Search results for: network dynamic transmission modes
10109 Probing Multiple Relaxation Process in Zr-Cu Base Alloy Using Mechanical Spectroscopy
Authors: A. P. Srivastava, D. Srivastava, D. J. Browne
Abstract:
Relaxation dynamics of Zr44Cu40Al8Ag8 bulk metallic glass (BMG) has been probed using dynamic mechanical analyzer. The BMG sample was casted in the form of a plate of dimension 55 mm x 40 mm x 3 mm using tilt casting technique. X-ray diffraction and transmission electron microscope have been used for the microstructural characterization of as-cast BMG. For the mechanical spectroscopy study, samples in the form of a bar of size 55 mm X 2 mm X 3 mm were machined from the BMG plate. The mechanical spectroscopy was performed on dynamic mechanical analyzer (DMA) by 50 mm 3-point bending method in a nitrogen atmosphere. It was observed that two glass transition process were competing in supercooled liquid region around temperature 390°C and 430°C. The supercooled liquid state was completely characterized using DMA and differential scanning calorimeter (DSC). In addition to the main α-relaxation process, presence of β relaxation process around temperature 360°C; below the glass transition temperature was also observed. The β relaxation process could be described by Arrhenius law with the activation energy of 160 kJ/mole. The volume of the flow unit associated with this relaxation process has been estimated. The results from DMA study has been used to characterize the shear transformation zone in terms of activation volume and size. High fragility parameter value of 34 and higher activation volume indicates that this alloy could show good plasticity in supercooled liquid region. The possible mechanism for the relaxation processes has been discussed.Keywords: DMA, glass transition, metallic glass, thermoplastic forming
Procedia PDF Downloads 29510108 Optimizing Network Latency with Fast Path Assignment for Incoming Flows
Abstract:
Various flows in the network require to go through different types of middlebox. The improper placement of network middlebox and path assignment for flows could greatly increase the network latency and also decrease the performance of network. Minimizing the total end to end latency of all the ows requires to assign path for the incoming flows. In this paper, the flow path assignment problem in regard to the placement of various kinds of middlebox is studied. The flow path assignment problem is formulated to a linear programming problem, which is very time consuming. On the other hand, a naive greedy algorithm is studied. Which is very fast but causes much more latency than the linear programming algorithm. At last, the paper presents a heuristic algorithm named FPA, which takes bottleneck link information and estimated bandwidth occupancy into consideration, and achieves near optimal latency in much less time. Evaluation results validate the effectiveness of the proposed algorithm.Keywords: flow path, latency, middlebox, network
Procedia PDF Downloads 20710107 Study on Sharp V-Notch Problem under Dynamic Loading Condition Using Symplectic Analytical Singular Element
Authors: Xiaofei Hu, Zhiyu Cai, Weian Yao
Abstract:
V-notch problem under dynamic loading condition is considered in this paper. In the time domain, the precise time domain expanding algorithm is employed, in which a self-adaptive technique is carried out to improve computing accuracy. By expanding variables in each time interval, the recursive finite element formulas are derived. In the space domain, a Symplectic Analytical Singular Element (SASE) for V-notch problem is constructed addressing the stress singularity of the notch tip. Combining with the conventional finite elements, the proposed SASE can be used to solve the dynamic stress intensity factors (DSIFs) in a simple way. Numerical results show that the proposed SASE for V-notch problem subjected to dynamic loading condition is effective and efficient.Keywords: V-notch, dynamic stress intensity factor, finite element method, precise time domain expanding algorithm
Procedia PDF Downloads 17210106 Non-Destructive Testing of Metal Pipes with Ultrasonic Sensors Based on Determination of Maximum Ultrasonic Frequency
Authors: Herlina Abdul Rahim, Javad Abbaszadeh, Ruzairi Abdul Rahim
Abstract:
In this research, the non-invasive ultrasonic transmission tomography is investigated. In order to model the ultrasonic wave scattering for different thickness of metal pipes, two-dimensional (2D) finite element modeling (FEM) has been utilized. The wall thickness variation of the metal pipe and its influence on propagation of the ultrasonic pressure wave are explored in this paper, includes frequency analysing in order to find the maximum applicable frequency. The simulation results have been compared to experimental data and are shown to provide key insight for this well-defined experimental case by explaining the achieved reconstructed images from experimental setup. Finally, the experimental results which are useful for further investigation for the application of ultrasonic transmission tomography in industry are illustrated.Keywords: ultrasonic transmission tomography, ultrasonic sensors, ultrasonic wave, non-invasive tomography, metal pipe
