Search results for: code enforcement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1762

Search results for: code enforcement

1012 MCERTL: Mutation-Based Correction Engine for Register-Transfer Level Designs

Authors: Khaled Salah

Abstract:

In this paper, we present MCERTL (mutation-based correction engine for RTL designs) as an automatic error correction technique based on mutation analysis. A mutation-based correction methodology is proposed to automatically fix the erroneous RTL designs. The proposed strategy combines the processes of mutation and assertion-based localization. The erroneous statements are mutated to produce possible fixes for the failed RTL code. A concurrent mutation engine is proposed to mitigate the computational cost of running sequential mutants operators. The proposed methodology is evaluated against some benchmarks. The experimental results demonstrate that our proposed method enables us to automatically locate and correct multiple bugs at reasonable time.

Keywords: bug localization, error correction, mutation, mutants

Procedia PDF Downloads 276
1011 Performance and Voyage Analysis of Marine Gas Turbine Engine, Installed to Power and Propel an Ocean-Going Cruise Ship from Lagos to Jeddah

Authors: Mathias U. Bonet, Pericles Pilidis, Georgios Doulgeris

Abstract:

An aero-derivative marine Gas Turbine engine model is simulated to be installed as the main propulsion prime mover to power a cruise ship which is designed and routed to transport intending Muslim pilgrims for the annual hajj pilgrimage from Nigeria to the Islamic port city of Jeddah in Saudi Arabia. A performance assessment of the Gas Turbine engine has been conducted by examining the effect of varying aerodynamic and hydrodynamic conditions encountered at various geographical locations along the scheduled transit route during the voyage. The investigation focuses on the overall behavior of the Gas Turbine engine employed to power and propel the ship as it operates under ideal and adverse conditions to be encountered during calm and rough weather according to the different seasons of the year under which the voyage may be undertaken. The variation of engine performance under varying operating conditions has been considered as a very important economic issue by determining the time the speed by which the journey is completed as well as the quantity of fuel required for undertaking the voyage. The assessment also focuses on the increased resistance caused by the fouling of the submerged portion of the ship hull surface with its resultant effect on the power output of the engine as well as the overall performance of the propulsion system. Daily ambient temperature levels were obtained by accessing data from the UK Meteorological Office while the varying degree of turbulence along the transit route and according to the Beaufort scale were also obtained as major input variables of the investigation. By assuming the ship to be navigating the Atlantic Ocean and the Mediterranean Sea during winter, spring and summer seasons, the performance modeling and simulation was accomplished through the use of an integrated Gas Turbine performance simulation code known as ‘Turbomach’ along with a Matlab generated code named ‘Poseidon’, all of which have been developed at the Power and Propulsion Department of Cranfield University. As a case study, the results of the various assumptions have further revealed that the marine Gas Turbine is a reliable and available alternative to the conventional marine propulsion prime movers that have dominated the maritime industry before now. The techno-economic and environmental assessment of this type of propulsion prime mover has enabled the determination of the effect of changes in weather and sea conditions on the ship speed as well as trip time and the quantity of fuel required to be burned throughout the voyage.

Keywords: ambient temperature, hull fouling, marine gas turbine, performance, propulsion, voyage

Procedia PDF Downloads 185
1010 Numerical Investigation for Ductile Fracture of an Aluminium Alloy 6061 T-6: Assessment of Critical J-Integral

Authors: R. Bensaada, M. Almansba, M. Ould Ouali, R. Ferhoum, N. E. Hannachi

Abstract:

The aim of this work is to simulate the ductile fracture of SEN specimens in aluminium alloy. The assessment of fracture toughness is performed with the calculation of Jc (the critical value of J-Integral) through the resistance curves. The study is done using finite element code calculation ABAQUSTM including an elastic plastic with damage model of material’s behaviour. The procedure involves specimens of four different thicknesses and four ligament sizes for every thickness. The material of study is an aluminium alloy 6061-T6 for which the necessary parameters to complete the study are given. We found the same results for the same specimen’s thickness and for different ligament sizes when the fracture criterion is evaluated.

Keywords: j-integral, critical-j, damage, fracture toughness

Procedia PDF Downloads 357
1009 MHD Equilibrium Study in Alborz Tokamak

Authors: Maryamosadat Ghasemi, Reza Amrollahi

Abstract:

Plasma equilibrium geometry has a great influence on the confinement and magnetohydrodynamic stability in tokamaks. The poloidal field (PF) system of a tokamak should be able to support this plasma equilibrium geometry. In this work the prepared numerical code based on radial basis functions are presented and used to solve the Grad–Shafranov (GS) equation for the axisymmetric equilibrium of tokamak plasma. The radial basis functions (RBFs) which is a kind of numerical meshfree method (MFM) for solving partial differential equations (PDEs) has appeared in the last decade and is developing significantly in the last few years. This technique is applied in this study to obtain the equilibrium configuration for Alborz Tokamak. The behavior of numerical solution convergences show the validation of this calculations.

