Search results for: mechanism constraints
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4184

Search results for: mechanism constraints

4124 Energy-Aware Scheduling in Real-Time Systems: An Analysis of Fair Share Scheduling and Priority-Driven Preemptive Scheduling

Authors: Su Xiaohan, Jin Chicheng, Liu Yijing, Burra Venkata Durga Kumar

Abstract:

Energy-aware scheduling in real-time systems aims to minimize energy consumption, but issues related to resource reservation and timing constraints remain challenges. This study focuses on analyzing two scheduling algorithms, Fair-Share Scheduling (FFS) and Priority-Driven Preemptive Scheduling (PDPS), for solving these issues and energy-aware scheduling in real-time systems. Based on research on both algorithms and the processes of solving two problems, it can be found that Fair-Share Scheduling ensures fair allocation of resources but needs to improve with an imbalanced system load, and Priority-Driven Preemptive Scheduling prioritizes tasks based on criticality to meet timing constraints through preemption but relies heavily on task prioritization and may not be energy efficient. Therefore, improvements to both algorithms with energy-aware features will be proposed. Future work should focus on developing hybrid scheduling techniques that minimize energy consumption through intelligent task prioritization, resource allocation, and meeting time constraints.

Keywords: energy-aware scheduling, fair-share scheduling, priority-driven preemptive scheduling, real-time systems, optimization, resource reservation, timing constraints

Procedia PDF Downloads 103
4123 Mechanism of Changing a Product Concept

Authors: Kiyohiro Yamazaki

Abstract:

The purpose of this paper is to examine the hypothesis explaining the mechanism in the case, where the product is deleted or reduced the fundamental function of the product through the product concept changes in the digital camera industry. This paper points out not owning the fundamental technology might cause the change of the product concept. Casio could create new competitive factor so that this paper discusses a possibility of the mechanism of changing the product concept.

Keywords: firm without fundamental technology, product development, product concept, digital camera industry, Casio

Procedia PDF Downloads 542
4122 Design of an Air and Land Multi-Element Expression Pattern of Navigation Electronic Map for Ground Vehicles under United Navigation Mechanism

Authors: Rui Liu, Pengyu Cui, Nan Jiang

Abstract:

At present, there is much research on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing between land, sea, and air navigation targets is not deeply applied into the research of navigation information service, especially in the information expression. Targeting at this problem, the paper carries out works about the expression pattern of navigation electronic map for ground vehicles under air and land united navigation mechanism. At first, with the support from multi-source information fusion of GIS vector data, RS data, GPS data, etc., an air and land united information expression pattern is designed aiming at specific navigation task of emergency rescue in the earthquake. And then, the characteristics and specifications of the united expression of air and land navigation information under the constraints of map load are summarized and transferred into expression rules in the rule bank. At last, the related navigation experiment is implemented to evaluate the effect of the expression pattern. The experiment selects evaluation factors of the navigation task accomplishment time and the navigation error rate as the main index, and make comparisons with the traditional single information expression pattern. To sum up, the research improved the theory of navigation electronic map and laid a certain foundation for the design and realization of united navigation system in the aspect of real-time navigation information delivery.

Keywords: navigation electronic map, united navigation, multi-element expression pattern, multi-source information fusion

Procedia PDF Downloads 171
4121 Explicable Enzymatic Mechanism of H-Ido to Oxidise Tryptophan by Employing Various Substrates

Authors: Ali Bahri Lubis

Abstract:

The study of dioxygenase enzymatic mechanism on tryptophan oxidation has been a wide interest since the reaction is rate-limiting step of kynurenine pathway. In this research, observation of tryptophan oxidation through h-IDO enzyme along with synthesis of enzyme products was conducted in order to comprehend how the enzyme works on distinct substrates. UV-vis spectrophotometry, LC-MS, H-NMR and HSQC measurement were carried out to characterise enzyme product. It is found that while tryptophan was oxidised to form Nformylkynurenine (NFK) as a major product and hydroxypyrroloindole amine carboxylic acid (HPIC) in cis and trans confirmed in HSQC, N-methyl tryptophan substrate was converted to NFK and trans HPIC only. Other intriguing results showed that 5-hydroxy- tryptophan and Stryptophan was degraded to become NFK and epoxide cyclic respectively. The formation of NFK was considered through dioxygenation pathway, however HPIC was formed via monooxygenation. The epoxide cyclic—considered as intermediate compound in the mechanism— from S-tryptophan was not able to cleave the epoxide ring since bond energy of epoxide was probably much stronger. This validates the enzymatic mechanism where the intermediate compound in the enzymatic mechanism is epoxide cyclic.

