Search results for: deck system
8962 Generalized Synchronization in Systems with a Complex Topology of Attractor
Authors: Olga I. Moskalenko, Vladislav A. Khanadeev, Anastasya D. Koloskova, Alexey A. Koronovskii, Anatoly A. Pivovarov
Abstract:
Generalized synchronization is one of the most intricate phenomena in nonlinear science. It can be observed both in systems with a unidirectional and mutual type of coupling including the complex networks. Such a phenomenon has a number of practical applications, for example, for the secure information transmission through the communication channel with a high level of noise. Known methods for the secure information transmission needs in the increase of the privacy of data transmission that arises a question about the observation of such phenomenon in systems with a complex topology of chaotic attractor possessing two or more positive Lyapunov exponents. The present report is devoted to the study of such phenomenon in two unidirectionally and mutually coupled dynamical systems being in chaotic (with one positive Lyapunov exponent) and hyperchaotic (with two or more positive Lyapunov exponents) regimes, respectively. As the systems under study, we have used two mutually coupled modified Lorenz oscillators and two unidirectionally coupled time-delayed generators. We have shown that in both cases the generalized synchronization regime can be detected by means of the calculation of Lyapunov exponents and phase tube approach whereas due to the complex topology of attractor the nearest neighbor method is misleading. Moreover, the auxiliary system approaches being the standard method for the synchronous regime observation, for the mutual type of coupling results in incorrect results. To calculate the Lyapunov exponents in time-delayed systems we have proposed an approach based on the modification of Gram-Schmidt orthogonalization procedure in the context of the time-delayed system. We have studied in detail the mechanisms resulting in the generalized synchronization regime onset paying a great attention to the field where one positive Lyapunov exponent has already been become negative whereas the second one is a positive yet. We have found the intermittency here and studied its characteristics. To detect the laminar phase lengths the method based on a calculation of local Lyapunov exponents has been proposed. The efficiency of the method has been verified using the example of two unidirectionally coupled Rössler systems being in the band chaos regime. We have revealed the main characteristics of intermittency, i.e. the distribution of the laminar phase lengths and dependence of the mean length of the laminar phases on the criticality parameter, for all systems studied in the report. This work has been supported by the Russian President's Council grant for the state support of young Russian scientists (project MK-531.2018.2).Keywords: complex topology of attractor, generalized synchronization, hyperchaos, Lyapunov exponents
Procedia PDF Downloads 2788961 Stochastic Energy and Reserve Scheduling with Wind Generation and Generic Energy Storage Systems
Authors: Amirhossein Khazali, Mohsen Kalantar
Abstract:
Energy storage units can play an important role to provide an economic and secure operation of future energy systems. In this paper, a stochastic energy and reserve market clearing scheme is presented considering storage energy units. The approach is proposed to deal with stochastic and non-dispatchable renewable sources with a high level of penetration in the energy system. A two stage stochastic programming scheme is formulated where in the first stage the energy market is cleared according to the forecasted amount of wind generation and demands and in the second stage the real time market is solved according to the assumed scenarios.Keywords: energy and reserve market, energy storage device, stochastic programming, wind generation
Procedia PDF Downloads 5778960 Accelerating Side Channel Analysis with Distributed and Parallelized Processing
Authors: Kyunghee Oh, Dooho Choi
Abstract:
Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.Keywords: DPA, distributed computing, parallelized processing, side channel analysis