Keywords: equilibrium, grad–shafranov, radial basis functions, Alborz Tokamak

Procedia PDF Downloads 472
1008 Revisiting Corporate Social Responsibility in the Lens of Board Accountability

Authors: Jingchen Zhao

Abstract:

Corporate social responsibility (CSR), a major contemporary focus for companies, governments, NGOs and communities, is discussed from a multi-disciplinary perspective. The term is introduced and defined to achieve a combination of economic, social, environmental and philanthropic goals, and its adoption in company law legislations in a few jurisdictions is discussed. Despite its positive social and environmental impacts, the notion has been widely criticised for being ill-defined and fundamentally flawed in the domain of corporate law. The value and effectiveness of CSR have been interrogated for many reasons, always inter-related. This article aims to consider and address some of these problems and assess how CSR could be sharpened and made more effective through the lens of accountability, focussing on the rationale behind and the means of regulation of CSR. The article aims to achieve two interrelated goals. First, it examines the function of accountability in the arguments in favour of CSR by investigating the extent to which the notion of accountability could be used as a criterion for regulating CSR, so that companies may be held accountable for corporate decisions affecting their stakeholders. Second, this article will examine the scope and goals of CSR and board accountability, creating the possibility of a more comprehensive understanding of the two notions from an interactive perspective. In order to link CSR and accountability closely to generate a more appropriate definition of CSR that is could be more appropriately and effectively applied in corporate law, the concept of corporate social accountability (CSA) will be evaluated, with the aim of broadening its latitude beyond disclosure. This will involve a rigorous assessment of the process of fulfilling directors’ duties via questioning from stakeholder groups during meetings or committees, together with explanations and justifications from the board. This will be followed by discussions on enforcement measures in relation to the concept of CSA.

Keywords: corporate governance, CSR, board accountability, corporate law

Procedia PDF Downloads 303
1007 Interaction of the Circumferential Lamb Wave with Delamination in the Middle of Pipe Wall

Authors: Li Ziming, He Cunfu, Liu Zenghua

Abstract:

With aim for delamination type defects detection in manufacturing process of seamless pipe,this paper studies the interaction of the circumferential lamb wave with delamination in aluminum pipe.The delamination is located in the middle of pipe wall.A numerical study is carried out,the circumferential lamb wave used here is CL0 mode,which is generated with a finite element method code.Wave structures from the simulation are compared with theoretical results to verify the model’s accuracy.Delamination along the circumferential direction is established by demerging nodes of the same coordinates.When CL0 mode is incident at the entrance and exit of a delamination,it generates new mode-CL1,undergoes multiple reverberation and mode conversions between the two ends of the delamination. Signals of different receptions are obtained to provide insight in using CL0 mode for locating the delamination.

Keywords: circumferential lamb wave, delamination, FEM, seamless pipe

Procedia PDF Downloads 310
1006 Design an Expert System to Assess the Hydraulic System in Thermal and Hydrodynamic Aspect

Authors: Ahmad Abdul-Razzak Aboudi Al-Issa

Abstract:

Thermal and Hydrodynamic are basic aspects in any hydraulic system and therefore, they must be assessed with regard to this aspect before constructing the system. This assessment needs a good expertise in this aspect to obtain an efficient hydraulic system. Therefore, this study aims to build an expert system called Hydraulic System Calculations (HSC) to ensure a smooth operation for the hydraulic system. The expert system (HSC) had been designed and coded in an user-friendly interactive program called Microsoft Visual Basic 2010. The suggested code provides the designer with a number of choices to resolve the problem of hydraulic oil overheating which may arise during the continuous operation of the hydraulic unit. As a result, the HSC can minimize the human errors, effort, time and cost of hydraulic machine design.

Keywords: fluid power, hydraulic system, thermal and hydrodynamic, expert system

Procedia PDF Downloads 442
1005 Noise Pollution in Nigerian Cities: Case Study of Bida, Nigeria

Authors: Funke Morenike Jiyah, Joshua Jiyah

Abstract:

The occurrence of various health issues have been linked to excessive noise pollution in all works of life as evident in many research efforts. This study provides empirical analysis of the effects of noise pollution on the well-being of the residents of Bida Local Government Area, Niger State, Nigeria. The study adopted a case study research design, involving cross-sectional procedure. Field observations and medical reports were obtained to support the respondents’ perception on the state of their well-being. The sample size for the study was selected using the housing stock in the various wards. One major street in each ward was selected. A total of 1,833 buildings were counted along the sampled streets and 10% of this was selected for the administration of structured questionnaire.The environmental quality of the wards was determined by measuring the noise level using Testo 815 noise meters. The result revealed that Bariki ward which houses the GRA has the lowest noise level of 37.8 dB(A)while the noise pollution levels recorded in the other thirteen wards were all above the recommended levels. The average ambient noise level in sawmills, commercial centres, road junctions and industrial areas were above 90 dB(A). The temporal record from the Federal Medical Centre, Bida revealed that, apart from malaria, hypertension (5,614 outpatients) was the most prevalent health issue in 2013 alone. The paper emphasised the need for compatibility consideration in the choice of residential location, the use of ear muffler and effective enforcement of zoning regulations.

Keywords: bida, decibels, environmental quality, noise, well-being

Procedia PDF Downloads 130
1004 Coral Lifeform Structure in Selected Marine Protected Areas in Southern Cebu, Philippines

Authors: Gloria G. Delan, Alfonso S. Piquero, Rachel Luz V. Rica, Christine M. Corrales

Abstract:

The selected marine protected areas (MPAs) of southern Cebu, Philippines were assessed after these have been established between the years 2000 to 2007. These include Casay of Argao, Cawayan of Dalaguete, Guiwang-Daang Lungsod of Alcoy, North Granada of Boljoon and Sta. Cruz of Ronda. These MPAs were assessed to gather baseline information on its coral life-form structure. Point-intercept transect (PIT) method was used in the observation. Benthic life form and reef substrate at each 0.25 m point interval were identified and recorded along 50 meters transect line both inside and outside of these MPAs. It has been observed that massive, branching and digitate form of corals dominated among the five sanctuaries. Percentage of Live Hard Corals was much higher inside than outside in all sanctuaries. Common to all sanctuaries were noticeable presence of dead corals with algae and coral rubbles indicating an over-exploited habitat. Casay, Cawayan and Daan-Lungsod MPAs had some Crown of Thorn Starfish (COTS) which may pose threat to its coral community. It has been recommended that there should be strict law enforcement and a long term monitoring to continuously conserve and protect coral reef which is an important habitat for fishes for its sustainability as food for human.

Keywords: coral rubbles, coral reef, live hard coral, point-intercept transect

Procedia PDF Downloads 413
1003 Quality and Coverage Assessment in Software Integration Based On Mutation Testing

Authors: Iyad Alazzam, Kenneth Magel, Izzat Alsmadi

Abstract:

The different activities and approaches in software testing try to find the most possible number of errors or failures with the least amount of possible effort. Mutation is a testing approach that is used to discover possible errors in tested applications. This is accomplished through changing one aspect of the software from its original and writes test cases to detect such change or mutation. In this paper, we present a mutation approach for testing software components integration aspects. Several mutation operations related to components integration are described and evaluated. A test case study of several open source code projects is collected. Proposed mutation operators are applied and evaluated. Results showed some insights and information that can help testing activities in detecting errors and improving coverage.

Keywords: software testing, integration testing, mutation, coverage, software design

Procedia PDF Downloads 422
1002 An Encapsulation of a Navigable Tree Position: Theory, Specification, and Verification

Authors: Nicodemus M. J. Mbwambo, Yu-Shan Sun, Murali Sitaraman, Joan Krone

Abstract:

This paper presents a generic data abstraction that captures a navigable tree position. The mathematical modeling of the abstraction encapsulates the current tree position, which can be used to navigate and modify the tree. The encapsulation of the tree position in the data abstraction specification avoids the use of explicit references and aliasing, thereby simplifying verification of (imperative) client code that uses the data abstraction. To ease the tasks of such specification and verification, a general tree theory, rich with mathematical notations and results, has been developed. The paper contains an example to illustrate automated verification ramifications. With sufficient tree theory development, automated proving seems plausible even in the absence of a special-purpose tree solver.

Keywords: automation, data abstraction, maps, specification, tree, verification

Procedia PDF Downloads 161
1001 Child Labour: Enforcement of Right to Promote Child Development in Nigeria

Authors: G. Salavwa, P. Erhijakpor Jr., H. Ukwu

Abstract:

This study will explore child labour issues in Nigeria because it is capable of affecting the physical and general well-being of children who perform hazardous work. This feat will be achieved through qualitative research methodology. Data collection shall be elicited by oral interviews and documental content analysis to delve on the application of the Convention on the Rights of the Child (CRC), International Labour Organization ILO and Geneva Convention relating to child labour practices in Nigeria. This will include the relevance of present domestic laws relating to child labour as implemented in Nigeria, together with factors that contribute to the practice of child labour in the country. The oral interview data analysis will be performed by breaking the interview data into significant statements and themes. This shall be done by comparing and determining the commonalities that are prevalent in the participants’ views regarding child labour menace in Nigeria. Presumably, findings from this study shall unveil that a poor educational policy, a widespread poverty level which is mostly prevalent amongst families in the rural areas of the country, a lack of employment for adults, have led to the ineffectiveness of the local child labour laws in Nigeria. These has in turn culminated into a somewhat non-implementation of the international laws of the CRC, ILO and Geneva Declaration on child labour to which the Nigerian government is a signatory. Based on the finding, this study will calls on the government of Nigeria to extend its free educational policy from the elementary, secondary to tertiary educations. The government also has to ensure that offenders of children’s rights should face a severe punishment.