Procedia PDF Downloads 35910105 Design of Local Interconnect Network Controller for Automotive Applications
Authors: Jong-Bae Lee, Seongsoo Lee
Abstract:
Local interconnect network (LIN) is a communication protocol that combines sensors, actuators, and processors to a functional module in automotive applications. In this paper, a LIN ver. 2.2A controller was designed in Verilog hardware description language (Verilog HDL) and implemented in field-programmable gate array (FPGA). Its operation was verified by making full-scale LIN network with the presented FPGA-implemented LIN controller, commercial LIN transceivers, and commercial processors. When described in Verilog HDL and synthesized in 0.18 μm technology, its gate size was about 2,300 gates.Keywords: local interconnect network, controller, transceiver, processor
Procedia PDF Downloads 28810104 Molecular Dynamics Analysis onI mpact Behaviour of Carbon Nanotubes and Graphene Sheets
Authors: Sajjad Seifoori
Abstract:
Impact behavior of striker on graphene sheet and carbon nanotube is investigated based on molecular dynamics (MD) simulations. A MD simulation is conducted to obtain the maximum dynamic deflections of a square and rectangular single-layered graphene sheets (SLGSs) with various values of side-length and striker parameter. Effect of (i) chirality, (ii) graphene side-length and nanotube length, (iii) striker mass on the maximum dynamic deflections of graphene and nanotube are investigated. The effect of different types of boundary condition on the maximum dynamic deflections is studied for zigzag and armchair SWCNTs with various aspect ratios (Length/Diameter).Keywords: impact, molecular dynamic, graphene, spring mass
Procedia PDF Downloads 32910103 Influence of the Line Parameters in Transmission Line Fault Location
Authors: Marian Dragomir, Alin Dragomir
Abstract:
In the paper, two fault location algorithms are presented for transmission lines which use the line parameters to estimate the distance to the fault. The first algorithm uses only the measurements from one end of the line and the positive and zero sequence parameters of the line, while the second one uses the measurements from both ends of the line and only the positive sequence parameters of the line. The algorithms were tested using a transmission grid transposed in MATLAB. In a first stage it was established a fault location base line, where the algorithms mentioned above estimate the fault locations using the exact line parameters. After that, the positive and zero sequence resistance and reactance of the line were calculated again for different ground resistivity values and then the fault locations were estimated again in order to compare the results with the base line results. The results show that the algorithm which uses the zero sequence impedance of the line is the most sensitive to the line parameters modifications. The other algorithm is less sensitive to the line parameters modification.Keywords: estimation algorithms, fault location, line parameters, simulation tool
Procedia PDF Downloads 35510102 Time-Domain Analysis of Pulse Parameters Effects on Crosstalk in High-Speed Circuits
Authors: Loubna Tani, Nabih Elouzzani
Abstract:
Crosstalk among interconnects and printed-circuit board (PCB) traces is a major limiting factor of signal quality in high-speed digital and communication equipments especially when fast data buses are involved. Such a bus is considered as a planar multiconductor transmission line. This paper will demonstrate how the finite difference time domain (FDTD) method provides an exact solution of the transmission-line equations to analyze the near end and the far end crosstalk. In addition, this study makes it possible to analyze the rise time effect on the near and far end voltages of the victim conductor. The paper also discusses a statistical analysis, based upon a set of several simulations. Such analysis leads to a better understanding of the phenomenon and yields useful information.Keywords: multiconductor transmission line, crosstalk, finite difference time domain (FDTD), printed-circuit board (PCB), rise time, statistical analysis
Procedia PDF Downloads 43310101 Lamb Waves Propagation in Elastic-Viscoelastic Three-Layer Adhesive Joints
Authors: Pezhman Taghipour Birgani, Mehdi Shekarzadeh
Abstract:
In this paper, the propagation of lamb waves in three-layer joints is investigated using global matrix method. Theoretical boundary value problem in three-layer adhesive joints with perfect bond and traction free boundary conditions on their outer surfaces is solved to find a combination of frequencies and modes with the lowest attenuation. The characteristic equation is derived by applying continuity and boundary conditions in three-layer joints using global matrix method. Attenuation and phase velocity dispersion curves are obtained with numerical solution of this equation by a computer code for a three-layer joint, including an aluminum repair patch bonded to the aircraft aluminum skin by a layer of viscoelastic epoxy adhesive. To validate the numerical solution results of the characteristic equation, wave structure curves are plotted for a special mode in two different frequencies in the adhesive joint. The purpose of present paper is to find a combination of frequencies and modes with minimum attenuation in high and low frequencies. These frequencies and modes are recognizable by transducers in inspections with Lamb waves because of low attenuation level.Keywords: three-layer adhesive joints, viscoelastic, lamb waves, global matrix method