Procedia PDF Downloads 4318959 Autonomous Quantum Competitive Learning
Authors: Mohammed A. Zidan, Alaa Sagheer, Nasser Metwally
Abstract:
Real-time learning is an important goal that most of artificial intelligence researches try to achieve it. There are a lot of problems and applications which require low cost learning such as learn a robot to be able to classify and recognize patterns in real time and real-time recall. In this contribution, we suggest a model of quantum competitive learning based on a series of quantum gates and additional operator. The proposed model enables to recognize any incomplete patterns, where we can increase the probability of recognizing the pattern at the expense of the undesired ones. Moreover, these undesired ones could be utilized as new patterns for the system. The proposed model is much better compared with classical approaches and more powerful than the current quantum competitive learning approaches.Keywords: competitive learning, quantum gates, quantum gates, winner-take-all
Procedia PDF Downloads 4758958 Special Properties of the Zeros of the Analytic Representations of Finite Quantum Systems
Authors: Muna Tabuni
Abstract:
The paper contains an investigation on the special properties of the zeros of the analytic representations of finite quantum systems. These zeros and their paths completely define the finite quantum system. The present paper studies the construction of the analytic representation from its zeros. The analytic functions of finite quantum systems are introduced. The zeros of the analytic theta functions and their paths have been studied. The analytic function f(z) have exactly d zeros. The analytic function has been constructed from its zeros.Keywords: construction, analytic, representation, zeros
Procedia PDF Downloads 2098957 Comparison Analysis of Multi-Channel Echo Cancellation Using Adaptive Filters
Authors: Sahar Mobeen, Anam Rafique, Irum Baig
Abstract:
Acoustic echo cancellation in multichannel is a system identification application. In real time environment, signal changes very rapidly which required adaptive algorithms such as Least Mean Square (LMS), Leaky Least Mean Square (LLMS), Normalized Least Mean square (NLMS) and average (AFA) having high convergence rate and stable. LMS and NLMS are widely used adaptive algorithm due to less computational complexity and AFA used of its high convergence rate. This research is based on comparison of acoustic echo (generated in a room) cancellation thorough LMS, LLMS, NLMS, AFA and newly proposed average normalized leaky least mean square (ANLLMS) adaptive filters.Keywords: LMS, LLMS, NLMS, AFA, ANLLMS
Procedia PDF Downloads 5678956 The Instrumentalization of Digital Media in the Context of Sexualized Violence
Authors: Katharina Kargel, Frederic Vobbe
Abstract:
Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected.Keywords: sexualized violence, children and youth, grooming, offender strategies, digital media
Procedia PDF Downloads 1868955 Sampling and Chemical Characterization of Particulate Matter in a Platinum Mine
Authors: Juergen Orasche, Vesta Kohlmeier, George C. Dragan, Gert Jakobi, Patricia Forbes, Ralf Zimmermann
Abstract:
Underground mining poses a difficult environment for both man and machines. At more than 1000 meters underneath the surface of the earth, ores and other mineral resources are still gained by conventional and motorised mining. Adding to the hazards caused by blasting and stone-chipping, the working conditions are best described by the high temperatures of 35-40°C and high humidity, at low air exchange rates. Separate ventilation shafts lead fresh air into a mine and others lead expended air back to the surface. This is essential for humans and machines working deep underground. Nevertheless, mines are widely ramified. Thus the air flow rate at the far end of a tunnel is sensed to be close to zero. In recent years, conventional mining was supplemented by mining with heavy diesel machines. These very flat machines called Load Haul Dump (LHD) vehicles accelerate and ease work in areas favourable for heavy machines. On the other hand, they emit non-filtered diesel exhaust, which constitutes an occupational hazard for the miners. Combined with a low air exchange, high