Keywords: commonalities, tertiary, constitution, qualitative

Procedia PDF Downloads 209
1000 Investigating the Influences of Long-Term, as Compared to Short-Term, Phonological Memory on the Word Recognition Abilities of Arabic Readers vs. Arabic Native Speakers: A Word-Recognition Study

Authors: Insiya Bhalloo

Abstract:

It is quite common in the Muslim faith for non-Arabic speakers to be able to convert written Arabic, especially Quranic Arabic, into a phonological code without significant semantic or syntactic knowledge. This is due to prior experience learning to read the Quran (a religious text written in Classical Arabic), from a very young age such as via enrolment in Quranic Arabic classes. As compared to native speakers of Arabic, these Arabic readers do not have a comprehensive morpho-syntactic knowledge of the Arabic language, nor can understand, or engage in Arabic conversation. The study seeks to investigate whether mere phonological experience (as indicated by the Arabic readers’ experience with Arabic phonology and the sound-system) is sufficient to cause phonological-interference during word recognition of previously-heard words, despite the participants’ non-native status. Both native speakers of Arabic and non-native speakers of Arabic, i.e., those individuals that learned to read the Quran from a young age, will be recruited. Each experimental session will include two phases: An exposure phase and a test phase. During the exposure phase, participants will be presented with Arabic words (n=40) on a computer screen. Half of these words will be common words found in the Quran while the other half will be words commonly found in Modern Standard Arabic (MSA) but either non-existent or prevalent at a significantly lower frequency within the Quran. During the test phase, participants will then be presented with both familiar (n = 20; i.e., those words presented during the exposure phase) and novel Arabic words (n = 20; i.e., words not presented during the exposure phase. ½ of these presented words will be common Quranic Arabic words and the other ½ will be common MSA words but not Quranic words. Moreover, ½ the Quranic Arabic and MSA words presented will be comprised of nouns, while ½ the Quranic Arabic and MSA will be comprised of verbs, thereby eliminating word-processing issues affected by lexical category. Participants will then determine if they had seen that word during the exposure phase. This study seeks to investigate whether long-term phonological memory, such as via childhood exposure to Quranic Arabic orthography, has a differential effect on the word-recognition capacities of native Arabic speakers and Arabic readers; we seek to compare the effects of long-term phonological memory in comparison to short-term phonological exposure (as indicated by the presentation of familiar words from the exposure phase). The researcher’s hypothesis is that, despite the lack of lexical knowledge, early experience with converting written Quranic Arabic text into a phonological code will help participants recall the familiar Quranic words that appeared during the exposure phase more accurately than those that were not presented during the exposure phase. Moreover, it is anticipated that the non-native Arabic readers will also report more false alarms to the unfamiliar Quranic words, due to early childhood phonological exposure to Quranic Arabic script - thereby causing false phonological facilitatory effects.

Keywords: modern standard arabic, phonological facilitation, phonological memory, Quranic arabic, word recognition

Procedia PDF Downloads 350
999 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 274
998 Solar Cell Packed and Insulator Fused Panels for Efficient Cooling in Cubesat and Satellites

Authors: Anand K. Vinu, Vaishnav Vimal, Sasi Gopalan

Abstract:

All spacecraft components have a range of allowable temperatures that must be maintained to meet survival and operational requirements during all mission phases. Due to heat absorption, transfer, and emission on one side, the satellite surface presents an asymmetric temperature distribution and causes a change in momentum, which can manifest in spinning and non-spinning satellites in different manners. This problem can cause orbital decays in satellites which, if not corrected, will interfere with its primary objective. The thermal analysis of any satellite requires data from the power budget for each of the components used. This is because each of the components has different power requirements, and they are used at specific times in an orbit. There are three different cases that are run, one is the worst operational hot case, the other one is the worst non-operational cold case, and finally, the operational cold case. Sunlight is a major source of heating that takes place on the satellite. The way in which it affects the spacecraft depends on the distance from the Sun. Any part of a spacecraft or satellite facing the Sun will absorb heat (a net gain), and any facing away will radiate heat (a net loss). We can use the state-of-the-art foldable hybrid insulator/radiator panel. When the panels are opened, that particular side acts as a radiator for dissipating the heat. Here the insulator, in our case, the aerogel, is sandwiched with solar cells and radiator fins (solar cells outside and radiator fins inside). Each insulated side panel can be opened and closed using actuators depending on the telemetry data of the CubeSat. The opening and closing of the panels are dependent on the special code designed for this particular application, where the computer calculates where the Sun is relative to the satellites. According to the data obtained from the sensors, the computer decides which panel to open and by how many degrees. For example, if the panels open 180 degrees, the solar panels will directly face the Sun, in turn increasing the current generator of that particular panel. One example is when one of the corners of the CubeSat is facing or if more than one side is having a considerable amount of sun rays incident on it. Then the code will analyze the optimum opening angle for each panel and adjust accordingly. Another means of cooling is the passive way of cooling. It is the most suitable system for a CubeSat because of its limited power budget constraints, low mass requirements, and less complex design. Other than this fact, it also has other advantages in terms of reliability and cost. One of the passive means is to make the whole chase act as a heat sink. For this, we can make the entire chase out of heat pipes and connect the heat source to this chase with a thermal strap that transfers the heat to the chassis.

Keywords: passive cooling, CubeSat, efficiency, satellite, stationary satellite

Procedia PDF Downloads 94
997 Trafficking of Women in International Migration: Issues and Major Challenges in Present Scenario

Authors: Neha Singh, Anshuman Rana

Abstract:

Gender-Based Violence (GBV) is a violation of human rights and a form of discrimination which reinforces inequalities between men and women. It is defined as violence that is directed against a person on the basis of gender. There has been increased attention to human trafficking that has exposed to illegal migration. Trafficking is complex, but it generally takes place due to “push and pull factors”. India is both a source as well as a transit country for trafficking. Women are bought and sold with impunity and trafficked to other countries. They are forced to work as sex worker, forced labour and other practices of slavery. Trafficked victims often suffer from serious abuse and physical exhaustion. The effects of violence on women vary widely. GBV typically has physical, psychological and social effects. They face unwanted pregnancies, miscarriages, high rate of infertility and sexually transmitted disease. The social exclusion of women is so great that it constitutes a new form of apartheid. Women are considered as lesser value and deprived of their fundamental rights. Violation of human rights and fundamental freedom such as- trafficking of women, girls for sex trade, forced prostitution and sex tourism have become the focus of internationally organized crimes. My paper will analyse the impact of violence on society as well. Law alone cannot change the scenario and problem of gender-biasness. The whole issue of gender violence needs social awakening and change in attitude of masses, so that due respect and equal status is given to women.

Keywords: gender-based violence, trafficking, migration, violence impact, social exclusion, law enforcement

Procedia PDF Downloads 281
996 Price Control: A Comprehensive Step to Control Corruption in the Society

Authors: Muhammad Zia Ullah Baig, Atiq Uz Zama

Abstract:

The motivation of the project is to facilitate the governance body, as well as the common man in his/her daily life consuming product rates, to easily monitor the expense, to control the budget with the help of single SMS (message), e-mail facility, and to manage governance body by task management system. The system will also be capable of finding irregularities being done by the concerned department in mitigating the complaints generated by the customer and also provide a solution to overcome problems. We are building a system that easily controls the price control system of any country, we will feeling proud to give this system free of cost to Indian Government also. The system is able to easily manage and control the price control department of government all over the country. Price control department run in different cities under City District Government, so the system easily run in different cities with different SMS Code and decentralize Database ensure the non-functional requirement of system (scalability, reliability, availability, security, safety). The customer request for the government official price list with respect to his/her city SMS code (price list of all city available on website or application), the server will forward the price list through a SMS, if the product is not available according to the price list the customer generate a complaint through an SMS or using website/smartphone application, complaint is registered in complaint database and forward to inspection department when the complaint is entertained, the inspection department will forward a message about the complaint to customer. Inspection department physically checks the seller who does not follow the price list, but the major issue of the system is corruption, may be inspection officer will take a bribe and resolve the complaint (complaint is fake) in that case the customer will not use the system. The major issue of the system is to distinguish the fake and real complain and fight for corruption in the department. To counter the corruption, our strategy is to rank the complain if the same type of complaint is generated the complaint is in high rank and the higher authority will also notify about that complain, now the higher authority of department have reviewed the complaint and its history, the officer who resolve that complaint in past and the action against the complaint, these data will help in decision-making process, if the complaint was resolved because the officer takes bribe, the higher authority will take action against that officer. When the price of any good is decided the market/former representative is also there, with the mutual understanding of both party the price is decided, the system facilitate the decision-making process. The system shows the price history of any goods, inflation rate, available supply, demand, and the gap between supply and demand, these data will help to allot for the decision-making process.

