Search results for: quantum key distribution systems
8909 Experimental Investigation of Powder Holding Capacities of H13 and H14 Class Activated Carbon Filters Based on En 779 Standard
Authors: Abdullah Işıktaş, Kevser Dincer
Abstract:
The use of HEPA filters for air conditioning systems in clean rooms tends to increase progressively in pharmaceutical, food stuff industries and in hospitals. There are two standards widely used for HEPA filters; the EN 1822 standards published by the European Union, CEN (European Committee for Standardization) and the US based IEST standard (Institute of Environmental Sciences and Technology. Both standards exhibit some differences in the definitions of efficiency and its measurement methods. While IEST standard defines efficiency at the grit diameter of 0.3 µm, the EN 1822 standard takes MPPS (Most Penetrating Particle Size) as the basis of its definition. That is, the most difficult grit size to catch up. On the other hand, while IEST suggests that photometer and grit counters be used for filter testing, in EN 1822 standard, only the grit (grain) counters are recommended for that purpose. In this study, powder holding capacities of H13 and H14 grade materials under the EN 779 standard are investigated experimentally by using activated carbon. Measurements were taken on an experimental set up based on the TS 932 standard. Filter efficiency was measured by injecting test powder at amounts predetermined in the standards into the filters at certain intervals. The data obtained showed that the powder holding capacities of the activated carbon filter are high enough to yield efficiency of around 90% and that the H13 and H14 filters exhibit high efficiency suitable for the standard used.Keywords: activated carbon filters, HEPA filters, powder holding capacities, air conditioning systems
Procedia PDF Downloads 2488908 Comparative Study for Biodiesel Production Using a Batch and a Semi-Continuous Flow Reactor
Authors: S. S. L. Andrade, E. A. Souza, L. C. L. Santos, C. Moraes, A. K. C. L. Lobato
Abstract:
Biodiesel may be produced through transesterification reaction (or alcoholysis), that is the transformation of a long chain fatty acid in an alkyl ester. This reaction can occur in the presence of acid catalysts, alkali, or enzyme. Currently, for industrial processes, biodiesel is produced by alkaline route. The alkali most commonly used in these processes is hydroxides and methoxides of sodium and potassium. In this work, biodiesel production was conducted in two different systems. The first consisted of a batch reactor operating with a traditional washing system and the second consisted of a semi-continuous flow reactor operating with a membrane separation system. Potassium hydroxides was used as catalyst at a concentration of 1% by weight, the molar ratio oil/alcohol was 1/9 and temperature of 55 °C. Tests were performed using soybeans and palm oil and the ester conversion results were compared for both systems. It can be seen that the results for both oils are similar when using the batch reator or the semi-continuous flow reactor. The use of the semi-continuous flow reactor allows the removal of the formed products. Thus, in the case of a reversible reaction, with the removal of reaction products, the concentration of the reagents becomes higher and the equilibrium reaction is shifted towards the formation of more products. The higher conversion to ester with soybean and palm oil using the batch reactor was approximately 98%. In contrast, it was observed a conversion of 99% when using the same operating condition on a semi-continuous flow reactor.Keywords: biodiesel, batch reactor, semi-continuous flow reactor, transesterification
Procedia PDF Downloads 3878907 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography
Authors: Merad Boudia Omar Rafik, Feham Mohammed
Abstract:
Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysisKeywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption
Procedia PDF Downloads 3048906 Breast Cancer Survivability Prediction via Classifier Ensemble
Authors: Mohamed Al-Badrashiny, Abdelghani Bellaachia
Abstract:
This paper presents a classifier ensemble approach for predicting the survivability of the breast cancer patients using the latest database version of the Surveillance, Epidemiology, and End Results (SEER) Program of the National Cancer Institute. The system consists of two main components; features selection and classifier ensemble components. The features selection component divides the features in SEER database into four groups. After that it tries to find the most important features among the four groups that maximizes the weighted average F-score of a certain classification algorithm. The ensemble component uses three different classifiers, each of which models different set of features from SEER through the features selection module. On top of them, another classifier is used to give the final decision based on the output decisions and confidence scores from each of the underlying classifiers. Different classification algorithms have been examined; the best setup found is by using the decision tree, Bayesian network, and Na¨ıve Bayes algorithms for the underlying classifiers and Na¨ıve Bayes for the classifier ensemble step. The system outperforms all published systems to date when evaluated against the exact same data of SEER (period of 1973-2002). It gives 87.39% weighted average F-score compared to 85.82% and 81.34% of the other published systems. By increasing the data size to cover the whole database (period of 1973-2014), the overall weighted average F-score jumps to 92.4% on the held out unseen test set.Keywords: classifier ensemble, breast cancer survivability, data mining, SEER
Procedia PDF Downloads 3348905 Numerical Method for Fin Profile Optimization
Authors: Beghdadi Lotfi
Abstract:
In the present work a numerical method is proposed in order to optimize the thermal performance of finned surfaces. The bidimensional temperature distribution on the longitudinal section of the fin is calculated by restoring to the finite volumes method. The heat flux dissipated by a generic profile fin is compared with the heat flux removed by the rectangular profile fin with the same length and volume. In this study, it is shown that a finite volume method for quadrilaterals unstructured mesh is developed to predict the two dimensional steady-state solutions of conduction equation, in order to determine the sinusoidal parameter values which optimize the fin effectiveness. In this scheme, based on the integration around the polygonal control volume, the derivatives of conduction equation must be converted into closed line integrals using same formulation of the Stokes theorem. The numerical results show good agreement with analytical results. To demonstrate the accuracy of the method, the absolute and root-mean square errors versus the grid size are examined quantitatively.Keywords: Stokes theorem, unstructured grid, heat transfer, complex geometry, effectiveness
Procedia PDF Downloads 2748904 Effect of Submerged Water Jet's Cross Section Shapes on Mixing Length
Authors: Mohsen Solimani Babarsad, Mohammad Rastgoo, Payam Taheri
Abstract:
One of the important applications of hydraulic jets is used for discharge industrial, agricultural and urban wastewater into the rivers or other ambient water to reduce negative effects of pollutant water. Submerged jets due to turbulent condition can mix large amount of dense pollutant water with ambient flow. This study is conducted to investigate the distribution and length of the mixing zone in hydraulic jet's flow field with change in cross section shapes of nozzle. Toward this end, three shapes of cross section (square, circle and rectangular) and three saline densities current with different concentration are considered in a flume with 600 cm as long, 100 cm as high and 150 cm in width. Various discharges were used to evaluate mixing length for a wide range of densimetric Froude numbers, Frd, from 100 to 550 that is defined at the nozzle. Consequently, the circular nozzle, in comparison with other sections, has a densimetric Froude number 11% higher than square nozzle and 26% higher than rectangular nozzle.Keywords: hydraulic jet, mixing zone, densimetric Froude number, nozzle
Procedia PDF Downloads 3668903 Using Artificial Vision Techniques for Dust Detection on Photovoltaic Panels
Authors: Gustavo Funes, Eduardo Peters, Jose Delpiano
Abstract:
It is widely known that photovoltaic technology has been massively distributed over the last decade despite its low-efficiency ratio. Dust deposition reduces this efficiency even more, lowering the energy production and module lifespan. In this work, we developed an artificial vision algorithm based on CIELAB color space to identify dust over panels in an autonomous way. We performed several experiments photographing three different types of panels, 30W, 340W and 410W. Those panels were soiled artificially with uniform and non-uniform distributed dust. The algorithm proposed uses statistical tools to provide a simulation with a 100% soiled panel and then performs a comparison to get the percentage of dirt in the experimental data set. The simulation uses a seed that is obtained by taking a dust sample from the maximum amount of dust from the dataset. The final result is the dirt percentage and the possible distribution of dust over the panel. Dust deposition is a key factor for plant owners to determine cleaning cycles or identify nonuniform depositions that could lead to module failure and hot spots.Keywords: dust detection, photovoltaic, artificial vision, soiling
Procedia PDF Downloads 548902 The Need for Selective Credit Policy Implementation: Case of Croatia
Authors: Drago Jakovcevic, Mihovil Andelinovic, Igor Husak
Abstract:
The aim of this paper is to explore the economic circumstances in which the selective credit policy, the least used instrument of four types of instruments on disposal to central banks, should be used. The most significant example includes the use of selective credit policies in response to the emergence of the global financial crisis by the FED. Specifics of the potential use of selective credit policies as the instigator of economic growth in Croatia, a small open economy, are determined by high euroization of financial system, fixed exchange rate and long-term trend growth of external debt that is related to the need to maintain high levels of foreign reserves. In such conditions, the classic forms of selective credit policies are unsuitable for the introduction. Several alternative approaches to implement selective credit policies are examined in this paper. Also, thorough analysis of distribution of selective monetary policy loans among economic sectors in Croatia is conducted in order to minimize the risk of investing funds and maximize the return, in order to influence the GDP growth.Keywords: global crisis, selective credit policy, small open economy, Croatia
Procedia PDF Downloads 4378901 Opacity Synthesis with Orwellian Observers
Authors: Moez Yeddes
Abstract:
The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.Keywords: security policies, opacity, formal verification, orwellian observation
Procedia PDF Downloads 2308900 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing
Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh
Abstract:
Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis
Procedia PDF Downloads 4768899 Sustainability Innovation Capacity Building Framework for UN Sustainable Development Goals
Authors: C. Park, H. Lee, Y-J. Lee
Abstract:
Aim: This study aims to present the Sustainability Innovation Capacity Building Framework (SICBF) to enable the wider public to achieve UN Sustainable Development Goals (UN SDGs) for a sustainable future. The intrinsically interwoven nature of sustainability requires systematic approaches to attain. However, there is a lack of an effective framework for capacity building that enables a systematic implementation approach for UN SDGs. The SICBF illustrates the six core components and their dynamics: 1. Momentum creation; 2. Exposure to diverse worldviews; 3. Serendipity/Eureka moment; 4. Creative problem solving; 5. Individual empowerment; 6. Systems thinking. Method: First, a structured literature review was used to synthesise existing sustainability competencies studies and generic innovation competencies. Secondly, the conceptual framework based on literature findings was tested with the participants' survey and interview data collected from four sets of MAKEathon events. The interview analysis and event observation data were used to further refine and validate the conceptual framework. Contributions: The scientific contribution of this study is to pave the way for SDGs specific capacity building framework that caters to the need for systematic approaches to allow the wider public aspiring to tackle the seemingly intractable sustainable development goals. The framework will aid sustainable development academics, educators, and practitioners in understanding the dynamics of how capacity building can be facilitated.Keywords: capacity building, sustainability innovation, sustainable development, systems thinking, UN SDGs
Procedia PDF Downloads 898898 Deep learning with Noisy Labels : Learning True Labels as Discrete Latent Variable
Authors: Azeddine El-Hassouny, Chandrashekhar Meshram, Geraldin Nanfack
Abstract:
In recent years, learning from data with noisy labels (Label Noise) has been a major concern in supervised learning. This problem has become even more worrying in Deep Learning, where the generalization capabilities have been questioned lately. Indeed, deep learning requires a large amount of data that is generally collected by search engines, which frequently return data with unreliable labels. In this paper, we investigate the Label Noise in Deep Learning using variational inference. Our contributions are : (1) exploiting Label Noise concept where the true labels are learnt using reparameterization variational inference, while observed labels are learnt discriminatively. (2) the noise transition matrix is learnt during the training without any particular process, neither heuristic nor preliminary phases. The theoretical results shows how true label distribution can be learned by variational inference in any discriminate neural network, and the effectiveness of our approach is proved in several target datasets, such as MNIST and CIFAR32.Keywords: label noise, deep learning, discrete latent variable, variational inference, MNIST, CIFAR32
Procedia PDF Downloads 1328897 Food Sovereignty as Local Resistance to Unequal Access to Food and Natural Resources in Latin America: A Gender Perspective
Authors: Ana Alvarenga De Castro
Abstract:
Food sovereignty has been brought by the international peasants’ movement, La Via Campesina, as a precondition to food security, speaking about the right of each nation to keep its own supply of foods respecting cultural, sustainable practices and productive diversity. The political conceptualization nowadays goes beyond saying that this term is about achieving the rights of farmers to control the food systems according to local specificities, and about equality in the access to natural resources and quality food. The current feminization of agroecosystems and of food insecurity identified by researchers and recognized by international agencies like the UN and FAO has enhanced the feminist discourse into the food sovereignty movement, considering the historical inequalities that place women farmers in subaltern positions inside the families and rural communities. The current tendency in many rural areas of more women taking responsibility for food production and still facing the lack of access to natural resources meets particular aspects in Latin America due to the global economic logic which places the Global South in the position of raw material supplier for the industrialized North, combined with regional characteristics. In this context, Latin American countries play the role of commodities exporters in the international labor division, including among exported items grains, soybean paste, and ores, to the expense of local food chains which provide domestic quality food supply under more sustainable practices. The connections between gender inequalities and global territorial inequalities related to the access and control of food and natural resources are pointed out by feminist political ecology - FPE - authors, and are linked in this article to the potentialities and limitations of women farmers to reproduce diversified agroecosystems in the tropical environments. The work brings the importance of local practices held by women farmers which are crucial to maintaining sustainable agricultural systems and their results on seeds, soil, biodiversity and water conservation. This work presents an analysis of documents, releases, videos and other publicized experiences launched by some peasants’ organizations in Latin America which evidence the different technical and political answers that meet food sovereignty from peasants’ groups that are attributed to women farmers. They are associated with articles presenting the empirical analysis of women farmers' practices in Latin America. The combination drove to discuss the benefits of peasants' conceptions about food systems and their connections with local realities and the gender issues linked to the food sovereignty conceptualization. Conclusion meets that reality on the field cannot reach food sovereignty's ideal homogeneously and that agricultural sustainable practices are dependent on rights' achievement and social inequalities' eradication.Keywords: food sovereignty, gender, diversified agricultural systems, access to natural resources
Procedia PDF Downloads 2538896 Tick Infestation and its Implications on Health and Welfare of Cattle under Pastoral System in Nigeria
Authors: Alabi Olufemi, Adeyanju Taiwo, Oloruntoba Oluwasegun, Adeleye Bobola, Alabi Oyekemi
Abstract:
The pastoral system is a predominant form of cattle production in Nigeria, characterized by extensive grazing on communal lands. However, this system is challenged by various factors, including tick infestation, which significantly affects cattle health and welfare hence this investigation which aims to provide an in-depth understanding of tick infestation in the context of Nigerian pastoral systems, emphasizing its impact on cattle health and welfare. The country harbors a diverse array of tick species that affect cattle. These ticks belong to different genera, including Rhipicephalus, Amblyomma, and Hyalomma, among others. Each species has unique characteristics, life cycles, and host preferences, contributing to the complexity of tick infestation dynamics in pastoral settings. Tick infestation has numerous detrimental effects on cattle health. The direct effects include blood loss, anemia, skin damage due to feeding, and the transmission of pathogens that cause diseases such as anaplasmosis, babesiosis, and theileriosis. Indirectly, tick infestation can lead to reduced productivity, weight loss, and increased susceptibility to other diseases.The welfare of cattle in Nigerian pastoral systems is significantly impacted by tick infestation. Infested cattle often exhibit signs of distress, including restlessness, reduced grazing activity, and altered behavior. Furthermore, the discomfort caused by tick bites can lead to chronic stress, compromising the overall welfare of the animals. Effective tick control is crucial for mitigating the impact of infestation on cattle health and welfare. Strategies such as acaricide application, pasture management, genetic selection for tick resistance cattle, and vaccination against tick-borne diseases are commonly used. Tick infestation presents a significant challenge to cattle production under the pastoral system in Nigeria. It not only impacts cattle health but also compromises their welfare. Addressing the issue of tick infestation requires a multifaceted approach that integrates effective control strategies with sustainable management practices. Further research is needed to develop tailored interventions that account for the unique characteristics of Nigerian pastoral systems, ultimately ensuring the well-being and productivity of cattle in these settings.Keywords: tick infestation, pastoral system, welfare, cattle
Procedia PDF Downloads 688895 Distributed Real-time Framework for Experimental Multi Aerial Robotic Systems
Authors: Samuel Knox, Verdon Crann, Peyman Amiri, William Crowther
Abstract:
There exists a shortage of open-source firmware for allowing researchers to focus on implementing high-level planning and control strategies for multi aerial robotic systems in simulation and experiment. Within this body of work, practical firmware is presented, which performs all supplementary tasks, including communications, pre and post-experiment procedures, and emergency safety measures. This allows researchers to implement high-level planning and control algorithms for path planning, traffic management, flight formation and swarming of aerial robots. The framework is built in Python using the MAVSDK library, which is compatible with flight controllers running PX4 firmware and onboard computers based on Linux. Communication is performed using Wi-Fi and the MQTT protocol, currently implemented using a centralized broker. Finally, a graphical user interface (GUI) has been developed to send general commands and monitor the agents. This framework enables researchers to prepare customized planning and control algorithms in a modular manner. Studies can be performed experimentally and in simulation using PX4 software in the loop (SITL) and the Gazebo simulator. An example experimental use case of the framework is presented using novel distributed planning and control strategies. The demonstration is performed using off-the-shelf components and minimal setup.Keywords: aerial robotics, distributed framework, experimental, planning and control
Procedia PDF Downloads 1198894 Campus Signage and Wayfinding Design Guidelines: Challenges of Visual Literacy in University of Port Harcourt
Authors: Kasi Jockeil-Ojike
Abstract:
The study of signage and wayfinding design guidelines is to provide consistent, coherent, and comprehensive guidelines for all type of signage design that may be applied to guide persons from the freeway into campus, and to specific building. As the world becomes more complex and the population increases, people increasingly rely on signage and wayfinding systems to navigate their way in built environment such as university campus. This paper will demonstrate and discuss signage and wayfinding, and the importance of visual literacy in university campuses. It discusses the process of wayfinding and signage, how poor signage and wayfinding systems affect people when navigating, and why wayfinding is more than just signage. Hence, this paper tries to examine the design guideline that primarily addresses the signage and wayfinding system that improves visual literacy within University of Port Harcourt multi-campuses. In doing this, the paper explore the environmental graphic design senori-emotional values and communicative information theories that takes the subjectivity of the observer in account. By making these connections, the paper will also determine what University of Port Harcourt need to focus on to be counted in the global trends, using developed visual communication guidelines based on previous studies or concept from professional. In conclusion, information about why physical structures (buildings and waypaths) on University of Port Harcourt multiple campuses need to be branded in self-communicative manner using signage and wayfinding design as integral part of its physical planning policy is recommended.Keywords: campus-signage, movement, visual-literacy, wayfinding-guidelines
Procedia PDF Downloads 4568893 Energy Storage Modelling for Power System Reliability and Environmental Compliance
Authors: Rajesh Karki, Safal Bhattarai, Saket Adhikari
Abstract:
Reliable and economic operation of power systems are becoming extremely challenging with large scale integration of renewable energy sources due to the intermittency and uncertainty associated with renewable power generation. It is, therefore, important to make a quantitative risk assessment and explore the potential resources to mitigate such risks. Probabilistic models for different energy storage systems (ESS), such as the flywheel energy storage system (FESS) and the compressed air energy storage (CAES) incorporating specific charge/discharge performance and failure characteristics suitable for probabilistic risk assessment in power system operation and planning are presented in this paper. The proposed methodology used in FESS modelling offers flexibility to accommodate different configurations of plant topology. It is perceived that CAES has a high potential for grid-scale application, and a hybrid approach is proposed, which embeds a Monte-Carlo simulation (MCS) method in an analytical technique to develop a suitable reliability model of the CAES. The proposed ESS models are applied to a test system to investigate the economic and reliability benefits of the energy storage technologies in system operation and planning, as well as to assess their contributions in facilitating wind integration during different operating scenarios. A comparative study considering various storage system topologies are also presented. The impacts of failure rates of the critical components of ESS on the expected state of charge (SOC) and the performance of the different types of ESS during operation are illustrated with selected studies on the test system. The paper also applies the proposed models on the test system to investigate the economic and reliability benefits of the different ESS technologies and to evaluate their contributions in facilitating wind integration during different operating scenarios and system configurations. The conclusions drawn from the study results provide valuable information to help policymakers, system planners, and operators in arriving at effective and efficient policies, investment decisions, and operating strategies for planning and operation of power systems with large penetrations of renewable energy sources.Keywords: flywheel energy storage, compressed air energy storage, power system reliability, renewable energy, system planning, system operation
Procedia PDF Downloads 1378892 Ship Detection Requirements Analysis for Different Sea States: Validation on Real SAR Data
Authors: Jaime Martín-de-Nicolás, David Mata-Moya, Nerea del-Rey-Maestre, Pedro Gómez-del-Hoyo, María-Pilar Jarabo-Amores
Abstract:
Ship detection is nowadays quite an important issue in tasks related to sea traffic control, fishery management and ship search and rescue. Although it has traditionally been carried out by patrol ships or aircrafts, coverage and weather conditions and sea state can become a problem. Synthetic aperture radars can surpass these coverage limitations and work under any climatological condition. A fast CFAR ship detector based on a robust statistical modeling of sea clutter with respect to sea states in SAR images is used. In this paper, the minimum SNR required to obtain a given detection probability with a given false alarm rate for any sea state is determined. A Gaussian target model using real SAR data is considered. Results show that SNR does not depend heavily on the class considered. Provided there is some variation in the backscattering of targets in SAR imagery, the detection probability is limited and a post-processing stage based on morphology would be suitable.Keywords: SAR, generalized gamma distribution, detection curves, radar detection
Procedia PDF Downloads 4578891 Hidro-IA: An Artificial Intelligent Tool Applied to Optimize the Operation Planning of Hydrothermal Systems with Historical Streamflow
Authors: Thiago Ribeiro de Alencar, Jacyro Gramulia Junior, Patricia Teixeira Leite
Abstract:
The area of the electricity sector that deals with energy needs by the hydroelectric in a coordinated manner is called Operation Planning of Hydrothermal Power Systems (OPHPS). The purpose of this is to find a political operative to provide electrical power to the system in a given period, with reliability and minimal cost. Therefore, it is necessary to determine an optimal schedule of generation for each hydroelectric, each range, so that the system meets the demand reliably, avoiding rationing in years of severe drought, and that minimizes the expected cost of operation during the planning, defining an appropriate strategy for thermal complementation. Several optimization algorithms specifically applied to this problem have been developed and are used. Although providing solutions to various problems encountered, these algorithms have some weaknesses, difficulties in convergence, simplification of the original formulation of the problem, or owing to the complexity of the objective function. An alternative to these challenges is the development of techniques for simulation optimization and more sophisticated and reliable, it can assist the planning of the operation. Thus, this paper presents the development of a computational tool, namely Hydro-IA for solving optimization problem identified and to provide the User an easy handling. Adopted as intelligent optimization technique is Genetic Algorithm (GA) and programming language is Java. First made the modeling of the chromosomes, then implemented the function assessment of the problem and the operators involved, and finally the drafting of the graphical interfaces for access to the User. The results with the Genetic Algorithms were compared with the optimization technique nonlinear programming (NLP). Tests were conducted with seven hydroelectric plants interconnected hydraulically with historical stream flow from 1953 to 1955. The results of comparison between the GA and NLP techniques shows that the cost of operating the GA becomes increasingly smaller than the NLP when the number of hydroelectric plants interconnected increases. The program has managed to relate a coherent performance in problem resolution without the need for simplification of the calculations together with the ease of manipulating the parameters of simulation and visualization of output results.Keywords: energy, optimization, hydrothermal power systems, artificial intelligence and genetic algorithms
Procedia PDF Downloads 4248890 Energy Efficient Plant Design Approaches: Case Study of the Sample Building of the Energy Efficiency Training Facilities
Authors: Idil Kanter Otcu
Abstract:
Nowadays, due to the growing problems of energy supply and the drastic reduction of natural non-renewable resources, the development of new applications in the energy sector and steps towards greater efficiency in energy consumption are required. Since buildings account for a large share of energy consumption, increasing the structural density of buildings causes an increase in energy consumption. This increase in energy consumption means that energy efficiency approaches to building design and the integration of new systems using emerging technologies become necessary in order to curb this consumption. As new systems for productive usage of generated energy are developed, buildings that require less energy to operate, with rational use of resources, need to be developed. One solution for reducing the energy requirements of buildings is through landscape planning, design and application. Requirements such as heating, cooling and lighting can be met with lower energy consumption through planting design, which can help to achieve more efficient and rational use of resources. Within this context, rather than a planting design which considers only the ecological and aesthetic features of plants, these considerations should also extend to spatial organization whereby the relationship between the site and open spaces in the context of climatic elements and planting designs are taken into account. In this way, the planting design can serve an additional purpose. In this study, a landscape design which takes into consideration location, local climate morphology and solar angle will be illustrated on a sample building project.Keywords: energy efficiency, landscape design, plant design, xeriscape landscape
Procedia PDF Downloads 2638889 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 2838888 Development of a Testing Rig for a Cold Formed-Hot Rolled Steel Hybrid Wall Panel System
Authors: Mina Mortazavi, Hamid Ronagh, Pezhman Sharafi
Abstract:
The new concept of a cold formed-hot rolled hybrid steel wall panel system is introduced to overcome the deficiency in lateral load resisting capacity of cold-formed steel structures. The hybrid system is composed of a cold-formed steel part laterally connected to hot rolled part. The hot rolled steel part is responsible for carrying the whole lateral load; while the cold formed steel part is only required to transfer the lateral load to the hot rolled part without any local failure. The vertical load is beared by both hot rolled, and cold formed steel part, proportionally. In order to investigate the lateral performance of the proposed system, it should be tested under simultaneous lateral and vertical load. The main concern is to deliver the loads to each part during the test to simulate the real load distribution in the structure. In this paper, a detailed description of the proposed wall panel system and the designed testing rig is provided.Keywords: cold-formed steel, hybrid system, wall panel system, testing rig design
Procedia PDF Downloads 4268887 Stress Analysis of Spider Gear Using Structural Steel on ANSYS
Authors: Roman Kalvin, Anam Nadeem, Shahab Khushnood
Abstract:
Differential is an integral part of four wheeled vehicle, and its main function is to transmit power from drive shaft to wheels. Differential assembly allows both rear wheels to turn at different speed along curved paths. It consists of four gears which are assembled together namely pinion, ring, spider and bevel gears. This research focused on the spider gear and its static structural analysis using ANSYS. The main aim was to evaluate the distribution of stresses on the teeth of the spider gear. This study also analyzed total deformation that may occur during its working along with bevel gear that is meshed with spider gear. Structural steel was chosen for spider gear in this research. Modeling and assembling were done on SolidWorks for both spider and bevel gear. They were assembled exactly same as in a differential assembly. This assembly was then imported to ANSYS. After observing results that maximum amount of stress and deformation was produced in the spider gear, it was concluded that structural steel material for spider gear possesses greater amount of strength to bear maximum stress.Keywords: ANSYS, differential, spider gear, structural steel
Procedia PDF Downloads 1928886 Design and Implementation of a Geodatabase and WebGIS
Authors: Sajid Ali, Dietrich Schröder
Abstract:
The merging of internet and Web has created many disciplines and Web GIS is one these disciplines which is effectively dealing with the geospatial data in a proficient way. Web GIS technologies have provided an easy accessing and sharing of geospatial data over the internet. However, there is a single platform for easy and multiple accesses of the data lacks for the European Caribbean Association (Europaische Karibische Gesselschaft - EKG) to assist their members and other research community. The technique presented in this paper deals with designing of a geodatabase using PostgreSQL/PostGIS as an object oriented relational database management system (ORDBMS) for competent dissemination and management of spatial data and Web GIS by using OpenGeo Suite for the fast sharing and distribution of the data over the internet. The characteristics of the required design for the geodatabase have been studied and a specific methodology is given for the purpose of designing the Web GIS. At the end, validation of this Web based geodatabase has been performed over two Desktop GIS software and a web map application and it is also discussed that the contribution has all the desired modules to expedite further research in the area as per the requirements.Keywords: desktop GISSoftware, European Caribbean association, geodatabase, OpenGeo suite, postgreSQL/PostGIS, webGIS, web map application
Procedia PDF Downloads 3438885 Process Modeling in an Aeronautics Context
Authors: Sophie Lemoussu, Jean-Charles Chaudemar, Robertus A. Vingerhoeds
Abstract:
Many innovative projects exist in the field of aeronautics, each addressing specific areas so to reduce weight, increase autonomy, reduction of CO2, etc. In many cases, such innovative developments are being carried out by very small enterprises (VSE’s) or small and medium sized-enterprises (SME’s). A good example concerns airships that are being studied as a real alternative to passenger and cargo transportation. Today, no international regulations propose a precise and sufficiently detailed framework for the development and certification of airships. The absence of such a regulatory framework requires a very close contact with regulatory instances. However, VSE’s/SME’s do not always have sufficient resources and internal knowledge to handle this complexity and to discuss these issues. This poses an additional challenge for those VSE’s/SME’s, in particular those that have system integration responsibilities and that must provide all the necessary evidence to demonstrate their ability to design, produce, and operate airships with the expected level of safety and reliability. The main objective of this research is to provide a methodological framework enabling VSE’s/SME’s with limited resources to organize the development of airships while taking into account the constraints of safety, cost, time and performance. This paper proposes to provide a contribution to this problematic by proposing a Model-Based Systems Engineering approach. Through a comprehensive process modeling approach applied to the development processes, the regulatory constraints, existing best practices, etc., a good image can be obtained as to the process landscape that may influence the development of airships. To this effect, not only the necessary regulatory information is taken on board, also other international standards and norms on systems engineering and project management are being modeled and taken into account. In a next step, the model can be used for analysis of the specific situation for given developments, derive critical paths for the development, identify eventual conflicting aspects between the norms, standards, and regulatory expectations, or also identify those areas where not enough information is available. Once critical paths are known, optimization approaches can be used and decision support techniques can be applied so to better support VSE’s/SME’s in their innovative developments. This paper reports on the adopted modeling approach, the retained modeling languages, and how they all fit together.Keywords: aeronautics, certification, process modeling, project management, regulation, SME, systems engineering, VSE
Procedia PDF Downloads 1658884 Impact of Intelligent Transportation System on Planning, Operation and Safety of Urban Corridor
Authors: Sourabh Jain, S. S. Jain
Abstract:
Intelligent transportation system (ITS) is the application of technologies for developing a user–friendly transportation system to extend the safety and efficiency of urban transportation systems in developing countries. These systems involve vehicles, drivers, passengers, road operators, managers of transport services; all interacting with each other and the surroundings to boost the security and capacity of road systems. The goal of urban corridor management using ITS in road transport is to achieve improvements in mobility, safety, and the productivity of the transportation system within the available facilities through the integrated application of advanced monitoring, communications, computer, display, and control process technologies, both in the vehicle and on the road. Intelligent transportation system is a product of the revolution in information and communications technologies that is the hallmark of the digital age. The basic ITS technology is oriented on three main directions: communications, information, integration. Information acquisition (collection), processing, integration, and sorting are the basic activities of ITS. In the paper, attempts have been made to present the endeavor that was made to interpret and evaluate the performance of the 27.4 Km long study corridor having eight intersections and four flyovers. The corridor consisting of six lanes as well as eight lanes divided road network. Two categories of data have been collected such as traffic data (traffic volume, spot speed, delay) and road characteristics data (no. of lanes, lane width, bus stops, mid-block sections, intersections, flyovers). The instruments used for collecting the data were video camera, stop watch, radar gun, and mobile GPS (GPS tracker lite). From the analysis, the performance interpretations incorporated were the identification of peak and off-peak hours, congestion and level of service (LOS) at midblock sections and delay followed by plotting the speed contours. The paper proposed the urban corridor management strategies based on sensors integrated into both vehicles and on the roads that those have to be efficiently executable, cost-effective, and familiar to road users. It will be useful to reduce congestion, fuel consumption, and pollution so as to provide comfort, safety, and efficiency to the users.Keywords: ITS strategies, congestion, planning, mobility, safety
Procedia PDF Downloads 1828883 The Relationship between Marketing Mix Strategy and Valuable of Muay Thai Training and Thai Massage in Foreign Tourists' Perception
Authors: Thammamonr Khunrattanaporn
Abstract:
The purpose of the research was to examine the relationship between the marketing mix factors and valuable of Muay Thai Training and Thai massage in foreign tourists’ perception. The research used the 8 P’s of marketing framework presented in the theory of compound marketing services strategy. Data was collect using survey for 400 questionnaires using the Quota sampling from foreign tourists travelling in Thailand. The data was analyzed to determine valuation statistics, the frequency, percent average, means and standard deviation and pearson's correlation coefficients. The result shows the foreign tourists’ perception with the marketing mix strategy in term of Muay Thai training and massage regarding curriculum areas: product, pricing, channel distribution, Promotion, Personnel services, Physical evidence and external partnerships the overall, it significant at a high level. The awareness level of service and value for travelers had two aspects of service quality and value for money it significant at the highest level.Keywords: foreign tourists’ perception, marketing mix strategy, Muay Thai training, the massage
Procedia PDF Downloads 2678882 Tehran Province Water and Wastewater Company Approach on Energy Efficiency by the Development of Renewable Energy to Achieving the Sustainable Development Legal Principle