Procedia PDF Downloads 39310100 The Effectiveness of Computerized Dynamic Listening Assessment Informed by Attribute-Based Mediation Model
Authors: Yaru Meng
Abstract:
The study contributes to the small but growing literature around computerized approaches to dynamic assessment (C-DA), wherein individual items are accompanied by mediating prompts. Mediation in the current computerized dynamic listening assessment (CDLA) was informed by an attribute-based mediation model (AMM) that identified the underlying L2 listening cognitive abilities and associated descriptors. The AMM served to focus mediation during C-DA on particular cognitive abilities with a goal of specifying areas of learner difficulty. 86 low-intermediate L2 English learners from a university in China completed three listening assessments, with an experimental group receiving the CLDA system and a control group a non-dynamic assessment. As an assessment, the use of the AMM in C-DA generated detailed diagnoses for each learner. In addition, both within- and between-group repeated ANOVA found greater gains at the level of specific attributes among C-DA learners over the course of a 5-week study. Directions for future research are discussed.Keywords: computerized dynamic assessment, effectiveness, English as foreign language listening, attribute-based mediation model
Procedia PDF Downloads 22410099 Analysis of Lightweight Register Hardware Threat
Authors: Yang Luo, Beibei Wang
Abstract:
In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power
Procedia PDF Downloads 27910098 Evolution of Bombings against Transportation Infrastructure
Authors: Jonathan K. Hill
Abstract:
The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.Keywords: Africa, bombings, critical infrastructure protection, transportation security
Procedia PDF Downloads 42510097 A Comparative Study on the Synthesis, Characterizations and Biological (Antibacterial and Antifungal) Activities of Zinc Doped Silica Oxide Nanoparticles Based on Various Solvents
Authors: Muhammad Arshad, Ghulam Hussain Bhatti, Abdul Qayyum
Abstract:
Zinc-doped silica oxide nanoparticles having size 7.93nm were synthesized by the deposition precipitation method by using different solvents (acetonitrile, n-hexane, isoamylalchol). Biological potential such as antibacterial activities against Bacillussubtilusand Escherichia coli, and antifungal activities against Candida parapsilosis and Aspergilusniger were also investigated by Disc diffusion method. Different characterizations techniques including Fournier Transmission Infrared Spectroscopy (FT-IR), X-ray diffraction (XRD), Scanning Electron Microscope (SEM), Transmission Electron Microscope (TEM), Thermo-gravimeteric Analysis (TGA), Atomic forced microscopy (AFM), and Dynamic Light Scattering (DLS) were used. FT-IR characterization confirmed the presence of metal oxide bond (SiO2) while XRD showed the hexagonal structure. SEM and TEM characterization showed the morphology of nanoparticles. AFM study showed good particle size distribution as depicted by a histogram. DLS study showed the gradual decease in the size of nanoparticles from 24.86nm to 13.24 nm. Highest antibacterial activities revealed by acetonitrile solvents (6%and 4.5%) followed by isoamylalchol (3% and 2.4%) while n-hexane solvent showed the lowest activity (2%and 1%) respectively. Higher antifungal activities exhibited by n-hexane (0.34 % and 0.43%) followed by isoamylalchol (0.27% and 0.19%) solvent while acetonitrile (0.21% and 0.17%) showed least activity respectively. Statistical analysis by using one-way ANOVA also indicated the significant results of both biological activities.Keywords: nanoparticles, precipitation methods, antibacterial, antifungal, characterizations
Procedia PDF Downloads 20710096 Influence Maximization in Dynamic Social Networks and Graphs
Authors: Gkolfo I. Smani, Vasileios Megalooikonomou
Abstract:
Social influence and influence diffusion have been studied in social networks. However, most existing tasks on this subject focus on static networks. In this paper, the problem of maximizing influence diffusion in dynamic social networks, i.e., the case of networks that change over time, is studied. The DM algorithm is an extension of the MATI algorithm and solves the influence maximization (IM) problem in dynamic networks and is proposed under the linear threshold (LT) and independent cascade (IC) models. Experimental results show that our proposed algorithm achieves a diffusion performance better by 1.5 times than several state-of-the-art algorithms and comparable results in diffusion scale with the Greedy algorithm. Also, the proposed algorithm is 2.4 times faster than previous methods.Keywords: influence maximization, dynamic social networks, diffusion, social influence, graphs
