Search results for: fuzzy delphi technique
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7124

Search results for: fuzzy delphi technique

6464 The Role of Vibro-Stone Column for Enhancing the Soft Soil Properties

Authors: Mohsen Ramezan Shirazi, Orod Zarrin, Komeil Valipourian

Abstract:

This study investigated the behavior of improved soft soils through the vibro replacement technique by considering their settlements and consolidation rates and the applicability of this technique in various types of soils and settlement and bearing capacity calculations.

Keywords: bearing capacity, expansive clay, stone columns, vibro techniques

Procedia PDF Downloads 577
6463 Design of a Controlled BHJ Solar Cell Using Modified Organic Vapor Spray Deposition Technique

Authors: F. Stephen Joe, V. Sathya Narayanan, V. R. Sanal Kumar

Abstract:

A comprehensive review of the literature on photovoltaic cells has been carried out for exploring the better options for cost efficient technologies for future solar cell applications. Literature review reveals that the Bulk Heterojunction (BHJ) Polymer Solar cells offer special opportunities as renewable energy resources. It is evident from the previous studies that the device fabricated with TiOx layer shows better power conversion efficiency than that of the device without TiOx layer. In this paper, authors designed a controlled BHJ solar cell using a modified organic vapor spray deposition technique facilitated with a vertical-moving gun named as 'Stephen Joe Technique' for getting a desirable surface pattern over the substrate to improving its efficiency over the years for industrial applications. We comprehended that the efficient processing and the interface engineering of these solar cells could increase the efficiency up to 5-10 %.

Keywords: BHJ polymer solar cell, photovoltaic cell, solar cell, Stephen Joe technique

Procedia PDF Downloads 533
6462 Non-Invasive Techniques for Management of Carious Primary Dentition Using Silver Diamine Fluoride and Moringa Extract as a Modification of the Hall Technique

Authors: Rasha F. Sharaf

Abstract:

Treatment of dental caries in young children is considered a great challenge for all dentists, especially with uncooperative children. Recently non-invasive techniques have been highlighted as they alleviate the need for local anesthesia and other painful procedures during management of carious teeth and, at the same time, increase the success rate of the treatment done. Silver Diamine Fluoride (SDF) is one of the most effective cariostatic materials that arrest the progression of carious lesions and aid in remineralizing the demineralized tooth structure. Both fluoride and silver ions proved to have an antibacterial action and aid in the precipitation of an insoluble layer that prevents further decay. At the same time, Moringa proved to have an effective antibacterial action against different types of bacteria, therefore, it can be used as a non-invasive technique for the management of caries in children. One of the important theories for the control of caries is by depriving the cariogenic bacteria from nutrients causing their starvation and death, which can be achieved by applying stainless steel crown on primary molars with carious lesions which are not involving the pulp, and this technique is known as Hall technique. The success rate of the Hall technique can be increased by arresting the carious lesion using either SDF or Moringa and gaining the benefit of their antibacterial action. Multiple clinical cases with 1 year follow up will be presented, comparing different treatment options, and using various materials and techniques for non-invasive and non-painful management of carious primary teeth.

Keywords: SDF, hall technique, carious primary teeth, moringa extract

Procedia PDF Downloads 87
6461 Effect of Boric Acid Content on the Structural and Optical Properties of In2O3 Films Prepared by Spray Pyrolysis Technique

Authors: Mustafa Öztas, Metin Bedir, Yahya Özdemir

Abstract:

Boron doped of In2O3 films were prepared by spray pyrolysis technique at 350 °C substrate temperature, which is a low cost and large area technique to be well-suited for the manufacture of solar cells, using boric acid (H3BO3) as dopant source, and their properties were investigated as a function of doping concentration. X-ray analysis showed that the films were polycrystalline fitting well with a hexagonal structure and have preferred orientation in (220) direction. The changes observed in the energy band gap and structural properties of the films related to the boric acid concentration are discussed in detail.