Keywords: price control, goods, government, inspection, department, customer, employees

Procedia PDF Downloads 409
995 Comparison of Two-Phase Critical Flow Models for Estimation of Leak Flow Rate through Cracks

Authors: Tadashi Watanabe, Jinya Katsuyama, Akihiro Mano

Abstract:

The estimation of leak flow rates through narrow cracks in structures is of importance for nuclear reactor safety, since the leak flow could be detected before occurrence of loss-of-coolant accidents. The two-phase critical leak flow rates are calculated using the system analysis code, and two representative non-homogeneous critical flow models, Henry-Fauske model and Ransom-Trapp model, are compared. The pressure decrease and vapor generation in the crack, and the leak flow rates are found to be larger for the Henry-Fauske model. It is shown that the leak flow rates are not affected by the structural temperature, but affected largely by the roughness of crack surface.

Keywords: crack, critical flow, leak, roughness

Procedia PDF Downloads 177
994 Numerical Modeling the Cavitating Flow in Injection Nozzle Holes

Authors: Ridha Zgolli, Hatem Kanfoudi

Abstract:

Cavitating flows inside a diesel injection nozzle hole were simulated using a mixture model. A 2D numerical model is proposed in this paper to simulate steady cavitating flows. The Reynolds-averaged Navier-Stokes equations are solved for the liquid and vapor mixture, which is considered as a single fluid with variable density which is expressed as function of the vapor volume fraction. The closure of this variable is provided by the transport equation with a source term TEM. The processes of evaporation and condensation are governed by changes in pressure within the flow. The source term is implanted in the CFD code ANSYS CFX. The influence of numerical and physical parameters is presented in details. The numerical simulations are in good agreement with the experimental data for steady flow.

Keywords: cavitation, injection nozzle, numerical simulation, k–ω

Procedia PDF Downloads 394
993 The Impact of Bitcoin and Cryptocurrency on the Development of Community

Authors: Felib Ayman Shawky Salem

Abstract:

Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics

Procedia PDF Downloads 33
992 Research on Fuzzy Test Framework Based on Concolic Execution

Authors: Xiong Xie, Yuhang Chen

Abstract:

Vulnerability discovery technology is a significant field of the current. In this paper, a fuzzy framework based on concolic execution has been proposed. Fuzzy test and symbolic execution are widely used in the field of vulnerability discovery technology. But each of them has its own advantages and disadvantages. During the path generation stage, path traversal algorithm based on generation is used to get more accurate path. During the constraint solving stage, dynamic concolic execution is used to avoid the path explosion. If there is external call, the concolic based on function summary is used. Experiments show that the framework can effectively improve the ability of triggering vulnerabilities and code coverage.

Keywords: concolic execution, constraint solving, fuzzy test, vulnerability discovery

Procedia PDF Downloads 227
991 STML: Service Type-Checking Markup Language for Services of Web Components

Authors: Saqib Rasool, Adnan N. Mian

Abstract:

Web components are introduced as the latest standard of HTML5 for writing modular web interfaces for ensuring maintainability through the isolated scope of web components. Reusability can also be achieved by sharing plug-and-play web components that can be used as off-the-shelf components by other developers. A web component encapsulates all the required HTML, CSS and JavaScript code as a standalone package which must be imported for integrating a web component within an existing web interface. It is then followed by the integration of web component with the web services for dynamically populating its content. Since web components are reusable as off-the-shelf components, these must be equipped with some mechanism for ensuring their proper integration with web services. The consistency of a service behavior can be verified through type-checking. This is one of the popular solutions for improving the quality of code in many programming languages. However, HTML does not provide type checking as it is a markup language and not a programming language. The contribution of this work is to introduce a new extension of HTML called Service Type-checking Markup Language (STML) for adding support of type checking in HTML for JSON based REST services. STML can be used for defining the expected data types of response from JSON based REST services which will be used for populating the content within HTML elements of a web component. Although JSON has five data types viz. string, number, boolean, object and array but STML is made to supports only string, number and object. This is because of the fact that both object and array are considered as string, when populated in HTML elements. In order to define the data type of any HTML element, developer just needs to add the custom STML attributes of st-string, st-number and st-boolean for string, number and boolean respectively. These all annotations of STML are used by the developer who is writing a web component and it enables the other developers to use automated type-checking for ensuring the proper integration of their REST services with the same web component. Two utilities have been written for developers who are using STML based web components. One of these utilities is used for automated type-checking during the development phase. It uses the browser console for showing the error description if integrated web service is not returning the response with expected data type. The other utility is a Gulp based command line utility for removing the STML attributes before going in production. This ensures the delivery of STML free web pages in the production environment. Both of these utilities have been tested to perform type checking of REST services through STML based web components and results have confirmed the feasibility of evaluating service behavior only through HTML. Currently, STML is designed for automated type-checking of integrated REST services but it can be extended to introduce a complete service testing suite based on HTML only, and it will transform STML from Service Type-checking Markup Language to Service Testing Markup Language.