Procedia PDF Downloads 23910095 Secure Transmission Scheme in Device-to-Device Multicast Communications
Authors: Bangwon Seo
Abstract:
In this paper, we consider multicast device-to-device (D2D) direct communication systems in cellular networks. In multicast D2D communications, nearby mobile devices exchanges, their data directly without going through a base station and a D2D transmitter send its data to multiple D2D receivers that compose of D2D multicast group. We consider wiretap channel where there is an eavesdropper that attempts to overhear the transmitted data of the D2D transmitter. In this paper, we propose a secure transmission scheme in D2D multicast communications in cellular networks. In order to prevent the eavesdropper from overhearing the transmitted data of the D2D transmitter, a precoding vector is employed at the D2D transmitter in the proposed scheme. We perform computer simulations to evaluate the performance of the proposed scheme. Through the simulation, we show that the secrecy rate performance can be improved by selecting an appropriate precoding vector.Keywords: device-to-device communications, wiretap channel, secure transmission, precoding
Procedia PDF Downloads 29110094 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 48210093 Effect of Signal Acquisition Procedure on Imagined Speech Classification Accuracy
Authors: M.R Asghari Bejestani, Gh. R. Mohammad Khani, V.R. Nafisi
Abstract:
Imagined speech recognition is one of the most interesting approaches to BCI development and a lot of works have been done in this area. Many different experiments have been designed and hundreds of combinations of feature extraction methods and classifiers have been examined. Reported classification accuracies range from the chance level to more than 90%. Based on non-stationary nature of brain signals, we have introduced 3 classification modes according to time difference in inter and intra-class samples. The modes can explain the diversity of reported results and predict the range of expected classification accuracies from the brain signal accusation procedure. In this paper, a few samples are illustrated by inspecting results of some previous works.Keywords: brain computer interface, silent talk, imagined speech, classification, signal processing
Procedia PDF Downloads 15310092 Resistance and Sub-Resistances of RC Beams Subjected to Multiple Failure Modes
Authors: F. Sangiorgio, J. Silfwerbrand, G. Mancini
Abstract:
Geometric and mechanical properties all influence the resistance of RC structures and may, in certain combination of property values, increase the risk of a brittle failure of the whole system. This paper presents a statistical and probabilistic investigation on the resistance of RC beams designed according to Eurocodes 2 and 8, and subjected to multiple failure modes, under both the natural variation of material properties and the uncertainty associated with cross-section and transverse reinforcement geometry. A full probabilistic model based on JCSS Probabilistic Model Code is derived. Different beams are studied through material nonlinear analysis via Monte Carlo simulations. The resistance model is consistent with Eurocode 2. Both a multivariate statistical evaluation and the data clustering analysis of outcomes are then performed. Results show that the ultimate load behaviour of RC beams subjected to flexural and shear failure modes seems to be mainly influenced by the combination of the mechanical properties of both longitudinal reinforcement and stirrups, and the tensile strength of concrete, of which the latter appears to affect the overall response of the system in a nonlinear way. The model uncertainty of the resistance model used in the analysis plays undoubtedly an important role in interpreting results.Keywords: modelling, Monte Carlo simulations, probabilistic models, data clustering, reinforced concrete members, structural design
Procedia PDF Downloads 47210091 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 20910090 Hepatitis B Vaccination Status and Its Determinants among Primary Health Care Workers in Northwest Pakistan
Authors: Mohammad Tahir Yousafzai, Rubina Qasim
Abstract:
We assessed Hepatitis B vaccination and its determinants among health care workers (HCW) in Northwest Pakistan. HCWs from both public and private clinics were interviewed about hepatitis B vaccination, socio-demographic, hepatitis B virus transmission modes, disease threat and benefits of vaccination. Logistic regression was performed. Hepatitis B vaccination was 40% (Qualified Physicians: 86% and non-qualified Dispensers:16%). Being Qualified Physician (Adj. OR 26.6; 95%CI 9.3-73.2), Non-qualified Physician (Adj.OR 1.9; 95%CI 0.8-4.6), qualified Dispensers (Adj. OR 3.6; 95%CI 1.3-9.5) compared to non-qualified Dispensers, working in public clinics (Adj. OR 2.5; 95%CI 1.1-5.7) compared to private, perceived disease threat after exposure to blood and body fluids (Adj. OR 1.1; 95%CI 1.1-1.2) and perceived benefits of vaccination (Adj. OR 1.1; 95%CI 1.1-1.2) were significant predictors of hepatitis B vaccination. Improved perception of disease threat and benefits of vaccination and qualification of HCWs are associated with hepatitis B vaccination.Keywords: Hepatitis B vaccine, immunization, healthcare workers, primary health