Keywords: spray pyrolysis, In2O3, boron, optical properties, boric acid

Procedia PDF Downloads 579
6460 Burnback Analysis of Star Grain Using Level-Set Technique

Authors: Ali Yasin, Ali Kamran, Muhammad Safdar

Abstract:

In order to reduce the hefty cost involved in terms of time and project cost, the development and application of advanced numerical tools to address the burn-back analysis problem in solid rocket motor design and development is the need of time. Several advanced numerical schemes have been developed in recent times, but their usage in the design of propellant grain of solid rocket motors is very rare. In this paper, an advanced numerical technique named the Level-Set method has been utilized for the burn-back analysis of star grain to study the effect of geometrical parameters on ballistic performance indicators such as solid loading, neutrality, and sliver percentage. In the level set technique, simple finite difference methods may fail quickly and require more sophisticated non-oscillatory schemes for feasible long-time simulation. For internal ballistic calculations, a simplified equilibrium pressure method is utilized. Preliminary results of the operative conditions, for all the combustion time, of star grain burn-back using level set techniques are compared with published results using CAD technique to test the developed numerical model.

Keywords: solid rocket motor, internal ballistic, level-set technique, star grain

Procedia PDF Downloads 114
6459 Detection of Intentional Attacks in Images Based on Watermarking

Authors: Hazem Munawer Al-Otum

Abstract:

In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.

Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection

Procedia PDF Downloads 248
6458 The Review for Repair of Masonry Structures Using the Crack Stitching Technique

Authors: Sandile Daniel Ngidi

Abstract:

Masonry structures often crack due to different factors, which include differential movement of structures, thermal expansion, and seismic waves. Retrofitting is introduced to ensure that these cracks do not expand to a point of making the wall fail. Crack stitching is one of many repairing methods used to repair cracked masonry walls. It is done by stitching helical stainless steel reinforcement bars to reconnect and stabilize the wall. The basic element of this reinforcing system is the mechanical interlink between the helical stainless-steel bar and the grout, which makes it such a flexible and well-known masonry repair system. The objective of this review was to use previous experimental work done by different authors to check the efficiency and effectiveness of using the crack stitching technique to repair and stabilize masonry walls. The technique was found to be effective to rejuvenate the strength of a masonry structure to be stronger than initial strength. Different factors were investigated, which include economic features, sustainability, buildability, and suitability of this technique for application in developing communities.

Keywords: brickforce, crack-stitching, masonry concrete, reinforcement, wall panels

Procedia PDF Downloads 162
6457 Remote Assessment and Change Detection of GreenLAI of Cotton Crop Using Different Vegetation Indices

Authors: Ganesh B. Shinde, Vijaya B. Musande

Abstract:

Cotton crop identification based on the timely information has significant advantage to the different implications of food, economic and environment. Due to the significant advantages, the accurate detection of cotton crop regions using supervised learning procedure is challenging problem in remote sensing. Here, classifiers on the direct image are played a major role but the results are not much satisfactorily. In order to further improve the effectiveness, variety of vegetation indices are proposed in the literature. But, recently, the major challenge is to find the better vegetation indices for the cotton crop identification through the proposed methodology. Accordingly, fuzzy c-means clustering is combined with neural network algorithm, trained by Levenberg-Marquardt for cotton crop classification. To experiment the proposed method, five LISS-III satellite images was taken and the experimentation was done with six vegetation indices such as Simple Ratio, Normalized Difference Vegetation Index, Enhanced Vegetation Index, Green Atmospherically Resistant Vegetation Index, Wide-Dynamic Range Vegetation Index, Green Chlorophyll Index. Along with these indices, Green Leaf Area Index is also considered for investigation. From the research outcome, Green Atmospherically Resistant Vegetation Index outperformed with all other indices by reaching the average accuracy value of 95.21%.

Keywords: Fuzzy C-Means clustering (FCM), neural network, Levenberg-Marquardt (LM) algorithm, vegetation indices

Procedia PDF Downloads 306
6456 A Framework for the Evaluation of Infrastructures’ Serviceability

Authors: Kyonghoon Kim, Wonyoung Park, Taeil Park

Abstract:

In 1994, Korea experienced a national tragedy of Seongsu Bridge collapse. The accident was severe enough to alert governmental officers to the problem of existing management policy for national infrastructures. As a result, government legislated the ‘Guidelines for the safety inspection and test of infrastructure’ which have been utilized as the primary tool to make decision for the maintenance and rehabilitation of infrastructure for last twenty years. Although it is clear that the guideline established a basics how to evaluate and manage the condition of infrastructures in systematic manner, it is equally clear that the guideline needs improvements in order to obtain reasonable investment decisions for budget allocation. Because its inspection and evaluation procedures mainly focused on the structural condition of infrastructures, it was hard to make decision when the infrastructures were in same level of structural condition. In addition, it did not properly reflect various aspects of infrastructures such as performance, public demand, capacity, etc., which were more valuable to public. Regardless of the importance, these factors were commonly neglected in governmental decision-making process, because there factors were somewhat subjective and difficult to quantify in rational manner. Thus, this study proposes a framework to properly evaluate the serviceability indicators using AHP and Fuzzy approach. The framework is expected to assist governmental agency in establishing effective investment strategies for budget planning.