Keywords: REST, STML, type checking, web component

Procedia PDF Downloads 249
990 Cavitating Flow through a Venturi Using Computational Fluid Dynamics

Authors: Imane Benghalia, Mohammed Zamoum, Rachid Boucetta

Abstract:

Hydrodynamic cavitation is a complex physical phenomenon that appears in hydraulic systems (pumps, turbines, valves, Venturi tubes, etc.) when the fluid pressure decreases below the saturated vapor pressure. The works carried out in this study aimed to get a better understanding of the cavitating flow phenomena. For this, we have numerically studied a cavitating bubbly flow through a Venturi nozzle. The cavitation model is selected and solved using a commercial computational fluid dynamics (CFD) code. The obtained results show the effect of the inlet pressure (10, 7, 5, and 2 bars) of the Venturi on pressure, the velocity of the fluid flow, and the vapor fraction. We found that the inlet pressure of the Venturi strongly affects the evolution of the pressure, velocity, and vapor fraction formation in the cavitating flow.

Keywords: cavitating flow, CFD, phase change, venturi

Procedia PDF Downloads 79
989 Computational Investigation of Gas-Solid Flow in High Pressure High Temperature Filter

Authors: M. H. Alhajeri, Hamad M. Alhajeri, A. H. Alenezi

Abstract:

This paper reports a Computational Fluid Dynamics (CFD) investigation for a high-temperature high-pressure filtration (ceramic candle filter). However, parallel flow to the filter is considered in this study. Different face (filtration) velocities are examined using the CFD code, FLUENT. Different sizes of particles are tracked through the domain to find the height at which the particles will impinge on the filter surface. Furthermore, particle distribution around the filter (or filter cake) is studied to design efficient cleaning mechanisms. Gravity effect to the particles with various inlet velocities and pressure drop are both considered. In the CFD study, it is found that the gravity influence should not be ignored if the particle sizes exceed 1 micron.

Keywords: fluid flow, CFD, filtration, HTHP

Procedia PDF Downloads 200
988 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 117
987 Reinforced Concrete Design Construction Issues and Earthquake Failure-Damage Responses

Authors: Hasan Husnu Korkmaz, Serra Zerrin Korkmaz

Abstract:

Earthquakes are the natural disasters that threat several countries. Turkey is situated on a very active earthquake zone. During the recent earthquakes, thousands of people died due to failure of reinforced concrete structures. Although Turkey has a very sufficient earthquake code, the design and construction mistakes were repeated for old structures. Lack of the control mechanism during the construction process may be the most important reason of failure. The quality of the concrete and poor detailing of steel or reinforcement is the most important headings. In this paper, the reasons of failure of reinforced concrete structures were summarized with relevant photos. The paper is beneficial for civil engineers as well as architect who are in the process of construction and design of structures in earthquake zones.

Keywords: earthquake, reinforced concrete structure, failure, material

Procedia PDF Downloads 362
986 Capacity of Cold-Formed Steel Warping-Restrained Members Subjected to Combined Axial Compressive Load and Bending

Authors: Maryam Hasanali, Syed Mohammad Mojtabaei, Iman Hajirasouliha, G. Charles Clifton, James B. P. Lim

Abstract:

Cold-formed steel (CFS) elements are increasingly being used as main load-bearing components in the modern construction industry, including low- to mid-rise buildings. In typical multi-storey buildings, CFS structural members act as beam-column elements since they are exposed to combined axial compression and bending actions, both in moment-resisting frames and stud wall systems. Current design specifications, including the American Iron and Steel Institute (AISI S100) and the Australian/New Zealand Standard (AS/NZS 4600), neglect the beneficial effects of warping-restrained boundary conditions in the design of beam-column elements. Furthermore, while a non-linear relationship governs the interaction of axial compression and bending, the combined effect of these actions is taken into account through a simplified linear expression combining pure axial and flexural strengths. This paper aims to evaluate the reliability of the well-known Direct Strength Method (DSM) as well as design proposals found in the literature to provide a better understanding of the efficiency of the code-prescribed linear interaction equation in the strength predictions of CFS beam columns and the effects of warping-restrained boundary conditions on their behavior. To this end, the experimentally validated finite element (FE) models of CFS elements under compression and bending were developed in ABAQUS software, which accounts for both non-linear material properties and geometric imperfections. The validated models were then used for a comprehensive parametric study containing 270 FE models, covering a wide range of key design parameters, such as length (i.e., 0.5, 1.5, and 3 m), thickness (i.e., 1, 2, and 4 mm) and cross-sectional dimensions under ten different load eccentricity levels. The results of this parametric study demonstrated that using the DSM led to the most conservative strength predictions for beam-column members by up to 55%, depending on the element’s length and thickness. This can be sourced by the errors associated with (i) the absence of warping-restrained boundary condition effects, (ii) equations for the calculations of buckling loads, and (iii) the linear interaction equation. While the influence of warping restraint is generally less than 6%, the code suggested interaction equation led to an average error of 4% to 22%, based on the element lengths. This paper highlights the need to provide more reliable design solutions for CFS beam-column elements for practical design purposes.