humidity and inorganic dust from the mining it leads to 'black smog' underneath the earth. This work focuses on the air quality in mines employing LHDs. Therefore we performed personal sampling (samplers worn by miners during their work), stationary sampling and aethalometer (Microaeth MA200, Aethlabs) measurements in a platinum mine in around 1000 meters under the earth’s surface. We compared areas of high diesel exhaust emission with areas of conventional mining where no diesel machines were operated. For a better assessment of health risks caused by air pollution we applied a separated gas-/particle-sampling tool (or system), with first denuder section collecting intermediate VOCs. These multi-channel silicone rubber denuders are able to trap IVOCs while allowing particles ranged from 10 nm to 1 µm in diameter to be transmitted with an efficiency of nearly 100%. The second section is represented by a quartz fibre filter collecting particles and adsorbed semi-volatile organic compounds (SVOC). The third part is a graphitized carbon black adsorber – collecting the SVOCs that evaporate from the filter. The compounds collected on these three sections were analyzed in our labs with different thermal desorption techniques coupled with gas chromatography and mass spectrometry (GC-MS). VOCs and IVOCs were measured with a Shimadzu Thermal Desorption Unit (TD20, Shimadzu, Japan) coupled to a GCMS-System QP 2010 Ultra with a quadrupole mass spectrometer (Shimadzu). The GC was equipped with a 30m, BP-20 wax column (0.25mm ID, 0.25µm film) from SGE (Australia). Filters were analyzed with In-situ derivatization thermal desorption gas chromatography time-of-flight-mass spectrometry (IDTD-GC-TOF-MS). The IDTD unit is a modified GL sciences Optic 3 system (GL Sciences, Netherlands). The results showed black carbon concentrations measured with the portable aethalometers up to several mg per m³. The organic chemistry was dominated by very high concentrations of alkanes. Typical diesel engine exhaust markers like alkylated polycyclic aromatic hydrocarbons were detected as well as typical lubrication oil markers like hopanes.Keywords: diesel emission, personal sampling, aethalometer, mining
Procedia PDF Downloads 1578954 Properties of Cement Pastes with Different Particle Size Fractions of Metakaolin
Authors: M. Boháč, R. Novotný, F. Frajkorová, R. S. Yadav, T. Opravil, M. Palou
Abstract:
Properties of Portland cement mixtures with various fractions of metakaolin were studied. 10 % of Portland cement CEM I 42.5 R was replaced by different fractions of high reactivity metakaolin with defined chemical and mineralogical properties. Various fractions of metakaolin were prepared by jet mill classifying system. There is a clear trend between fineness of metakaolin and hydration heat development. Due to metakaolin presence in mixtures the compressive strength development of mortars is rather slower for coarser fractions but 28-day flexural strengths are improved for all fractions of metakaoline used in mixtures compared to reference sample of pure Portland cement. Yield point, plastic viscosity and adhesion of fresh pastes are considerably influenced by fineness of metakaolin used in cement pastes.Keywords: calorimetry, cement, metakaolin fineness, rheology, strength
Procedia PDF Downloads 4158953 The Role of Group Size, Public Employees’ Wages and Control Corruption Institutions in a Game-Theoretical Model of Public Corruption
Authors: Pablo J. Valverde, Jaime E. Fernandez
Abstract:
This paper shows under which conditions public corruption can emerge. The theoretical model includes variables such as the public employee wage (w), a control corruption parameter (c), and the group size of interactions (GS) between clusters of public officers and contractors. The system behavior is analyzed using phase diagrams based on combinations of such parameters (c, w, GS). Numerical simulations are implemented in order to contrast analytic results based on Nash equilibria of the theoretical model. Major findings include the functional relationship between wages and network topology, which attempts to reduce the emergence of corrupt behavior.Keywords: public corruption, game theory, complex systems, Nash equilibrium.