Keywords: infrastructure, evaluation, serviceability, fuzzy

Procedia PDF Downloads 277
6455 Wrapping–Decorative Movement of Time

Authors: Rudranil Das

Abstract:

Wrapping is a basic textile technique; it is having a great quality of decorative view. Since long back it has been embellishing life of people and their culture in different forms. It links cultures, beliefs, thoughts, technology, and above all, people. Through etymology we can study the movement of the word power of wrapping undoubtedly but in depth analyze it could provide many concepts of structural ability. Only in India, more than 105 different processes exist in the way of saree [a type of women attire] wrapping. Then many more other clothing we found in allover world which connects this technique and construction too. One of the main objectives of this study is to enrich wrapping explanation and come up with surfaces by this technique. The deliberate more fragile and stretchable structural framework makes it more appropriate in different users according to their necessity. Developments of design and technology could create new industry segment and generate a marginalized employment for the people too.

Keywords: concept, existence, philosophical attachment, technological advancement

Procedia PDF Downloads 219
6454 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography

Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway

Abstract:

This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.

Keywords: steganography, stego, LSB, crop

Procedia PDF Downloads 260
6453 Energy Management System

Authors: S. Periyadharshini, K. Ramkumar, S. Jayalalitha, M. GuruPrasath, R. Manikandan

Abstract:

This paper presents a formulation and solution for industrial load management and product grade problem. The formulation is created using linear programming technique thereby optimizing the electricity cost by scheduling the loads satisfying the process, storage, time zone and production constraints which will create an impact of reducing maximum demand and thereby reducing the electricity cost. Product grade problem is formulated using integer linear programming technique of optimization using lingo software and the results show that overall increase in profit margin. In this paper, time of use tariff is utilized and this technique will provide significant reductions in peak electricity consumption.

Keywords: cement industries, integer programming, optimal formulation, objective function, constraints

Procedia PDF Downloads 579
6452 Case-Based Reasoning for Build Order in Real-Time Strategy Games

Authors: Ben G. Weber, Michael Mateas

Abstract:

We present a case-based reasoning technique for selecting build orders in a real-time strategy game. The case retrieval process generalizes features of the game state and selects cases using domain-specific recall methods, which perform exact matching on a subset of the case features. We demonstrate the performance of the technique by implementing it as a component of the integrated agent framework of McCoy and Mateas. Our results demonstrate that the technique outperforms nearest-neighbor retrieval when imperfect information is enforced in a real-time strategy game.

Keywords: case based reasoning, real time strategy systems, requirements elicitation, requirement analyst, artificial intelligence

Procedia PDF Downloads 432
6451 Medical Knowledge Management since the Integration of Heterogeneous Data until the Knowledge Exploitation in a Decision-Making System

Authors: Nadjat Zerf Boudjettou, Fahima Nader, Rachid Chalal

Abstract:

Knowledge management is to acquire and represent knowledge relevant to a domain, a task or a specific organization in order to facilitate access, reuse and evolution. This usually means building, maintaining and evolving an explicit representation of knowledge. The next step is to provide access to that knowledge, that is to say, the spread in order to enable effective use. Knowledge management in the medical field aims to improve the performance of the medical organization by allowing individuals in the care facility (doctors, nurses, paramedics, etc.) to capture, share and apply collective knowledge in order to make optimal decisions in real time. In this paper, we propose a knowledge management approach based on integration technique of heterogeneous data in the medical field by creating a data warehouse, a technique of extracting knowledge from medical data by choosing a technique of data mining, and finally an exploitation technique of that knowledge in a case-based reasoning system.