Authors: Mohammad Parvaresh, Mahdi Babaee, Bahareh Arghand, Roushanak Fahimi Hanzaee, Davood Nourmohammadi
Abstract:
Today, the intelligent network of water and wastewater as one of the key steps in realizing the smart city in the world. Use of pressure relief valves in urban water networks in order to reduce the pressure is necessary in Tehran city. But use these pressure relief valves lead to waste water, more power consumption, and environmental pollution because Tehran Province Water and Wastewater Co. use a quarter of industry 's electricity. In this regard, Tehran Province Water and Wastewater Co. identified solutions to reduce direct and indirect costs in energy use in the process of production, transmission and distribution of water because this company has extensive facilities and high capacity to realize green economy and industry. The aim of this study is to analyze the new project in water and wastewater industry to reach sustainable development.Keywords: Tehran Province Water and Wastewater Company, water network efficiency, sustainable development, International Environmental Law
Procedia PDF Downloads 2988881 Effects of Surface Roughness on a Unimorph Piezoelectric Micro-Electro-Mechanical Systems Vibrational Energy Harvester Using Finite Element Method Modeling
Authors: Jean Marriz M. Manzano, Marc D. Rosales, Magdaleno R. Vasquez Jr., Maria Theresa G. De Leon
Abstract:
This paper discusses the effects of surface roughness on a cantilever beam vibrational energy harvester. A silicon sample was fabricated using MEMS fabrication processes. When etching silicon using deep reactive ion etching (DRIE) at large etch depths, rougher surfaces are observed as a result of increased response in process pressure, amount of coil power and increased helium backside cooling readings. To account for the effects of surface roughness on the characteristics of the cantilever beam, finite element method (FEM) modeling was performed using actual roughness data from fabricated samples. It was found that when etching about 550um of silicon, root mean square roughness parameter, Sq, varies by 1 to 3 um (at 100um thick) across a 6-inch wafer. Given this Sq variation, FEM simulations predict an 8 to148 Hz shift in the resonant frequency while having no significant effect on the output power. The significant shift in the resonant frequency implies that careful consideration of surface roughness from fabrication processes must be done when designing energy harvesters.Keywords: deep reactive ion etching, finite element method, microelectromechanical systems, multiphysics analysis, surface roughness, vibrational energy harvester
Procedia PDF Downloads 1258880 The Impact of China’s Waste Import Ban on the Waste Mining Economy in East Asia
Authors: Michael Picard
Abstract:
This proposal offers to shed light on the changing legal geography of the global waste economy. Global waste recycling has become a multi-billion-dollar industry. NASDAQ predicts the emergence of a worldwide 1,296G$ waste management market between 2017 and 2022. Underlining this evolution, a new generation of preferential waste-trade agreements has emerged in the Pacific. In the last decade, Japan has concluded a series of bilateral treaties with Asian countries, and most recently with China. An agreement between Tokyo and Beijing was formalized on 7 May 2008, which forged an economic partnership on waste transfer and mining. The agreement set up International Recycling Zones, where certified recycling plants in China process industrial waste imported from Japan. Under the joint venture, Chinese companies salvage the embedded value from Japanese industrial discards, reprocess them and send them back to Japanese manufacturers, such as Mitsubishi and Panasonic. This circular economy is designed to convert surplus garbage into surplus value. Ever since the opening of Sino-Japanese eco-parks, millions of tons of plastic and e-waste have been exported from Japan to China every year. Yet, quite unexpectedly, China has recently closed its waste market to imports, jeopardizing Japan’s billion-dollar exports to China. China notified the WTO that, by the end of 2017, it would no longer accept imports of plastics and certain metals. Given China’s share of Japanese waste exports, a complete closure of China’s market would require Japan to find new uses for its recyclable industrial trash generated domestically every year. It remains to be seen how China will effectively implement its ban on waste imports, considering the economic interests at stake. At this stage, what remains to be clarified is whether China's ban on waste imports will negatively affect the recycling trade between Japan and China. What is clear, though, is the rapid transformation in the legal geography of waste mining in East-Asia. For decades, East-Asian waste trade had been tied up in an ‘ecologically unequal exchange’ between the Japanese core and the Chinese periphery. This global unequal waste distribution could be measured by the Environmental Stringency Index, which revealed that waste regulation was 39% weaker in the Global South than in Japan. This explains why Japan could legally export its hazardous plastic and electronic discards to China. The asymmetric flow of hazardous waste between Japan and China carried the colonial heritage of international law. The legal geography of waste distribution was closely associated to the imperial construction of an ecological trade imbalance between the Japanese source and the Chinese sink. Thus, China’s recent decision to ban hazardous waste imports is a sign of a broader ecological shift. As a global economic superpower, China announced to the world it would no longer be the planet’s junkyard. The policy change will have profound consequences on the global circulation of waste, re-routing global waste towards countries south of China, such as Vietnam and Malaysia. By the time the Berlin Conference takes place in May 2018, the presentation will be able to assess more accurately the effect of the Chinese ban on the transboundary movement of waste in Asia.Keywords: Asia, ecological unequal exchange, global waste trade, legal geography
Procedia PDF Downloads 214