the loop structure. In the paper, by analyzing five kinds of behavior relations of transitions, a three-dimensional figure and two-dimensional behavior relation matrix are proposed. Based on this, analysis method of behavior consistency of business process based on Petri net branching processes is proposed. Finally, an example is given out, which shows the method is effective.

Keywords: workflow net, behavior consistency measures, loop, branching process

Procedia PDF Downloads 384
4357 Automatic Algorithm for Processing and Analysis of Images from the Comet Assay

Authors: Yeimy L. Quintana, Juan G. Zuluaga, Sandra S. Arango

Abstract:

The comet assay is a method based on electrophoresis that is used to measure DNA damage in cells and has shown important results in the identification of substances with a potential risk to the human population as innumerable physical, chemical and biological agents. With this technique is possible to obtain images like a comet, in which the tail of these refers to damaged fragments of the DNA. One of the main problems is that the image has unequal luminosity caused by the fluorescence microscope and requires different processing to condition it as well as to know how many optimal comets there are per sample and finally to perform the measurements and determine the percentage of DNA damage. In this paper, we propose the design and implementation of software using Image Processing Toolbox-MATLAB that allows the automation of image processing. The software chooses the optimum comets and measuring the necessary parameters to detect the damage.

Keywords: artificial vision, comet assay, DNA damage, image processing

Procedia PDF Downloads 307
4356 Development of a Web Exploration Support System Focusing on Accumulation of Search Contexts

Authors: T. Yamazaki, R. Onuma, H. Kaminaga, Y. Miyadera, S. Nakamura

Abstract:

Web exploration has increasingly diversified in accordance with the development of browsing environments on the Internet. Moreover, advanced exploration often conducted in intellectual activities such as surveys in research activities. This kind of exploration is conducted for a long period with trials and errors. In such a case, it is extremely important for a user to accumulate the search contexts and understand them. However, existing support systems were not effective enough since most systems could not handle the various factors involved in the exploration. This research aims to develop a novel system to support web exploration focusing on the accumulation of the search contexts. This paper mainly describes the outline of the system. An experiment using the system is also described. Finally, features of the system are discussed based on the results.

Keywords: web exploration context, refinement of search intention, accumulation of context, exploration support, information visualization

Procedia PDF Downloads 303
4355 Transdisciplinary Attitude in the Classroom: Producing Quality of Being

Authors: Marie-Laure Mimoun-Sorel

Abstract:

Scholars concerned with the destiny of human species point out that our future will not only depend on progress made in technology and sciences but above all it will depend on human progress understood as quality of being. Teachers are significant force in developing a knowledgeable, creative, productive and democratic society. The values that underpin their profession are integrity, respect and responsibility. Therefore, being a teacher in the context of the 21st century requires embracing a Transdisciplinary Attitude which is about venturing within, between, across and beyond disciplines in order to bring forth quality of being in every learning process. In this article, the Transdisciplinary Attitude is defined and its benefits are shown through examples of Transdisciplinary inquiries in an Australian school. Finally, the conclusion invites to reflect on quality of teaching in regard to the development of individual autonomy, community participation and awareness of belonging to the human species.

Keywords: human progress, quality of being, quality of teaching, transdisciplinary attitude in education

Procedia PDF Downloads 366
4354 Rhetoric and Renarrative Structure of Digital Images in Trans-Media

Authors: Yang Geng, Anqi Zhao

Abstract:

The misreading theory of Harold Bloom provides a new diachronic perspective as an approach to the consistency between rhetoric of digital technology, dynamic movement of digital images and uncertain meaning of text. Reinterpreting the diachroneity of 'intertextuality' in the context of misreading theory extended the range of the 'intermediality' of transmedia to the intense tension between digital images and symbolic images throughout history of images. With the analogy between six categories of revisionary ratios and six steps of digital transformation, digital rhetoric might be illustrated as a linear process reflecting dynamic, intensive relations between digital moving images and original static images. Finally, it was concluded that two-way framework of the rhetoric of transformation of digital images and reversed served as a renarrative structure to revive static images by reconnecting them with digital moving images.

Keywords: rhetoric, digital art, intermediality, misreading theory

Procedia PDF Downloads 251
4353 Implementation and Modeling of a Quadrotor

Authors: Ersan Aktas, Eren Turanoğuz

Abstract:

In this study, the quad-electrical rotor driven unmanned aerial vehicle system is designed and modeled using fundamental dynamic equations. After that, mechanical, electronical and control system of the air vehicle are designed and implemented. Brushless motor speeds are altered via electronic speed controllers in order to achieve desired controllability. The vehicle's fundamental Euler angles (i.e., roll angle, pitch angle, and yaw angle) are obtained via AHRS sensor. These angles are provided as an input to the control algorithm that run on soft the processor on the electronic card. The vehicle control algorithm is implemented in the electronic card. Controller is designed and improved for each Euler angles. Finally, flight tests have been performed to observe and improve the flight characteristics.

Keywords: quadrotor, UAS applications, control architectures, PID

Procedia PDF Downloads 357
4352 Emerging Technology for Business Intelligence Applications

Authors: Hsien-Tsen Wang

Abstract:

Business Intelligence (BI) has long helped organizations make informed decisions based on data-driven insights and gain competitive advantages in the marketplace. In the past two decades, businesses witnessed not only the dramatically increasing volume and heterogeneity of business data but also the emergence of new technologies, such as Artificial Intelligence (AI), Semantic Web (SW), Cloud Computing, and Big Data. It is plausible that the convergence of these technologies would bring more value out of business data by establishing linked data frameworks and connecting in ways that enable advanced analytics and improved data utilization. In this paper, we first review and summarize current BI applications and methodology. Emerging technologies that can be integrated into BI applications are then discussed. Finally, we conclude with a proposed synergy framework that aims at achieving a more flexible, scalable, and intelligent BI solution.