Keywords: data warehouse, data mining, knowledge discovery in database, KDD, medical knowledge management, Bayesian networks

Procedia PDF Downloads 383
6450 Study of Stability of a Slope by the Soil Nailed Technique

Authors: Abdelhak Soudani

Abstract:

Using the limit equilibrium method in geotechnical field is very important for large projects. This work contributes to the understanding and analysis of the building unstable slopes by the technique of soil nailed with the used of software called GEO-SLOPE calculation based on limit equilibrium method. To achieve our objective, we began a review of the literature on landslides, and techniques of slope stability. Then, we presented a real case slope likely to slip through the realization of the EastWest Highway (M5 stretch between Khemis Miliana and Hoceinia). We also process the application of reinforcement technique nailed soil. The analysis is followed by a parametric study, which shows the impact of parameters given or chosen on various outcomes. Another method of reinforcement (use of micro-piles) has been suggested for improving the stability of the slope

Keywords: slope stability, strengthening, slip, soil nail, GEO-SLOPE

Procedia PDF Downloads 450
6449 SO2 Sensing Performance of Nanostructured CdSnO3 Thin Films Prepared by Spray Pyrolysis Technique

Authors: R. H. Bari

Abstract:

The nanostructured thin films of CdSnO3 are sensitive to change in their environment. CdSnO3 is successfully used as gas sensor due to the dependence of the electrical conductivity on the ambient gas composition. Nanostructured CdSnO3 thin films of different substrate temperature (300 0C, 350 0C, 400 0C and 450 0C) were deposited onto heated glass substrate by simple spray pyrolysis (SP) technique. Sensing elements of nanostructured CdSnO3 were annealed at 500 0C for 1 hrs. Characterization includes a different analytical technique such as, X-ray diffractogram (XRD), energy dispersive X-ray analysis (EDAX), and Field emission scanning electron microscope (FE-SEM). The average grain size observed from XRD and FF-SEM was found to be less than 18.36 and 23 nm respectively. The films sprayed at substrate temperature for 400 0C was observed to be most sensitive (S = 530) to SO2 for 500 ppm at 300 0C. The response and recovery time is 4 sec, 8 sec respectively.

Keywords: nanostructured CdSnO3, spray pyrolysis, SO2 gas sensing, quick response

Procedia PDF Downloads 279
6448 Optimization of Multiplier Extraction Digital Filter On FPGA

Authors: Shiksha Jain, Ramesh Mishra

Abstract:

One of the most widely used complex signals processing operation is filtering. The most important FIR digital filter are widely used in DSP for filtering to alter the spectrum according to some given specifications. Power consumption and Area complexity in the algorithm of Finite Impulse Response (FIR) filter is mainly caused by multipliers. So we present a multiplier less technique (DA technique). In this technique, precomputed value of inner product is stored in LUT. Which are further added and shifted with number of iterations equal to the precision of input sample. But the exponential growth of LUT with the order of FIR filter, in this basic structure, makes it prohibitive for many applications. The significant area and power reduction over traditional Distributed Arithmetic (DA) structure is presented in this paper, by the use of slicing of LUT to the desired length. An architecture of 16 tap FIR filter is presented, with different length of slice of LUT. The result of FIR Filter implementation on Xilinx ISE synthesis tool (XST) vertex-4 FPGA Tool by using proposed method shows the increase of the maximum frequency, the decrease of the resources as usage saving in area with more number of slices and the reduction dynamic power.

Keywords: multiplier less technique, linear phase symmetric FIR filter, FPGA tool, look up table

Procedia PDF Downloads 383
6447 Criticality Assessment Model for Water Pipelines Using Fuzzy Analytical Network Process

Authors: A. Assad, T. Zayed

Abstract:

Water networks (WNs) are responsible of providing adequate amounts of safe, high quality, water to the public. As other critical infrastructure systems, WNs are subjected to deterioration which increases the number of breaks and leaks and lower water quality. In Canada, 35% of water assets require critical attention and there is a significant gap between the needed and the implemented investments. Thus, the need for efficient rehabilitation programs is becoming more urgent given the paradigm of aging infrastructure and tight budget. The first step towards developing such programs is to formulate a Performance Index that reflects the current condition of water assets along with its criticality. While numerous studies in the literature have focused on various aspects of condition assessment and reliability, limited efforts have investigated the criticality of such components. Critical water mains are those whose failure cause significant economic, environmental or social impacts on a community. Inclusion of criticality in computing the performance index will serve as a prioritizing tool for the optimum allocating of the available resources and budget. In this study, several social, economic, and environmental factors that dictate the criticality of a water pipelines have been elicited from analyzing the literature. Expert opinions were sought to provide pairwise comparisons of the importance of such factors. Subsequently, Fuzzy Logic along with Analytical Network Process (ANP) was utilized to calculate the weights of several criteria factors. Multi Attribute Utility Theories (MAUT) was then employed to integrate the aforementioned weights with the attribute values of several pipelines in Montreal WN. The result is a criticality index, 0-1, that quantifies the severity of the consequence of failure of each pipeline. A novel contribution of this approach is that it accounts for both the interdependency between criteria factors as well as the inherited uncertainties in calculating the criticality. The practical value of the current study is represented by the automated tool, Excel-MATLAB, which can be used by the utility managers and decision makers in planning for future maintenance and rehabilitation activities where high-level efficiency in use of materials and time resources is required.