Procedia PDF Downloads 2448952 A 'Four Method Framework' for Fighting Software Architecture Erosion
Authors: Sundus Ayyaz, Saad Rehman, Usman Qamar
Abstract:
Software Architecture is the basic structure of software that states the development and advancement of a software system. Software architecture is also considered as a significant tool for the construction of high quality software systems. A clean design leads to the control, value and beauty of software resulting in its longer life while a bad design is the cause of architectural erosion where a software evolution completely fails. This paper discusses the occurrence of software architecture erosion and presents a set of methods for the detection, declaration and prevention of architecture erosion. The causes and symptoms of architecture erosion are observed with the examples of prescriptive and descriptive architectures and the practices used to stop this erosion are also discussed by considering different types of software erosion and their affects. Consequently finding and devising the most suitable approach for fighting software architecture erosion and in some way reducing its affect is evaluated and tested on different scenarios.Keywords: software architecture, architecture erosion, prescriptive architecture, descriptive architecture
Procedia PDF Downloads 5028951 Electronic and Computer-Assisted Refreshable Braille Display Developed for Visually Impaired Individuals
Authors: Ayşe Eldem, Fatih Başçiftçi
Abstract:
Braille alphabet is an important tool that enables visually impaired individuals to have a comfortable life like those who have normal vision. For this reason, new applications related to the Braille alphabet are being developed. In this study, a new Refreshable Braille Display was developed to help visually impaired individuals learn the Braille alphabet easier. By means of this system, any text downloaded on a computer can be read by the visually impaired individual at that moment by feeling it by his/her hands. Through this electronic device, it was aimed to make learning the Braille alphabet easier for visually impaired individuals with whom the necessary tests were conducted.Keywords: visually impaired individual, Braille, Braille display, refreshable Braille display, USB
Procedia PDF Downloads 3478950 Spline Solution of Singularly Perturbed Boundary Value Problems
Authors: Reza Mohammadi
Abstract:
Using quartic spline, we develop a method for numerical solution of singularly perturbed two-point boundary-value problems. The purposed method is fourth-order accurate and applicable to problems both in singular and non-singular cases. The convergence analysis of the method is given. The resulting linear system of equations has been solved by using a tri-diagonal solver. We applied the presented method to test problems which have been solved by other existing methods in references, for comparison of presented method with the existing methods. Numerical results are given to illustrate the efficiency of our methods.Keywords: second-order ordinary differential equation, singularly-perturbed, quartic spline, convergence analysis
Procedia PDF Downloads 2968949 Effect of Self-Lubricating Carbon Materials on the Tribological Performance of Ultra-High Molecular Weight Polyethylene
Authors: Nayeli Camacho, Fernanda Lara-Perez, Carolina Ortega-Portilla, Diego G. Espinosa-Arbelaez, Juan M. Alvarado-Orozco, Guillermo C. Mondragon-Rodriguez
Abstract:
Ultra-high molecular weight polyethylene (UHMWPE) has been the gold standard material for total knee replacements for almost five decades. Wear damage to UHMWPE articulating surface is inevitable due to the natural sliding and rolling movements of the knee. This generates a considerable amount of wear debris, which results in mechanical instability of the joint, reduces joint mobility, increases pain with detrimental biologic responses, and causes component loosening. The presence of wear particles has been closely related to adverse reactions in the knee joint surrounding tissue, especially for particles in the range of 0.3 to 2 μm. Carbon-based materials possess excellent mechanical properties and have shown great promise in tribological applications. In this study, diamond-like carbon coatings (DLC) and carbon nanotubes (CNTs) were used to decrease the wear rate of ultra-high molecular weight polyethylene. A titanium doped DLC (Ti-DLC) was deposited by magnetron sputtering on stainless steel precision spheres while CNTs were used as a second phase reinforcement in UHMWPE at a concentration of 1.25 wt.