Procedia PDF Downloads 31510089 Optimal and Critical Path Analysis of State Transportation Network Using Neo4J
Authors: Pallavi Bhogaram, Xiaolong Wu, Min He, Onyedikachi Okenwa
Abstract:
A transportation network is a realization of a spatial network, describing a structure which permits either vehicular movement or flow of some commodity. Examples include road networks, railways, air routes, pipelines, and many more. The transportation network plays a vital role in maintaining the vigor of the nation’s economy. Hence, ensuring the network stays resilient all the time, especially in the face of challenges such as heavy traffic loads and large scale natural disasters, is of utmost importance. In this paper, we used the Neo4j application to develop the graph. Neo4j is the world's leading open-source, NoSQL, a native graph database that implements an ACID-compliant transactional backend to applications. The Southern California network model is developed using the Neo4j application and obtained the most critical and optimal nodes and paths in the network using centrality algorithms. The edge betweenness centrality algorithm calculates the critical or optimal paths using Yen's k-shortest paths algorithm, and the node betweenness centrality algorithm calculates the amount of influence a node has over the network. The preliminary study results confirm that the Neo4j application can be a suitable tool to study the important nodes and the critical paths for the major congested metropolitan area.Keywords: critical path, transportation network, connectivity reliability, network model, Neo4j application, edge betweenness centrality index
Procedia PDF Downloads 13410088 Effect of Transmission Distance on the Performance of Hybrid Configuration Using Non Return to Zero (NRZ) Pulse Format
Authors: Mais Wa'ad
Abstract:
The effect of transmission distance on the performance of hybrid configuration H 10-40 Gb/s with Non-Return to Zero (NRZ) pulse format, 100 GHz channel spacing, and Multiplexer/De-Multiplexer Band width (MUX/DEMUX BW) of 60 GHz has been investigated in this study. The laser Continuous Wave (CW) power launched into the modulator is set to 4 dBm. Eight neighboring DWDM channels are selected around 1550.12 nm carrying different data rates in hybrid optical communication systems travel through the same optical fiber and use the same passive and active optical modules. The simulation has been done using Optiwave Inc Optisys software. Usually, increasing distance will lead to decrease in performance; however this is not always the case, as the simulation conducted in this work, shows different system performance for each channel. This is due to differences in interaction between dispersion and non-linearity, and the differences in residual dispersion for each channel.Keywords: dispersion and non-linearity interaction, optical hybrid configuration, multiplexer/de multiplexer bandwidth, non-return to zero, optical transmission distance, optisys
Procedia PDF Downloads 55910087 Social Network Analysis in Water Governance
Authors: Faribaebrahimi, Mehdi Ghorbani, Mohsen Mohsenisaravi
Abstract:
Ecosystem management is complex because of natural and human issues. To cope with this complexity water governance is recommended since it involves all stakeholders including people, governmental and non-governmental organization who related to environmental systems. Water governance emphasizes on water co-management through consideration of all the stakeholders in the form of social and organizational network. In this research, to illustrate indicators of water governance in Dorood watershed, in Shemiranat region of Iran, social network analysis had been applied. The results revealed that social cohesion among pastoralists in Dorood is medium because of trust links, while link sustainability is weak to medium. According to the results, some pastoralists have high social power and therefore are key actors in the utilization network, regarding to centrality index and trust links. The results also demonstrated that Agricultural Development Office and (Shemshak-Darbandsar Islamic) Council are key actors in rangeland co-management, based on centrality index in rangeland institutional network at regional scale in Shemiranat district.Keywords: social network analysis, water governance, organizational network, water co-management
Procedia PDF Downloads 35110086 Analysis of the Omnichannel Delivery Network with Application to Last Mile Delivery
Authors: Colette Malyack, Pius Egbelu
Abstract:
Business-to-Customer (B2C) delivery options have improved to meet increased demand in recent years. The change in end users has forced logistics networks to focus on customer service and sentiment that would have previously been the priority of the company or organization of origin. This has led to increased pressure on logistics companies to extend traditional B2B networks into a B2C solution while accommodating additional costs, roadblocks, and customer sentiment; the result has been the creation of the omnichannel delivery network encompassing a number of traditional and modern methods of package delivery. In this paper the many solutions within the omnichannel delivery network are defined and discussed. It can be seen through this analysis that the omnichannel delivery network can be applied to reduce the complexity of package delivery and provide customers with more options. Applied correctly the result is a reduction in cost to the logistics company over time, even with an initial increase in cost to obtain the technology.Keywords: network planning, last mile delivery, omnichannel delivery network, omnichannel logistics
Procedia PDF Downloads 15010085 Speed Ratio Control of Pulley Based V-Belt Type Continuously Variable Transmission (CVT) using Fuzzy Logic Controller
Authors: Ikbal Eski, Turan Gürgenç
Abstract:
After nearly more than a century of research and development, internal combustion engines have become almost perfect. Along with such improvement in internal combustion engines, automotive manufacturers are conducting research on design of alternative fuel vehicles. Nevertheless an ideal interim solution is to increase overall efficiency of internal combustion vehicles. A potential solution to achieve that is using continuously variable transmission system which, despite being an old idea, has recently become a hope for automotive manufacturers. CVT system, by continuously varying speed ratio, raises vehicle efficiency. In this study, fuzzy logic controller is used in speed ratio control of pulley based CVT system.Keywords: continuously variable transmission system, variator, speed ratio, fuzzy logic
Procedia PDF Downloads 28510084 Optimization of Interface Radio of Universal Mobile Telecommunication System Network
Authors: O. Mohamed Amine, A. Khireddine
Abstract:
Telecoms operators are always looking to meet their share of the other customers, they try to gain optimum utilization of the deployed equipment and network optimization has become essential. This project consists of optimizing UMTS network, and the study area is an urban area situated in the center of Algiers. It was initially questions to become familiar with the different communication systems (3G) and the optimization technique, its main components, and its fundamental characteristics radios were introduced.Keywords: UMTS, UTRAN, WCDMA, optimization
Procedia PDF Downloads 38310083 Understanding the Selectional Preferences of the Twitter Mentions Network
Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das
Abstract:
Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.Keywords: information diffusion, personality and values, social network analysis, twitter mentions network
Procedia PDF Downloads 37410082 3D Guided Image Filtering to Improve Quality of Short-Time Binned Dynamic PET Images Using MRI Images
Authors: Tabassum Husain, Shen Peng Li, Zhaolin Chen
Abstract:
This paper evaluates the usability of 3D Guided Image Filtering to enhance the quality of short-time binned dynamic PET images by using MRI images. Guided image filtering is an edge-preserving filter proposed to enhance 2D images. The 3D filter is applied on 1 and 5-minute binned images. The results are compared with 15-minute binned images and the Gaussian filtering. The guided image filter enhances the quality of dynamic PET images while also preserving important information of the voxels.Keywords: dynamic PET images, guided image filter, image enhancement, information preservation filtering
Procedia PDF Downloads 13210081 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case
Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan
Abstract:
The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.Keywords: cloud computing, protocols, UDP multicast, virtualization
Procedia PDF Downloads 59010080 Modal Dynamic Analysis of a Mechanism with Deformable Elements from an Oil Pump Unit Structure
Authors: N. Dumitru, S. Dumitru, C. Copilusi, N. Ploscaru
Abstract:
On this research, experimental analyses have been performed in order to determine the oil pump mechanism dynamics and stability from an oil unit mechanical structure. The experimental tests were focused on the vibrations which occur inside of the rod element during functionality of the oil pump unit. The oil pump mechanism dynamic parameters were measured and also determined through numerical computations. Entire research is based on the oil pump unit mechanical system virtual prototyping. For a complete analysis of the mechanism, the frequency dynamic response was identified, mainly for the mechanism driven element, based on two methods: processing and virtual simulations with MSC Adams aid and experimental analysis. In fact, through this research, a complete methodology is presented where numerical simulations of a mechanism with deformed elements are developed on a dynamic mode and these can be correlated with experimental tests.Keywords: modal dynamic analysis, oil pump, vibrations, flexible elements, frequency response
Procedia PDF Downloads 319