Keywords: water networks, criticality assessment, asset management, fuzzy analytical network process

Procedia PDF Downloads 138
6446 Needle Track Technique In Strabismus Surgery

Authors: Seema Dutt Bandhu, Yashi Bansal, Tania Moudgil, Barinder Kaur

Abstract:

Introduction: Scleral perforation during the passage of suture needle is a known complication of strabismus surgery. The present study was conducted to evolve a safe and easy technique of passing the suture needle through the sclera. A scleral tunnel was created with a 26-guage needle through which the suture needle was passed. The rest of the steps of strabismus surgery were carried out as usual. Material and Methods: After taking clearance from the Institutional Ethics Committee, an interventional study was carried out on twenty patients. The scleral tunnel technique was performed on the patients of strabismus after taking written informed consent. Before passing the suture needle through the sclera during strabismus surgery, a tunnel through approximately half the thickness of the sclera was created with the help of a bent 26-gauge needle. The suture needle was then passed through this tunnel. Rest of the steps of the surgery were carried out in the conventional manner. In a control group of same number of patients, the surgery was performed in the conventional method. Both the groups were followed up for any complications. Ease of passing suture and surgeons’ satisfaction with the technique was noted on a 10-point Likert scale. Results: None of the patients in either group suffered from any complications. Four surgeons participated in the study. The average Likert scale score of the surgeons for satisfaction with the technique was 4.5 on a scale of 5. The score for ease of passage of suture needle was 5 on a score of 5. Discussion: Scleral perforation during passing the sutures through the sclera is a known complication of strabismus surgery. Incidence reported is 7.8% It occurs due to inappropriate engagement of the scleral tissue or passage of the suture needle along a wrong axis during the process of passing the suture needle. The needle track technique eases the passage of passing the suture needle through the sclera as the engagement of the scleral tissue can be done with greater control with a 26-guage needle. The surgeons have reported that they are highly satisfied with the technique and they have reported that the technique eased the passage of the suture needle through the sclera.

Keywords: suture, scleral tunnel, strabismus, scleral perforation

Procedia PDF Downloads 70
6445 Improving the Efficiency of Repacking Process with Lean Technique: The Study of Read With Me Group Company Limited

Authors: Jirayut Phetchuen, Jongkol Srithorn

Abstract:

The study examines the unloading and repacking process of Read With Me Group Company Limited. The research aims to improve the old work process and build a new efficient process with the Lean Technique and new machines for faster delivery without increasing the number of employees. Currently, two employees work based on five days on and off. However, workplace injuries have delayed the delivery time, especially the delivery to the neighboring countries. After the process improvement, the working space increased by 25%, the Process Lead Time decreased by 40%, the work efficiency increased by 175.82%, and the work injuries rate was reduced to zero.

Keywords: lean technique, plant layout design, U-shaped disassembly line, value stream mapping

Procedia PDF Downloads 92
6444 Performance Analysis of Different PSK Scheme on Receiver Sensitivity and Round Trip Distance for Chipless RFID System for UWB with Rayleigh Fading Channels in Outdoor NLOS Environment

Authors: Khalid Mahmud

Abstract:

In this paper, an analytic approach is presented to evaluate the Bit Error Rate (BER) and round trip distance for a UWB chipless RFID system using diversity technique at the reader receiver using different modulation technique. The analysis is carried out with multiresonator based chipless RFID tags using frequency range from 3 GHz − 6 GHz and bandwidth of 500 M Hz in outdoor non-line-of-sight (NLOS) environment. SISO configuration is used to communicate from the reader to the tag and SIMO configuration is used do vice versa. Maximal Ratio Combining (MRC) technique is used in the reader. MPSK, DQPSK, DBPSK, BPSK, QPSK and DMPSK modulation techniques are considered with coherent demodulation to evaluate the BER performance. From the numerical analysis of the results, it is found that at a given BER maximum possible round trip distance can be achieved using DMPSK modulation technique. In addition, it has been proved that, while using DMPSK modulation technique, the application of diversity has very little effect on the overall improvement in reader receiver sensitivity and achievable distance. Finally the method not only proves to be a very good way for tag detection in case of a chipless RFID system but also gives a clear insight regarding the interrelationship between BER, read range, reader received power, number of receiving antenna in outdoor NLOS environment.