%. A comparative tribological analysis of the wear of UHMWPE and UHMWPE-CNTs with a stainless steel counterpart with and without Ti-DLC coating is presented. The experimental wear testing was performed on a pin-on-disc tribometer under dry conditions, using a reciprocating movement with a load of 1 N at a frequency of 2 Hz for 100,000 and 200,000 cycles. The wear tracks were analyzed with high-resolution scanning electron microscopy to determine wear modes and observe the size and shape of the wear debris. Furthermore, profilometry was used to study the depth of the wear tracks and to map the wear of the articulating surface. The wear tracks at 100,000 and 200,000 cycles on all samples were relatively shallow, and they were in the range of average roughness. It was observed that the Ti-DLC coating decreases the mass loss in the UHMWPE and the depth of the wear track. The combination of both carbon-based materials decreased the material loss compared to the system of stainless steel and UHMWPE. Burnishing of the surface was the predominant wear mode observed with all the systems, more subtle for the systems with Ti-DLC coatings. Meanwhile, in the system composed of stainless steel-UHMWPE, the intrinsic surface roughness of the material was completely replaced by the wear tracks.Keywords: CNT reinforcement, self-lubricating materials, Ti-DLC, UHMWPE tribological performance
Procedia PDF Downloads 1128948 Data Quality and Associated Factors on Regular Immunization Programme at Ararso District: Somali Region- Ethiopia
Authors: Eyob Seife, Molla Alemayaehu, Tesfalem Teshome, Bereket Seyoum, Behailu Getachew
Abstract:
Globally, immunization averts between 2 and 3 million deaths yearly, but Vaccine-Preventable Diseases still account for more in Sub-Saharan African countries and takes the majority of under-five deaths yearly, which indicates the need for consistent and on-time information to have evidence-based decision so as to save lives of these vulnerable groups. However, ensuring data of sufficient quality and promoting an information-use culture at the point of collection remains critical and challenging, especially in remote areas where the Ararso district is selected based on a hypothesis of there is a difference in reported and recounted immunization data consistency. Data quality is dependent on different factors where organizational, behavioral, technical and contextual factors are the mentioned ones. A cross-sectional quantitative study was conducted on September 2022 in the Ararso district. The study used the world health organization (WHO) recommended data quality self-assessment (DQS) tools. Immunization tally sheets, registers and reporting documents were reviewed at 4 health facilities (1 health center and 3 health posts) of primary health care units for one fiscal year (12 months) to determine the accuracy ratio, availability and timeliness of reports. The data was collected by trained DQS assessors to explore the quality of monitoring systems at health posts, health centers, and at the district health office. A quality index (QI), availability and timeliness of reports were assessed. Accuracy ratios formulated were: the first and third doses of pentavalent vaccines, fully immunized (FI), TT2+ and the first dose of measles-containing vaccines (MCV). In this study, facility-level results showed poor timeliness at all levels and both over-reporting and under-reporting were observed at all levels when computing the accuracy ratio of registration to health post reports found at health centers for almost all antigens verified. A quality index (QI) of all facilities also showed poor results. Most of the verified immunization data accuracy ratios were found to be relatively better than that of quality index and timeliness of reports. So attention should be given to improving the capacity of staff, timeliness of reports and quality of monitoring system components, namely recording, reporting, archiving, data analysis and using information for decisions at all levels, especially in remote and areas.Keywords: accuracy ratio, ararso district, quality of monitoring system, regular immunization program, timeliness of reports, Somali region-Ethiopia
Procedia PDF Downloads 748947 Research on the Positive Mechanism of Land Transfer Problems and Transformation in the Context of Rural Revitalization
Authors: Dong Tianxiang
Abstract:
In the context of the era of rural revitalization, rural land is popular for more and more active, and its process has been widely concerned by all walks of life. By analyzing and summarizing the actual situation of land transfer, the author found that land transfer has such problems as ambiguous land transfer benefit subjects, decentralized and disorderly land transfer forms, lack of guarantee system for land transfer, and land transfer affecting food production. Based on the above problems, the author first analyzes the specific situation of land transfer in the study area with relevant econometric models and ArcGIS spatial analysis methods and analyzes its causes to construct a positive role mechanism of land use transformation on land transfer.Keywords: land transfer, land use, rural revitalization, population loss
Procedia PDF Downloads 208946 Effect of Control Lasers Polarization on Absorption Coefficient and Refractive Index of a W-Type 4- Level Cylindrical Quantum Dot in the Presence Of Electromagnetically Induced Transparency (ETI)
Authors: Marziehossadat Moezzi
Abstract:
In this paper, electromagnetically induced transparency (EIT) is investigated in a cylindrical quantum dot (QD) with a parabolic confinement potential. We study the effect of control lasers polarization on absorption coefficient, refractive index and also on the generation of the double transparency windows in this system. Considering an effective mass method, the time-independent Schrödinger equation is solved to obtain the energy structure of the QD. Also, we study the effect of structural characteristics of the QD on refraction and absorption of the QD in the presence of EIT.Keywords: electromagnetically induced transparency, cylindrical quantum dot, absorption coefficient, refractive index
Procedia PDF Downloads 2008945 Buzan Mind Mapping: An Efficient Technique for Note-Taking
Authors: T. K. Tee, M. N. A. Azman, S. Mohamed, M. Muhammad, M. M. Mohamad, J. Md Yunos, M. H. Yee, W. Othman
Abstract:
Buzan mind mapping is an efficient system of note-taking that makes revision a fun thing to do for students. Tony Buzan has been teaching children all over the world for the past thirty years and has proved that mind maps are the magic formula in the classroom for everyone. The purpose of this paper is to discuss the importance of Buzan mind mapping as a note-taking technique for the secondary school students. This paper also examines the mind mapping technique, advantages and disadvantages of hand-drawn mind maps. Samples of students’ mind maps were presented and discussed.Keywords: Buzan mind mapping, note-taking technique, hand-drawn, mind maps
Procedia PDF Downloads 5408944 Semantic Analysis of the Change in Awareness of Korean College Admission Policy
Authors: Sujin Hwang, Hyerang Park, Hyunchul Kim
Abstract:
The purpose of this study is to find the effectiveness of the admission simplification policy. The number of online news articles about ‘high school record’ was collected and semantically analyzed to identify and analyze the social awareness during 2014 to 2015. The main results of the study are as follows: First, there was a difference in expectations that the burden of the examinees would decrease as announced by KCUE. Thus, there was still a strain on the university entrance exam after the enforcement of the policy. Second, private tutoring is expanding in different forms, rather than reducing the policy. It is different from the prediction that examinees can prepare for university admissions without the private tutoring. Thus, the college admission rules currently enforced needs to be improved. The reasonable college admission system changes are discussed.Keywords: education policy, private tutoring, shadow education, education admission policy
Procedia PDF Downloads 2278943 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems
Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana
Abstract:
The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.Keywords: mitigations, risk, transport, security, vulnerabilities
Procedia PDF Downloads 1668942 Computational Analysis of Thermal Degradation in Wind Turbine Spars' Equipotential Bonding Subjected to Lightning Strikes
Authors: Antonio A. M. Laudani, Igor O. Golosnoy, Ole T. Thomsen
Abstract:
Rotor blades of large, modern wind turbines are highly susceptible to downward lightning strikes, as well as to triggering upward lightning; consequently, it is necessary to equip them with an effective lightning protection system (LPS) in order to avoid any damage. The performance of existing LPSs is affected by carbon fibre reinforced polymer (CFRP) structures, which lead to lightning-induced damage in the blades, e.g. via electrical sparks. A solution to prevent internal arcing would be to electrically bond the LPS and the composite structures such that to obtain the same electric potential. Nevertheless, elevated temperatures are achieved at the joint interfaces because of high contact resistance, which melts and vaporises some of the epoxy resin matrix around the bonding. The produced high-pressure gasses open up the bonding and can ignite thermal sparks. The objective of this paper is to predict the current density distribution and the temperature field in the adhesive joint cross-section, in order to check whether the resin pyrolysis temperature is achieved and any damage is expected. The finite element method has been employed to solve both the current and heat transfer problems, which are considered weakly coupled. The mathematical model for electric current includes Maxwell-Ampere equation for induced electric field solved together with current conservation, while the thermal field is found from heat diffusion equation. In this way, the current sub-model calculates Joule heat release for a chosen bonding configuration, whereas the thermal analysis allows to determining threshold values of voltage and current density not to be exceeded in order to maintain the temperature across the joint below the pyrolysis temperature, therefore preventing the occurrence of outgassing. In addition, it provides an indication of the minimal number of bonding points. It is worth to mention that the numerical procedures presented in this study can be tailored and applied to any type of joints other than adhesive ones for wind turbine blades. For instance, they can be applied for lightning protection of aerospace bolted joints. Furthermore, they can even be customized to predict the electromagnetic response under lightning strikes of other wind turbine systems, such as nacelle and hub components.Keywords: carbon fibre reinforced polymer, equipotential bonding, finite element method, FEM, lightning protection system, LPS, wind turbine blades