Keywords: beam-columns, cold-formed steel, finite element model, interaction equation, warping-restrained boundary conditions

Procedia PDF Downloads 99
985 Variability in Saturation Flow and Traffic Performance at Urban Signalized Intersection

Authors: P. N. Salini, B. Anish Kini, R. Ashalatha

Abstract:

At signalized intersections with heterogeneous traffic, the percentage share of different vehicle categories have a bearing on the inter-vehicle space utilization, which eventually impacts the saturation flow. This paper analyzed the impact of the percentage share of various vehicle categories in the traffic stream on the saturation flow at signalized intersections by video graphing major intersections with varying geometry in Kerala, India. It was found that as the percentage share of two-wheelers increases, the saturation flow at signalized intersections increases and vice-versa for the percentage share of cars. The effect of bus blockage and parking maneuvers on the saturation flow were also studied. As the distance of bus blockage increases from the stop line, the effect on the saturation flow decreases, while with more buses stopping at the same bus stop, the saturation flow reduces further. The study revealed that with higher kerbside parking maneuvers on the upstream, the saturation flow reduces, and with an increase in the distance of the parking maneuver from the stop line, the effect on the saturation flow decreases. The adjustment factors for bus blockage due to bus stops within 75m downstream and parking maneuvers within 75m upstream of the intersection have been established for mixed traffic conditions. These adjustment factors could empower the urban planners, enforcement personnel and decision-makers to estimate the reduction in the capacity of signalized intersections for suggesting improvements in the form of parking restrictions/ bus stop relocation for existing intersections or make design changes for planned intersections.

Keywords: signalized intersection, saturation flow, adjustment factors, capacity

Procedia PDF Downloads 120
984 Tracy: A Java Library to Render a 3D Graphical Human Model

Authors: Sina Saadati, Mohammadreza Razzazi

Abstract:

Since Java is an object-oriented language, It can be used to solve a wide range of problems. One of the considerable usages of this language can be found in Agent-based modeling and simulation. Despite the significant power of Java, There is not an easy method to render a 3-dimensional human model. In this article, we are about to develop a library which helps modelers present a 3D human model and control it with Java. The library runs two server programs. The first one is a web page server that can connect to any browser and present an HTML code. The second server connects to the browser and controls the movement of the model. So, the modeler will be able to develop a simulation and display a good-looking human model without any knowledge of any graphical tools.

Keywords: agent-based modeling and simulation, human model, graphics, Java, distributed systems

Procedia PDF Downloads 106
983 Back to Basics: Redefining Quality Measurement for Hybrid Software Development Organizations

Authors: Satya Pradhan, Venky Nanniyur

Abstract:

As the software industry transitions from a license-based model to a subscription-based Software-as-a-Service (SaaS) model, many software development groups are using a hybrid development model that incorporates Agile and Waterfall methodologies in different parts of the organization. The traditional metrics used for measuring software quality in Waterfall or Agile paradigms do not apply to this new hybrid methodology. In addition, to respond to higher quality demands from customers and to gain a competitive advantage in the market, many companies are starting to prioritize quality as a strategic differentiator. As a result, quality metrics are included in the decision-making activities all the way up to the executive level, including board of director reviews. This paper presents key challenges associated with measuring software quality in organizations using the hybrid development model. We introduce a framework called Prevention-Inspection-Evaluation-Removal (PIER) to provide a comprehensive metric definition for hybrid organizations. The framework includes quality measurements, quality enforcement, and quality decision points at different organizational levels and project milestones. The metrics framework defined in this paper is being used for all Cisco systems products used in customer premises. We present several field metrics for one product portfolio (enterprise networking) to show the effectiveness of the proposed measurement system. As the results show, this metrics framework has significantly improved in-process defect management as well as field quality.

Keywords: quality management system, quality metrics framework, quality metrics, agile, waterfall, hybrid development system

Procedia PDF Downloads 171