Keywords: EGC, MRC, BER, read range, diversity

Procedia PDF Downloads 344
6443 The Femoral Eversion Endarterectomy Technique with Transection: Safety and Efficacy

Authors: Hansraj Riteesh Bookun, Emily Maree Stevens, Jarryd Leigh Solomon, Anthony Chan

Abstract:

Objective: This was a retrospective cross-sectional study evaluating the safety and efficacy of femoral endarterectomy using the eversion technique with transection as opposed to the conventional endarterectomy technique with either vein or synthetic patch arterioplasty. Methods: Between 2010 to mid 2017, 19 patients with mean age of 75.4 years, underwent eversion femoral endarterectomy with transection by a single surgeon. There were 13 males (68.4%), and the comorbid burden was as follows: ischaemic heart disease (53.3%), diabetes (43.8%), stage 4 kidney impairment (13.3%) and current or ex-smoking (73.3%). The indications were claudication (45.5%), rest pain (18.2%) and tissue loss (36.3%). Results: The technical success rate was 100%. One patient required a blood transfusion following bleeding from intraoperative losses. Two patients required blood transfusions from low post operative haemogloblin concentrations – one of them in the context of myelodysplastic syndrome. There were no unexpected returns to theatre. The mean length of stay was 11.5 days with two patients having inpatient stays of 36 and 50 days respectively due to the need for rehabilitation. There was one death unrelated to the operation. Conclusion: The eversion technique with transection is safe and effective with low complication rates and a normally expected length of stay. It poses the advantage of not requiring a synthetic patch. This technique features minimal extraneous dissection as there is no need to harvest vein for a patch. Additionally, future endovascular interventions can be performed by puncturing the native vessel. There is no change to the femoral bifurcation anatomy after this technique. We posit that this is a useful adjunct to the surgeon’s panoply of vascular surgical techniques.

Keywords: endarterectomy, eversion, femoral, vascular

Procedia PDF Downloads 187
6442 A Double PWM Source Inverter Technique with Reduced Leakage Current for Application on Standalone Systems

Authors: Md.Noman Habib Khan, M. S. Tajul Islam, T. S. Gunawan, M. Hasanuzzaman

Abstract:

The photovoltaic (PV) panel with no galvanic isolation system is well-known technique in the world which is effective and deliver power with enhanced efficiency. The PV generation presented here is for stand-alone system installed in remote areas when as the resulting power gets connected to electronic load installation instead of being tied to the grid. Though very small, even then transformer-less topology is shown to be with leakage in pico-ampere range. By using PWM technique PWM, leakage current in different situations is shown. The results that are demonstrated in this paper show how the pico-ampere current is reduced to femto-ampere through use of inductors and capacitors of suitable values of inductor and capacitors with the load.

Keywords: photovoltaic (PV) panel, duty cycle, pulse duration modulation (PDM), leakage current

Procedia PDF Downloads 526
6441 Application of Waterflooding Technique in Petroleum Reservoir

Authors: Khwaja Naweed Seddiqi

Abstract:

Hydrocarbon resources are important for the redevelopment and sustainable progress of Afghanistan’s infrastructure. This paper aim is to increase the oil recovery of Hitervian reservoir of Angut oil field in north part of Afghanistan by an easy and available method, which is Buckley-Leveret frontal displacement theory. In this paper oil displacement by water that takes placed by injecting water into the under laying petroleum reservoir which called waterflooding technique is investigated. The theory is investigated in a laboratory experiment first then applied in Angut oil field which is now under the operation of a private petroleum company. Based on this study oil recovery of Angut oil field, residual oil saturation, Buckle-Leveret saturation and FBL is determined.