Procedia PDF Downloads 1658941 Comparison Analysis of CFD Turbulence Fluid Numerical Study for Quick Coupling
Authors: JoonHo Lee, KyoJin An, JunSu Kim, Young-Chul Park
Abstract:
In this study, the fluid flow characteristics and performance numerical study through CFD model of the Non-split quick coupling for flow control in hydraulic system equipment for the aerospace business group focused to predict. In this study, we considered turbulence models for the application of Computational Fluid Dynamics for the CFD model of the Non-split Quick Coupling for aerospace business. In addition to this, the adequacy of the CFD model were verified by comparing with standard value. Based on this analysis, accurate the fluid flow characteristics can be predicted. It is, therefore, the design of the fluid flow characteristic contribute the reliability for the Quick Coupling which is required in industries on the basis of research results.Keywords: CFD, FEM, quick coupling, turbulence
Procedia PDF Downloads 3868940 Towards a Conscious Design in AI by Overcoming Dark Patterns
Authors: Ayse Arslan
Abstract:
One of the important elements underpinning a conscious design is the degree of toxicity in communication. This study explores the mechanisms and strategies for identifying toxic content by avoiding dark patterns. Given the breadth of hate and harassment attacks, this study explores a threat model and taxonomy to assist in reasoning about strategies for detection, prevention, mitigation, and recovery. In addition to identifying some relevant techniques such as nudges, automatic detection, or human-ranking, the study suggests the use of major metrics such as the overhead and friction of solutions on platforms and users or balancing false positives (e.g., incorrectly penalizing legitimate users) against false negatives (e.g., users exposed to hate and harassment) to maintain a conscious design towards fairness.Keywords: AI, ML, algorithms, policy, system design
Procedia PDF Downloads 1228939 The Application of Data Mining Technology in Building Energy Consumption Data Analysis
Authors: Liang Zhao, Jili Zhang, Chongquan Zhong
Abstract:
Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.Keywords: data mining, data analysis, prediction, optimization, building operational performance
Procedia PDF Downloads 8558938 Absorption Control of Organic Solar Cells under LED Light for High Efficiency Indoor Power System
Authors: Premkumar Vincent, Hyeok Kim, Jin-Hyuk Bae
Abstract:
Organic solar cells have high potential which enables these to absorb much weaker light than 1-sun in indoor environment. They also have several practical advantages, such as flexibility, cost-advantage, and semi-transparency that can have superiority in indoor solar energy harvesting. We investigate organic solar cells based on poly(3-hexylthiophene) (P3HT) and indene-C60 bisadduct (ICBA) for indoor application while Finite Difference Time Domain (FDTD) simulations were run to find the optimized structure. This may provide the highest short-circuit current density to acquire high efficiency under indoor illumination.Keywords: indoor solar cells, indoor light harvesting, organic solar cells, P3HT:ICBA, renewable energy
Procedia PDF Downloads 3118937 Features of Annual Junior Men's Kayak Training Loads in China
Authors: Liu Haitao, Wang Hengyong
Abstract:
This paper attempts to kayak, Zhaoqing City, the annual training program for young men, the deconstruction and analysis, describe the characteristics of their training load, Young people to extract the key issues for training kayak, kayak training young people to clarify in Zhaoqing City, and the cause of the bottlenecks. On one hand, scientifically arranging for the coaches to adjust training load and provide the basis for periodic structure, for young people to provide practical reference kayak athletes. On the other hand, through their training load research, enrich the theoretical system kayak training project for junior kayak athletes to provide a theoretical basis.Keywords: juniors, kayak, training programs, full year
Procedia PDF Downloads 5918936 Facile Synthesis of Copper Based Nanowires Suitable for Lithium Ion Battery Application
Authors: Zeinab Sanaee, Hossein Jafaripour
Abstract:
Copper is an excellent conductive material that is widely used in the energy devices such as Lithium-ion batteries and supercapacitors as the current collector. On the other hand, copper oxide nanowires have been used in these applications as potential electrode material. In this paper, nanowires of Copper and Copper oxide have been synthesized through a simple and time and cost-effective approach. The thermally grown Copper oxide nanowires have been converted into Copper nanowires through annealing in the Hydrogen atmosphere in a DC-PECVD system. To have a proper Copper nanostructure formation, an Au nanolayer was coated on the surface of Copper oxide nanowires. The results show the successful achievement of Copper nanowires without deformation or cracking. These structures have a great potential for Lithium-ion batteries and supercapacitors.Keywords: Copper, Copper oxide, nanowires, Hydrogen annealing, Lithium ion battery
Procedia PDF Downloads 888935 Tolerating Input Faults in Asynchronous Sequential Machines
Authors: Jung-Min Yang
Abstract:
A method of tolerating input faults for input/state asynchronous sequential machines is proposed. A corrective controller is placed in front of the considered asynchronous machine to realize model matching with a reference model. The value of the external input transmitted to the closed-loop system may change by fault. We address the existence condition for the controller that can counteract adverse effects of any input fault while maintaining the objective of model matching. A design procedure for constructing the controller is outlined. The proposed reachability condition for the controller design is validated in an illustrative example.Keywords: asynchronous sequential machines, corrective control, fault tolerance, input faults, model matching
Procedia PDF Downloads 4248934 Determination of Friction and Damping Coefficients of Folded Cover Mechanism Deployed by Torsion Springs
Authors: I. Yilmaz, O. Taga, F. Kosar, O. Keles
Abstract:
In this study, friction and damping coefficients of folded cover mechanism were obtained in accordance with experimental studies and data. Friction and damping coefficients are the most important inputs to accomplish a mechanism analysis. Friction and damping are two objects that change the time of deployment of mechanisms and their dynamic behaviors. Though recommended friction coefficient values exist in literature, damping is differentiating feature according to mechanic systems. So the damping coefficient should be obtained from mechanism test outputs. In this study, the folded cover mechanism use torsion springs for deploying covers that are formerly close folded position. Torsion springs provide folded covers with desirable deploying time according to variable environmental conditions. To verify all design revisions with system tests will be so costly so that some decisions are taken in accordance with numerical methods. In this study, there are two folded covers required to deploy simultaneously. Scotch-yoke and crank-rod mechanisms were combined to deploy folded covers simultaneously. The mechanism was unlocked with a pyrotechnic bolt onto scotch-yoke disc. When pyrotechnic bolt was exploded, torsion springs provided rotational movement for mechanism. Quick motion camera was recording dynamic behaviors of system during deployment case. Dynamic model of mechanism was modeled as rigid body with Adams MBD (multi body dynamics) then torque values provided by torsion springs were used as an input. A well-advised range of friction and damping coefficients were defined in Adams DOE (design of experiment) then a large number of analyses were performed until deployment time of folded covers run in with test data observed in record of quick motion camera, thus the deployment time of mechanism and dynamic behaviors were obtained. Same mechanism was tested with different torsion springs and torque values then outputs were compared with numerical models. According to comparison, it was understood that friction and damping coefficients obtained in this study can be used safely when studying on folded objects required to deploy simultaneously. In addition to model generated with Adams as rigid body the finite element model of folded mechanism was generated with Abaqus then the outputs of rigid body model and finite element model was compared. Finally, the reasonable solutions were suggested about different outputs of these solution methods.Keywords: damping, friction, pyro-technic, scotch-yoke
Procedia PDF Downloads 3268933 Plants as Alternative Covers at Contaminated Sites
Authors: M. Grifoni, G. Petruzzelli, M. Barbafieri, I. Rosellini, B. Pezzarossa, F. Pedron
Abstract:
Evapotranspiration (ET) covers are an alternative cover system that utilizes water balance approach to maximize the ET process to reduce the contaminants leaching through the soil profile. Microcosm tests allow to identify in a short time the most suitable plant species to be used as alternative covers, their survival capacity, and simultaneously the transpiration and evaporation rate of the cover in a specific contaminated soil. This work shows the soil characterization and ET results of microcosm tests carried out on two contaminated soils by using Triticum durum and Helianthus annuus species. The data indicated that transpiration was higher than evaporation, supporting the use of plants as alternative cover at this contaminated site.Keywords: contaminated sites, evapotranspiration cover, evapotranspiration, microcosm experiments
Procedia PDF Downloads 292