Search results for: spread reshaping code
1863 Reasons of Change in Security Prices and Price Volatility: An Analysis of the European Carbon Futures Market
Authors: Boulis M. Ibrahim, Iordanis A. Kalaitzoglou
Abstract:
A micro structural pricing model is proposed in which price components account for learning by incorporating changing expectations of the trading intensity and the risk level of incoming trades. An analysis of European carbon futures transactions finds expected trading intensity to increase the information component and decrease the liquidity component of price changes, but at different rates. Among the results, the expected persistence in trading intensity explains the majority of the auto correlations in the level and the conditional volatility of price changes, helps predict hourly patterns in the bid–ask spread and differentiates between the impact of buy versus sell and continuing versus reversing trades.Keywords: CO2 emission allowances, market microstructure, duration, price discovery
Procedia PDF Downloads 4091862 Ancient Malay and Spice Trade Routes: A Study of Ancient Malay from the Perspectives of Linguistics and Archaeology
Authors: Totok Suhardijanto, Ninie Susanti Tedjowasono
Abstract:
This paper discusses the relationship between the distribution of Ancient Malay inscriptions and Spice Trade Route, especially in the relation with material cultures that accompany them, to understand how Malay could spread out around the archipelago beyond its original native-speakers’ region. The archipelago was known as the Spice Islands from the very beginning of the first century due to mace, cloves, and nutmeg that were originally exclusively found there. According to the Indian record, since the 2nd century, there has been a contact established between Indian and Indonesian people. A Chinese document from 3rd Century has mentioned Wangka (now widely known as Bangka) an island near Sumatra where some Chinese expeditions had visited. All of these records supported the existence of a maritime trade system and route between the archipelago and other countries during the first millennium. This paper will discuss first the Ancient Malay inscription spread around the archipelago from the perspectives of language variation and writing system style. Analyzing language variations of inscriptions certainly is not as easy as studying current spoken language variations in modern sociolinguistics. A huge amount of data is available for such kind of studies. On the contrary, in language variation research with inscription texts as an object, data is insufficient. Other resources will be needed to support the linguistic analysis. For this reason, this research made use of epigraphical evidence in the surrounding areas of the inscriptions to explain the variation of language and writing style. The research next expands the analysis to figure out the relationship between language variation and inscriptions distribution to the Spice Trade Route that spreads from the Molucca Sea to Mediterranian Sea. Data in this research consists of six different inscriptions: Kedukan Bukit, Koto Kapur, Dapunta Salendra, Sang Hyang Wintang, Ligor, and Laguna from the 7th-9th Century and found in Sumatra, Jawa, and the Philippines. In addition, as a comparative resource, this research also used Hikayat Tanjung Tanah, the first-founded Ancient Malay manuscript. In language analysis, we conduct a sociolinguistic method to explore the language variation and writing style of the inscriptions. For dealing with archaeological data, we conducted a hermeneutic method to analyze the possible meaning and social uses of the data. Language variations and writing system style in this research can be classified into two main groups. The language, epigraphical, and archaeological evidence explain that Ancient Malay had been widely used in the Eastern area of Spice Trade Route because it played an important role in the region as a lingua franca between people from different ethnic groups with different languages.Keywords: Ancient Malay, Spice trade route, language variation, writing system variation
Procedia PDF Downloads 1931861 Analysis of Security Vulnerabilities for Mobile Health Applications
Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López
Abstract:
The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors
Procedia PDF Downloads 5191860 Sexual Diversity Training for Hong Kong Teachers Preliminary Themes Identified from Qualitative Interviews
Authors: Diana K. Kwok
Abstract:
Despite the fact that Hong Kong government aims to develop an inclusive society, sexual minority students continue to encounter sexual prejudice without legal protection. They also have difficulties accessing relevant services from mental health and educational professionals, who do not receive systematic training to work with sexual minority students. Informed by the literature on sexual prejudice, heterosexual hegemony, genderism, as well as code of practice for frontline practitioners, the authors explored self-perceived knowledge of teachers and sexual minorities on sexuality and sexual prejudice, and how they perceive prejudice towards sexual minorities in Chinese cultural context. Semi-structure qualitative interviews were carried out with 31 school personnel informants (school teachers and counseling team members) and 25 sexual minority informants on their understanding of sexuality knowledge, their perception of sexual prejudice within school context in Hong Kong, as well as their suggested themes on teachers training on sexual prejudice reduction. This presentation specifically focuses on transcripts from sexual minority informants. Data analysis was carried out through NVivo, and followed the procedures spelt out in the qualitative research literature. Trustworthiness of the study was addressed through various strategies. Preliminary themes emerged from transcript content analysis: 1) A gap of knowledge between sexual minority informants and teachers; 2) Perception on sexual prejudice within cultural context; 3) Heterosexual hegemony and genderism within school system; 4) Needs for mandatory training: contents and strategies. The sexual minority informants found that teachers they encountered were predominantly adopted concepts of binary sex and dichotomous gender. Informants also indicated that the teachings of Confucianism cultural values, religiosity in Hong Kong might well be important cultural forces contributing to sexual prejudice manifested in school context. Although human rights and social justice concepts were embedded in professional code of practice of teachers and school helping professionals, informants found that teachers they encountered may face a dilemma when supporting sexual minority students navigating heterosexual hegemony and genderism in, as a consequence of their personal, institutional, cultural and religious backgrounds. Acknowledgments: The sexual prejudice project was funded by the Hong Kong Research Grant Council (ECS28401614), 2015 to 2017.Keywords: sexual prejudice, Chinese teachers, Chinese sexual minorities, teacher training
Procedia PDF Downloads 2831859 Relevancy Measures of Errors in Displacements of Finite Elements Analysis Results
Authors: A. B. Bolkhir, A. Elshafie, T. K. Yousif
Abstract:
This paper highlights the methods of error estimation in finite element analysis (FEA) results. It indicates that the modeling error could be eliminated by performing finite element analysis with successively finer meshes or by extrapolating response predictions from an orderly sequence of relatively low degree of freedom analysis results. In addition, the paper eliminates the round-off error by running the code at a higher precision. The paper provides application in finite element analysis results. It draws a conclusion based on results of application of methods of error estimation.Keywords: finite element analysis (FEA), discretization error, round-off error, mesh refinement, richardson extrapolation, monotonic convergence
Procedia PDF Downloads 4971858 Static Modeling of the Delamination of a Composite Material Laminate in Mode II
Authors: Y. Madani, H. Achache, B. Boutabout
Abstract:
The purpose of this paper is to analyze numerically by the three-dimensional finite element method, using ABAQUS calculation code, the mechanical behavior of a unidirectional and multidirectional delaminated stratified composite under mechanical loading in Mode II. This study consists of the determination of the energy release rate G in mode II as well as the distribution of equivalent von Mises stresses along the damaged zone by varying several parameters such as the applied load and the delamination length. It allowed us to deduce that the high energy release rate favors delamination at the free edges of a stratified plate subjected to bending.Keywords: delamination, energy release rate, finite element method, stratified composite
Procedia PDF Downloads 1761857 Simulation of Direct Solar Dryer with ANSYS
Authors: Boukhris Lahouari
Abstract:
Simulation of solar dryers with ANSYS has revolutionized the way in which drying processes are optimized and analyzed in various industries. This advanced software allows engineers and researchers to simulate the behavior of a solar dryer under different conditions, helping to improve efficiency and reduce energy consumption. This work presents a numerical study of a direct solar dryer, which uses radiation and natural convection to dry agricultural products. The simulations were made in order to determine the dynamic and thermal fields under the influence of the variation in the size of the inlet and outlet opening. The conservation equations based on the standard k-ε turbulence model are solved by the finite volume method using the ANSYS-Fluent commercial code.Keywords: solar dryer, CFD, solar radiation, natural convection, turbulent flow
Procedia PDF Downloads 261856 The Risk of Ground Movements After Digging Two Parallel Vertical Tunnel in Urban