Keywords: waterflooding technique, two phase fluid flow, Buckley-Leveret, petroleum engineering

Procedia PDF Downloads 428
6440 Ranking of Inventory Policies Using Distance Based Approach Method

Authors: Gupta Amit, Kumar Ramesh, P. C. Tewari

Abstract:

Globalization is putting enormous pressure on the business organizations specially manufacturing one to rethink the supply chain in innovative manners. Inventory consumes major portion of total sale revenue. Effective and efficient inventory management plays a vital role for the successful functioning of any organization. Selection of inventory policy is one of the important purchasing activities. This paper focuses on selection and ranking of alternative inventory policies. A deterministic quantitative model-based on Distance Based Approach (DBA) method has been developed for evaluation and ranking of inventory policies. We have employed this concept first time for this type of the selection problem. Four inventory policies Economic Order Quantity (EOQ), Just in Time (JIT), Vendor Managed Inventory (VMI) and monthly policy are considered. Improper selection could affect a company’s competitiveness in terms of the productivity of its facilities and quality of its products. The ranking of inventory policies is a multi-criteria problem. There is a need to first identify the selection criteria and then processes the information with reference to relative importance of attributes for comparison. Criteria values for each inventory policy can be obtained either analytically or by using a simulation technique or they are linguistic subjective judgments defined by fuzzy sets, like, for example, the values of criteria. A methodology is developed and applied to rank the inventory policies.

Keywords: inventory policy, ranking, DBA, selection criteria

Procedia PDF Downloads 376
6439 Ternary Content Addressable Memory Cell with a Leakage Reduction Technique

Authors: Gagnesh Kumar, Nitin Gupta

Abstract:

Ternary Content Addressable Memory cells are mainly popular in network routers for packet forwarding and packet classification, but they are also useful in a variety of other applications that require high-speed table look-up. The main TCAM-design challenge is to decrease the power consumption associated with the large amount of parallel active circuitry, without compromising with speed or memory density. Furthermore, when the channel length decreases, leakage power becomes more significant, and it can even dominate dynamic power at lower technologies. In this paper, we propose a TCAM-design technique, called Virtual Power Supply technique that reduces the leakage by a substantial amount.

Keywords: match line (ML), search line (SL), ternary content addressable memory (TCAM), Leakage power (LP)

Procedia PDF Downloads 287
6438 A Study on the Iterative Scheme for Stratified Shields Gamma Ray Buildup Factors Using Layer-Splitting Technique in Double-Layer Shields

Authors: Sari F. Alkhatib, Chang Je Park, Gyuhong Roh

Abstract:

The iterative scheme which is used to treat buildup factors for stratified shields is being investigated here using the layer-splitting technique. A simple suggested formalism for the scheme based on the Kalos’ formula is introduced, based on which the implementation of the testing technique is carried out. The second layer in a double-layer shield was split into two equivalent layers and the scheme (with the suggested formalism) was implemented on the new “three-layer” shield configuration. The results of such manipulation on water-lead and water-iron shields combinations are presented here for 1 MeV photons. It was found that splitting the second layer introduces some deviation on the overall buildup factor value. This expected deviation appeared to be higher in the case of low Z layer followed by high Z. However, the overall performance of the iterative scheme showed a great consistency and strong coherence even with the introduced changes. The introduced layer-splitting testing technique shows the capability to be implemented in test the iterative scheme with a wide range of formalisms.

Keywords: buildup factor, iterative scheme, stratified shields, layer-splitting tecnique

Procedia PDF Downloads 407
6437 Fuzzy Set Qualitative Comparative Analysis in Business Models' Study

Authors: K. Debkowska

Abstract:

The aim of this article is presenting the possibilities of using Fuzzy Set Qualitative Comparative Analysis (fsQCA) in researches concerning business models of enterprises. FsQCA is a bridge between quantitative and qualitative researches. It's potential can be used in analysis and evaluation of business models. The article presents the results of a study conducted on the basis of enterprises belonging to different sectors: transport and logistics, industry, building construction, and trade. The enterprises have been researched taking into account the components of business models and the financial condition of companies. Business models are areas of complex and heterogeneous nature. The use of fsQCA has enabled to answer the following question: which components of a business model and in which configuration influence better financial condition of enterprises. The analysis has been performed separately for particular sectors. This enabled to compare the combinations of business models' components which actively influence the financial condition of enterprises in analyzed sectors. The following components of business models were analyzed for the purposes of the study: Key Partners, Key Activities, Key Resources, Value Proposition, Channels, Cost Structure, Revenue Streams, Customer Segment and Customer Relationships. These components of the study constituted the variables shaping the financial results of enterprises. The results of the study lead us to believe that fsQCA can help in analyzing and evaluating a business model, which is important in terms of making a business decision about the business model used or its change. In addition, results obtained by fsQCA can be applied by all stakeholders connected with the company.