Keywords: business intelligence, artificial intelligence, semantic web, big data, cloud computing

Procedia PDF Downloads 92
4351 Challenges of Women Entrepreneurs: Interview Findings on Cultural Differences of Three Women Business Owners in New York, Dubai and Athens

Authors: Joanna Konstantinou

Abstract:

The aim of the study is to present the challenges faced by women SME owners in developing resilient businesses. Qualitative research methods will be used through semi-structured interviews to present the cases of women entrepreneurs in Athens, Dubai, and New York. The conclusions and findings of the study will focus on the challenges faced by women entrepreneurs which can be attributed to cultural and contextual differences. Moreover, the study intends to identify these differences and the causes to which they can be potentially attributed so that these cases will serve as the ground of lessons to learn in order to highlight enablers of women entrepreneurship. Finally, the study will provide valuable insight to cultural perspectives and their impact on the development of female entrepreneurship.

Keywords: women, entrepreneurs, culture, SMEs

Procedia PDF Downloads 290
4350 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance

Authors: Rupan Preet Kaur

Abstract:

This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.

Keywords: artificial intelligence, machine learning, user access review, access approval

Procedia PDF Downloads 89
4349 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 448
4348 Dynamics Analyses of Swing Structure Subject to Rotational Forces

Authors: Buntheng Chhorn, WooYoung Jung

Abstract:

Large-scale swing has been used in entertainment and performance, especially in circus, for a very long time. To increase the safety of this type of structure, a thorough analysis for displacement and bearing stress was performed for an extreme condition where a full cycle swing occurs. Different masses, ranging from 40 kg to 220 kg, and velocities were applied on the swing. Then, based on the solution of differential dynamics equation, swing velocity response to harmonic force was obtained. Moreover, the resistance capacity was estimated based on ACI steel structure design guide. Subsequently, numerical analysis was performed in ABAQUS to obtain the stress on each frame of the swing. Finally, the analysis shows that the expansion of swing structure frame section was required for mass bigger than 150kg.

Keywords: swing structure, displacement, bearing stress, dynamic loads response, finite element analysis

Procedia PDF Downloads 377
4347 Failure Pressure Prediction of a Corroded Pipeline Using a Finite Element Method

Authors: Lounes Aouane, Omar Bouledroua

Abstract:

Sonatrach uses 24,000 kilometers of pipelines to transport gas and oil. Over time, these pipes run the risk of bursting due to corrosion inside and/or outside the pipeline. For this reason, a check must be made with the help of an equipped scraper. This intelligent tool provides a detailed picture of all errors in the pipeline. Based on the ERF values, these wear defects are divided into two parts: acceptable defect and unacceptable defect. The objective of this work is to conduct a comparative study of the different methods of calculating the marginal pressure found in the literature (DNV RP F-101, SHELL, P-CORRC, NETTO and CSA Z662). This comparison will be made from a database of 329 burst tests published in the literature. Finally, we will propose a new approach based on the finite element method using the commercial software ANSYS.

Keywords: hydrogen embrittlement, pipelines, hydrogen, transient flow, cyclic pressure, fatigue crack growth

Procedia PDF Downloads 62
4346 Investigation of Design Process of an Impedance Matching in the Specific Frequency for Radio Frequency Application

Authors: H. Nabaei, M. Joghataie

Abstract:

In this article, we study the design methods of matched filter with commercial software including CST Studio and ADS in specific frequency: 900 MHz. At first, we select two amounts of impedance for studying matching of them. Then, using by matched filter utility tool in ADS software, we simulate and deviate the elements of matched filters. In the following, we implement matched filter in CST STUDIO software. The simulated results show the great conformity in this field. Also, we peruse scattering and Impedance parameters in the Derivative structure. Finally, the layout of matched filter is obtained by the schematic tool of CST STUDIO. In fact, here, we present the design process of matched filters in the specific frequency.

Keywords: impedance matching, lumped element, transmission line, maximum power transmission, 3D layout

Procedia PDF Downloads 493
4345 Stability of Hybrid Systems

Authors: Kreangkri Ratchagit

Abstract:

This paper is concerned with exponential stability of switched linear systems with interval time-varying delays. The time delay is any continuous function belonging to a given interval, in which the lower bound of delay is not restricted to zero. By constructing a suitable augmented Lyapunov-Krasovskii functional combined with Leibniz-Newton’s formula, a switching rule for the exponential stability of switched linear systems with interval time-varying delays and new delay-dependent sufficient conditions for the exponential stability of the systems are first established in terms of LMIs. Finally, some examples are exploited to illustrate the effectiveness of the proposed schemes.

Keywords: exponential stability, hybrid systems, timevarying delays, Lyapunov-Krasovskii functional, Leibniz-Newton’s formula

Procedia PDF Downloads 455
4344 Concentric Circle Detection based on Edge Pre-Classification and Extended RANSAC

Authors: Zhongjie Yu, Hancheng Yu

Abstract:

In this paper, we propose an effective method to detect concentric circles with imperfect edges. First, the gradient of edge pixel is coded and a 2-D lookup table is built to speed up normal generation. Then we take an accumulator to estimate the rough center and collect plausible edges of concentric circles through gradient and distance. Later, we take the contour-based method, which takes the contour and edge intersection, to pre-classify the edges. Finally, we use the extended RANSAC method to find all the candidate circles. The center of concentric circles is determined by the two circles with the highest concentricity. Experimental results demonstrate that the proposed method has both good performance and accuracy for the detection of concentric circles.

Keywords: concentric circle detection, gradient, contour, edge pre-classification, RANSAC

Procedia PDF Downloads 127