Authors: Djelloul Chafia, Demagh Rafik, Kareche Toufik
Abstract:
Human activities, made without precautions, accelerate the degradation of the soil structure and reduces its resistance. Operations, such as tunnel construction may exercise an influence more or less permanent on the grounds which surrounded them, these structures alter soil it is necessary to predict their impacts by suitable measures. This research is a numerical analysis that deals the risks and effects due to the weakening of the soil after digging two parallel vertical circular tunnels in urban areas, and suggests forecasting techniques based essentially on the organization of underground space. The simulations are performed using the finite-difference code FLAC in a two-dimensional case and with an elasto-plastic behavior of the soil.Keywords: sol, weakening, degradation, prevention, tunnel
Procedia PDF Downloads 5571855 The Targeted Killing of Soleimani between International Law and US Domestic Law
Authors: Mohammad Yousef
Abstract:
The issue of targeted killing has become a part of modern international law topics, as its spread has been accompanied by the technological development of weapons and military equipment, especially armed drones. Until now, there is no specific definition or legal framework for targeted killing in international law, and the issue of its compatibility with international law is still subject to debate and controversy. The case of the targeted killing of General Qassem Soleimani sparked waves of reactions and discussions between legal scholars and US officials in an argument about the legality of killing him in the light of international law rules and US domestic law. This paper firstly discusses the legality of targeted killing in international law and US domestic law; after that, it studies the legal bases and the legal system that governs these operations, while in the second section, it sheds light on the case of Soleimani’s targeted killing in light of international law and US domestic law, by examining the different views of jurists in this regard.Keywords: targeted killing, international law, US domestic law, Qassem Soleimani
Procedia PDF Downloads 1401854 Lie Symmetry Treatment for Pricing Options with Transactions Costs under the Fractional Black-Scholes Model
Authors: B. F. Nteumagne, E. Pindza, E. Mare
Abstract:
We apply Lie symmetries analysis to price and hedge options in the fractional Brownian framework. The reputation of Lie groups is well spread in the area of Mathematical sciences and lately, in Finance. In the presence of transactions costs and under fractional Brownian motions, analytical solutions become difficult to obtain. Lie symmetries analysis allows us to simplify the problem and obtain new analytical solution. In this paper, we investigate the use of symmetries to reduce the partial differential equation obtained and obtain the analytical solution. We then proposed a hedging procedure and calibration technique for these types of options, and test the model on real market data. We show the robustness of our methodology by its application to the pricing of digital options.Keywords: fractional brownian model, symmetry, transaction cost, option pricing
Procedia PDF Downloads 4001853 The First Tendency in Foreign Policy: Theories, Motives, and Effects
Authors: Djehich Mohamed Yousri
Abstract:
In this paper, we explore the extent to which states seek to promote regional foreign policy. More specifically, the analytical feasibility is to find out exactly what countries seek to export, and how they have used their relations and foreign policies to enhance cooperation with other countries. The first part discusses the development of regional interests and theoretical approaches that attempted to explain the push for regionalism in the field of foreign policy. The second part of the paper presents the motives and mechanisms through which states spread the idea of regionalism in making foreign policy. Finally, we assess the implications of regionalism for the nature and practice of foreign policy, particularly with regard to the gains or constraints to which various actors are exposed in their regional endeavors. We conclude with some considerations that indicate that strengthening regionalism has become an additional and real program in the field of foreign policy analysis.Keywords: foreign policy, collective foreign policy, regionalization and foreign policy, regional foreign policy, foreign affairs
Procedia PDF Downloads 2481852 A Framework for SQL Learning: Linking Learning Taxonomy, Cognitive Model and Cross Cutting Factors
Authors: Huda Al Shuaily, Karen Renaud
Abstract:
Databases comprise the foundation of most software systems. System developers inevitably write code to query these databases. The de facto language for querying is SQL and this, consequently, is the default language taught by higher education institutions. There is evidence that learners find it hard to master SQL, harder than mastering other programming languages such as Java. Educators do not agree about explanations for this seeming anomaly. Further investigation may well reveal the reasons. In this paper, we report on our investigations into how novices learn SQL, the actual problems they experience when writing SQL, as well as the differences between expert and novice SQL query writers. We conclude by presenting a model of SQL learning that should inform the instructional material design process better to support the SQL learning process.Keywords: pattern, SQL, learning, model
Procedia PDF Downloads 2561851 A Fault-Tolerant Full Adder in Double Pass CMOS Transistor
Authors: Abdelmonaem Ayachi, Belgacem Hamdi
Abstract:
This paper presents a fault-tolerant implementation for adder schemes using the dual duplication code. To prove the efficiency of the proposed method, the circuit is simulated in double pass transistor CMOS 32nm technology and some transient faults are voluntary injected in the Layout of the circuit. This fully differential implementation requires only 20 transistors which mean that the proposed design involves 28.57% saving in transistor count compared to standard CMOS technology.Keywords: digital electronics, integrated circuits, full adder, 32nm CMOS tehnology, double pass transistor technology, fault toleance, self-checking
Procedia PDF Downloads 3471850 Developing API Economy: Associating Value to APIs and Microservices in an Enterprise
Authors: Mujahid Sultan
Abstract:
The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) methodologies and development approaches. SDLCs range from waterfall to agile, and the development approaches from monolith to microservices. Management, orchestration, and monetization of microservices have created an API economy in the modern enterprise. There are two approaches to API design, code first and design first. Design first is gaining popularity in the industry as this allows capturing the API needs from the stakeholders rather than the development teams guesstimating the needs and associating a monetary value with the APIs and microservices. In this publication, we describe an approach to organizing and creating stakeholder needs and requirements for designing microservices and APIs.Keywords: requirements engineering, enterprise architecture, APIs, microservices, DevOps, continuous delivery, continuous integration, stakeholder viewpoints
Procedia PDF Downloads 1931849 A Generalization of the Secret Sharing Scheme Codes Over Certain Ring
Authors: Ibrahim Özbek, Erdoğan Mehmet Özkan
Abstract:
In this study, we generalize (k,n) threshold secret sharing scheme on the study Ozbek and Siap to the codes over the ring Fq+ αFq. In this way, it is mentioned that the method obtained in that article can also be used on codes over rings, and new advantages to be obtained. The method of securely sharing the key in cryptography, which Shamir first systematized and Massey carried over to codes, became usable for all error-correcting codes. The firewall of this scheme is based on the hardness of the syndrome decoding problem. Also, an open study area is left for those working for other rings and code classes. All codes that correct errors with this method have been the working area of this method.Keywords: secret sharing scheme, linear codes, algebra, finite rings
Procedia PDF Downloads 761848 Youthful Population Sexual Activity in Malawi: A Health Scenario
Authors: A. Sathiya Susuman, N. Wilson
Abstract:
Background: The sexual behaviour of youths is believed to play an important role in the spread of sexually transmitted infections (STIs). Method: The data from the Malawi Demographic and Health Survey 2010 and a sample of 16,217 youth’s age 15 to 24 years (with each household 27.2% female and 72.8% male) was the basis for analysis. Bivariate and logistic regression analysis was performed. Results: The result shows married youth were not interested in condom use (94.2%, p<0.05). Those who were living together were 69 times (OR=1.69, 95% CI, 1.26–2.26) more likely to be involved in early sexual activity compared to those who were not living together. Conclusion: This scientific paper will help other researchers, policy makers, and planners to create strategies to encourage these youths to make use of contraception.Keywords: sexually transmitted infections (STIs), reproductive tract infections (RTIs), condom use, sexual partners, early sexual debut, youths
Procedia PDF Downloads 4371847 The Writing Eight Exercise and Its Impact on Kindergartners
Authors: Karima Merchant
Abstract:
The aim of this study was to analyze the impact of the Writing Eight Exercise, an exercise from the Brain Integration Therapy, with Kindergartners who are struggling with writing tasks in school. With the help of this exercise, children were able to cross the midline, an invisible line running from our brain to our feet, which separates the body’s right from left. Crossing the midline integrates the brain hemispheres, thus encouraging bilateral movement. The study was spread over 15 weeks where the children were required to do the Writing Eight Exercise 4 times a week. The data collection methods included observations, student work samples and feedback from teachers and parents. Based on the results of this study, it can be concluded that the Writing Eight Exercise had a positive impact on students’ approach towards writing tasks, letter formation, and fine motor skills.Keywords: crossing the midline, fine motor skills, letter formation, writing
Procedia PDF Downloads 4611846 Awareness for Air Pollution Impacts on Lung Cancer in Southern California: A Pilot Study for Designed Smartphone Application
Authors: M. Mohammed Raoof, A. Enkhtaivan, H. Aljuaid
Abstract:
This study follows the design science research methodology to design and implement a smartphone application artifact. The developed artifact was evaluated through three phases. The System Usability Scale (SUS) metric was used for the evaluation. The designed artifact aims to spread awareness about reducing air pollution, decreasing lung cancer development, and checking the air quality status in Southern California Counties. Participants have been drawn for a pilot study to facilitate awareness of air pollution. The study found that smartphone applications have a beneficial effect on the study’s aims.Keywords: air pollution, design science research, indoor air pollution, lung cancer, outdoor air pollution, smartphone application
Procedia PDF Downloads 1201845 Variations of Testing Concrete Mechanical Properties by European Standard and American Code
Authors: Ahmed M. Seyam, Rita Nemes, Salem Georges Nehme
Abstract:
Europe and the United States have a worldwide significance in the field of concrete control and construction; according to that, a lot of countries adopted their standards and regulations in the concrete field, as proof of the Europe and US strong standards and due to lack of own regulations. The main controlled property of concrete are the compressive strength, flexure tensile strength, and modulus of elasticity as it relates both to its bearing capacity and to the durability of the elements built with it, so in this paper, ASTM standard and EN standards method of testing those properties were put under the microscope to compare the variations between them.Keywords: concrete, ASTM, EU standards, compressive strength, flexural strength, modulus of elasticity
Procedia PDF Downloads 951844 Art and Culture in the Development Period to Modernization in the Reign of King Rama VI
Authors: Weena Eiamprapai
Abstract:
The growth of Thai society in western style in the middle of Rattanakosin period can be defined as modernization /civilization. These terms had an influence on the development of the country in the reign of King Rama V owing to the governance reform, and cultures influenced by the West. Those were passed on until the reign of King Rama VI. The preference was not only for the renovation of architecture and arts based on Thai customs reflecting the prosperity and beauty of handicrafts but also for the acceptance of westernization. The remain of this acceptance includes the concept of such value as gentlemanly behavior like that in Victorian Era of the United Kingdom, and the support of women’s status. Moreover, the wide spread of modernization leads to the movement to change the country’s governance system from absolute monarchy to democracy by a group of people called Rattanakosin Era (R.E.) 130 party.Keywords: art, culture, development period, modernization, King Rama VI
Procedia PDF Downloads 2941843 Private Coded Computation of Matrix Multiplication
Authors: Malihe Aliasgari, Yousef Nejatbakhsh
Abstract:
The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers
Procedia PDF Downloads 1251842 Wrinkling Prediction of Membrane Composite of Varying Orientation under In-Plane Shear
Abstract:
In this article, the wrinkling failure of orthotropic composite membranes due to in-plane shear deformation is investigated using nonlinear finite element analyses. A nonlinear post-buckling analysis is performed to show the evolution of shear-induced wrinkles. The method of investigation is based on the post-buckling finite element analysis adopted from commercial FEM code; ANSYS. The resulting wrinkling patterns, their amplitude and their wavelengths under the prescribed loads and boundary conditions were confirmed by experimental results. Our study reveals that wrinkles develop when both the magnitudes and coverage of the minimum principal stresses in the laminated composite laminates are sufficiently large to trigger wrinkling.Keywords: composite, FEM, membrane, wrinkling
Procedia PDF Downloads 2771841 SEM-EBSD Observation for Microtubes by Using Dieless Drawing Process
Authors: Takashi Sakai, Itaru Kumisawa
Abstract:
Because die drawing requires insertion of a die, a plug, or a mandrel, higher precision and efficiency are demanded for drawing equipment for a tube having smaller diameter. Manufacturing of such tubes is also accompanied by problems such as cracking and fracture. We specifically examine dieless drawing, which is less affected by these drawing-related difficulties. This deformation process is governed by a similar principle to that of reduction in diameter when pulling a heated glass tube. We conducted dieless drawing of SUS304 stainless steel microtubes under various conditions with three factor parameters of heating temperature, area reduction, and drawing speed. We used SEM-EBSD to observe the processing condition effects on microstructural elements. As the result of this study, crystallographic orientation of microtube is clear by using SEM-EBSD analysis.Keywords: microtube, dieless drawing, IPF (inverse pole figure), GOS (grain orientation spread), crystallographic analysis
Procedia PDF Downloads 2501840 The Role of Physically Adsorbing Species of Oxyhydryl Reagents in Flotation Aggregate Formation
Authors: S. A. Kondratyev, O. I. Ibragimova
Abstract:
The authors discuss the collecting abilities of desorbable species (DS) of saturated fatty acids. The DS species of the reagent are understood as species capable of moving from the surface of the mineral particle to the bubble at the moment of the rupture of the interlayer of liquid separating these objects of interaction. DS species of carboxylic acids (molecules and ionic-molecular complexes) have the ability to spread over the surface of the bubble. The rate of their spreading at pH 7 and 10 over the water surface is determined. The collectibility criterion of saturated fatty acids is proposed. The values of forces exerted by the spreading DS species of reagents on liquid in the interlayer and the liquid flow rate from the interlayer are determined.Keywords: criterion of action of physically adsorbed reagent, flotation, saturated fatty acids, surface pressure
Procedia PDF Downloads 2221839 Investigation of Damage in Glass Subjected to Static Indentation Using Continuum Damage Mechanics
Authors: J. Ismail, F. Zaïri, M. Naït-Abdelaziz, Z. Azari
Abstract:
In this work, a combined approach of continuum damage mechanics (CDM) and fracture mechanics is applied to model a glass plate behavior under static indentation. A spherical indenter is used and a CDM based constitutive model with an anisotropic damage tensor was selected and implemented into a finite element code to study the damage of glass. Various regions with critical damage values were predicted in good agreement with the experimental observations in the literature. In these regions, the directions of crack propagation, including both cracks initiating on the surface as well as in the bulk, were predicted using the strain energy density factor.Keywords: finite element modeling, continuum damage mechanics, indentation, cracks
Procedia PDF Downloads 4221838 Impact of Harmonic Resonance and V-THD in Sohar Industrial Port–C Substation
Authors: R. S. Al Abri, M. H. Albadi, M. H. Al Abri, U. K. Al Rasbi, M. H. Al Hasni, S. M. Al Shidi
Abstract:
This paper presents an analysis study on the impacts of the changes of the capacitor banks, the loss of a transformer, and the installation of distributed generation on the voltage total harmonic distortion and harmonic resonance. The study is applied in a real system in Oman, Sohar Industrial Port–C Substation Network. Frequency scan method and Fourier series analysis method are used with the help of EDSA software. Moreover, the results are compared with limits specified by national Oman distribution code.Keywords: power quality, capacitor bank, voltage total harmonics distortion, harmonic resonance, frequency scan
Procedia PDF Downloads 6191837 Numerical Model Validation Using Durbin Method
Authors: H. Al-Hajeri
Abstract:
The computation of the effectiveness of turbulence enhancement surface features, such as ribs as means of promoting mixing and hence heat transfer, has attracted the continued attention of the engineering community. In this study, the simulation of a three-dimensional cooling passage is carried out employing a number of turbulence models including Durbin model. The cooling passage consists of a square section duct whose upper and lower surfaces feature staggered cuboid ribs. The main objective of this paper is to provide comparisons of the performance of the v2-f model against other established turbulence models as implemented in the commercial CFD code Ansys Fluent. The present study demonstrates that the v2-f model can successfully capture the isothermal air flow phenomena in flow over obstacles.Keywords: CFD, cooling passage, Durbin model, turbulence model
Procedia PDF Downloads 5031836 Inherent Difficulties in Countering Islamophobia
Authors: Imbesat Daudi
Abstract:
Islamophobia, which is a billion-dollar industry, is widespread, especially in the United States, Europe, India, Israel, and countries that have Muslim minorities at odds with their governmental policies. Hatred of Islam in the West did not evolve spontaneously; it was methodically created. Islamophobia's current format has been designed to spread on its own, find a space in the Western psyche, and resist its eradication. Hatred has been sustained by neoconservative ideologues and their allies, which are supported by the mainstream media. Social scientists have evaluated how ideas spread, why any idea can go viral, and where new ideas find space in our brains. This was possible because of the advances in the computational power of software and computers. Spreading of ideas, including Islamophobia, follows a sine curve; it has three phases: An initial exploratory phase with a long lag period, an explosive phase if ideas go viral, and the final phase when ideas find space in the human psyche. In the initial phase, the ideas are quickly examined in a center in the prefrontal lobe. When it is deemed relevant, it is sent for evaluation to another center of the prefrontal lobe; there, it is critically examined. Once it takes a final shape, the idea is sent as a final product to a center in the occipital lobe. This center cannot critically evaluate ideas; it can only defend them from its critics. Counterarguments, no matter how scientific, are automatically rejected. Therefore, arguments that could be highly effective in the early phases are counterproductive once they are stored in the occipital lobe. Anti-Islamophobic intellectuals have done a very good job of countering Islamophobic arguments. However, they have not been as effective as neoconservative ideologues who have promoted anti-Muslim rhetoric that was based on half-truths, misinformation, or outright lies. The failure is partly due to the support pro-war activists receive from the mainstream media, state institutions, mega-corporations engaged in violent conflicts, and think tanks that provide Islamophobic arguments. However, there are also scientific reasons why anti-Islamophobic thinkers have been less effective. There are different dynamics of spreading ideas once they are stored in the occipital lobe. The human brain is incapable of evaluating further once it accepts ideas as its own; therefore, a different strategy is required to be effective. This paper examines 1) why anti-Islamophobic intellectuals have failed in changing the minds of non-Muslims and 2) the steps of countering hatred. Simply put, a new strategy is needed that can effectively counteract hatred of Islam and Muslims. Islamophobia is a disease that requires strong measures. Fighting hatred is always a challenge, but if we understand why Islamophobia is taking root in the twenty-first century, one can succeed in challenging Islamophobic arguments. That will need a coordinated effort of Intellectuals, writers and the media.Keywords: islamophobia, Islam and violence, anti-islamophobia, demonization of Islam
Procedia PDF Downloads 481835 Improve the Provisions in the Life Imprisonment Law in Vietnam
Authors: Nguyen Xuan Thuy
Abstract:
The provisions on life imprisonment in the legal system enable to differentiate criminal liability and individualize the penalties for particularly serious crimes. This punishment acts as an intermediary between the determined imprisonment of a maximum of 20 years and the capital punishment, enabling the penalty system to maintain its internal unity. However, the practice of applying the punishment has been posing many problems that need to be studied in order to come up with solutions to improve the provisions related to the penalty and its effectiveness in the fight against crimes. The article summarizes the law on life imprisonment sentence in the current criminal law to highlight its characteristics and role in Vietnam's Penal Code. It also suggests some solutions to improve the law and its effectiveness in preventing and combating crimes.Keywords: life imprisonment, Vietnam, law, penalty, provisions
Procedia PDF Downloads 981834 Electrical Load Estimation Using Estimated Fuzzy Linear Parameters
Authors: Bader Alkandari, Jamal Y. Madouh, Ahmad M. Alkandari, Anwar A. Alnaqi
Abstract:
A new formulation of fuzzy linear estimation problem is presented. It is formulated as a linear programming problem. The objective is to minimize the spread of the data points, taking into consideration the type of the membership function of the fuzzy parameters to satisfy the constraints on each measurement point and to insure that the original membership is included in the estimated membership. Different models are developed for a fuzzy triangular membership. The proposed models are applied to different examples from the area of fuzzy linear regression and finally to different examples for estimating the electrical load on a busbar. It had been found that the proposed technique is more suited for electrical load estimation, since the nature of the load is characterized by the uncertainty and vagueness.Keywords: fuzzy regression, load estimation, fuzzy linear parameters, electrical load estimation
Procedia PDF Downloads 542