Keywords: business models, components of business models, data analysis, fsQCA

Procedia PDF Downloads 166
6436 Risk Mapping of Road Traffic Incidents in Greater Kampala Metropolitan Area for Planning of Emergency Medical Services

Authors: Joseph Kimuli Balikuddembe

Abstract:

Road traffic incidents (RTIs) continue to be a serious public health and development burden around the globe. Compared to high-income countries (HICs), the low and middle-income countries (LMICs) bear the heaviest brunt of RTIs. Like other LMICs, Uganda, a country located in Eastern Africa, has been experiencing a worryingly high burden of RTIs and their associated impacts. Over the years, the highest number of all the total registered RTIs in Uganda has taken place in the Greater Kampala Metropolitan Area (GKMA). This places a tremendous demand on the few existing emergency medical services (EMS) to adequately respond to those affected. In this regard, the overall objective of the study was to risk map RTIs in the GKMA so as to help in the better planning of EMS for the victims of RTIs. Other objectives included: (i) identifying the factors affecting the exposure, vulnerability and EMS capacity for the victims of RTIs; (ii) identifying the RTI prone-areas and estimating their associated risk factors; (iii) identifying the weaknesses and capacities which affect the EMS systems for RTIs; and (iv) determining the strategies and priority actions that can help to improve the EMS response for RTI victims in the GKMA. To achieve these objectives, a mixed methodological approach was used in four phrases for approximately 15 months. It employed a systematic review based on the preferred reporting items for systematic reviews and meta-data analysis guidelines; a Delphi panel technique; retrospective data analysis; and a cross-sectional method. With Uganda progressing forward as envisaged in its 'Vision 2040', the GKMA, which is the country’s political and socioeconomic epicenter, is experiencing significant changes in terms of population growth, urbanization, infrastructure development, rapid motorization and other factors. Unless appropriate actions are taken, these changes are likely to worsen the already alarming rate of RTIs in Uganda, and in turn also to put pressure on the few existing EMS and facilities to render care for those affected. Therefore, road safety vis-à-vis injury prevention measures, which are needed to reduce the burden of RTIs, should be multifaceted in nature so that they closely correlate with the ongoing dynamics that contribute to RTIs, particularly in the GKMA and Uganda as a whole.

Keywords: emergency medical services, Kampala, risk mapping, road traffic incidents

Procedia PDF Downloads 105
6435 Totally Robotic Gastric Bypass Using Modified Lonroth Technique

Authors: Arun Prasad

Abstract:

Background: Robotic Bariatric Surgery is a good option for the super obese where laparoscopy demands challenging technical skills. Gastric bypass can be difficult due to inability of the robot to work in two quadrants at the same time. Lonroth technique of gastric bypass involves a totally supracolic surgery where all anastomosis are done in one quadrant only. Methods: We have done 78 robotic gastric bypass surgeries using the modified Lonroth technique. The robot is docked above the head of the patient in the midline. Camera port is placed supra umbilically. Two ports are placed on the left side of the patient and one port on the right side of the patient. An assistant port is placed between the camera port and right sided robotic port for use of stapler. Gastric pouch is made first followed by the gastrojejunostomy that is a four layered sutured anastomosis. Jejuno jejunostomy is then performed followed by a leak test and then the jejunum is divided. A 150 cm biliopancreatic limb and a 75 cm alimentary limb are finally obtained. Mesenteric and Petersen’s defects are then closed. Results: All patients had a successful robotic procedure. Mean time taken in the first 5 cases was 130 minutes. This reduced to a mean of 95 minutes in the last five cases. There were no intraoperative or post operative complications. Conclusions: While a hybrid technique of partly laparoscopic and partly robotic gastric bypass has been done at many centres, we feel using the modified Lonroth technique, a totally robotic gastric bypass surgery fully utilizes the potential of robotic bariatric surgery.

Keywords: robot, bariatric, totally robotic, gastric bypass

Procedia PDF Downloads 247