Keywords: tryptophan oxidation, heme-dioxygenases, N-formylkynurenine, hydroxypyrrroloindoleamine, monooxidation

Procedia PDF Downloads 60
4120 A Workable Mechanism to Support Students Who Are at Risk

Authors: Mohamed Chabi

Abstract:

The project of helping students at risk started at the Math department in the new foundation program at Qatar University in the fall 2012 semester. The purpose was to find ways to help students who were struggling with their math courses Elementary algebra or Precalculus course due to many factors. Department had formed the Committee “students at Risk” at the start of 12-13 to assist struggling students in our math courses to get their studies on track. A mechanism was developed to support students who are at risk using a developed E-Monitoring system. E-Monitoring system was developed to manage automatically all transactions relevant to the students’ attendance, Students ‘‘warning Students’’ grading, etc. E-Monitoring System produce various statistics such as, Overall course statistics, Performance, Students at Risk… to help department to develop a higher quality of education in the Foundation Program at Math department. The mechanism was studies and evaluated. Whatever the cause, the sooner we identify students who are not performing well academically, the sooner we can provide, or direct them to the resources that are available to them. In this paper, we outline the mechanism and its effect on students’ performance. The collected data from various exams shows that students had benefited from the mechanism.

Keywords: students at risk, e-monitoring system, warning students, performance

Procedia PDF Downloads 469
4119 Constraints and Opportunities of Wood Production Value Chain: Evidence from Southwest Ethiopia

Authors: Abduselam Faris, Rijalu Negash, Zera Kedir

Abstract:

This study was initiated to identify constraints and opportunities of the wood production value chain in Southwest Ethiopia. About 385 wood trees growing farmers were randomly interviewed. Similarly, about 30 small-scale wood processors, 30 retailers, 15 local collectors and 5 wholesalers were purposively included in the study. The results of the study indicated that 98.96 % of the smallholder farmers that engaged in the production of wood trees which is used for wood were male-headed, with an average age of 46.88 years. The main activity that the household engaged was agriculture (crop and livestock) which accounts for about 61.56% of the sample respondents. Through value chain mapping of actors, the major value chain participant and supporting actors were identified. On average, the tree-growing farmers generated gross income of 9385.926 Ethiopian birr during the survey year. Among the critical constraints identified along the wood production value chain was limited supply of credit, poor market information dissemination, high interference of brokers, and shortage of machines, inadequate working area and electricity. The availability of forest resources is the leading opportunity in the wood production value chain. Reinforcing the linkage among wood production value chain actors, providing skill training for small-scale processors, and developing suitable policy for wood tree wise use is key recommendations forward.

Keywords: value chain analysis, wood production, southwest Ethiopia, constraints and opportunities

Procedia PDF Downloads 67
4118 Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems

Authors: Chuan-Ching Sue, Kai-Chun Chuang

Abstract:

Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay.

Keywords: peer-to-peer, live video streaming system, flash crowd, start-up delay, access control

Procedia PDF Downloads 299
4117 Transfer of Constraints or Constraints on Transfer? Syntactic Islands in Danish L2 English

Authors: Anne Mette Nyvad, Ken Ramshøj Christensen

Abstract:

In the syntax literature, it has standardly been assumed that relative clauses and complement wh-clauses are islands for extraction in English, and that constraints on extraction from syntactic islands are universal. However, the Mainland Scandinavian languages has been known to provide counterexamples. Previous research on Danish has shown that neither relative clauses nor embedded questions are strong islands in Danish. Instead, extraction from this type of syntactic environment is degraded due to structural complexity and it interacts with nonstructural factors such as the frequency of occurrence of the matrix verb, the possibility of temporary misanalysis leading to semantic incongruity and exposure over time. We argue that these facts can be accounted for with parametric variation in the availability of CP-recursion, resulting in the patterns observed, as Danish would then “suspend” the ban on movement out of relative clauses and embedded questions. Given that Danish does not seem to adhere to allegedly universal syntactic constraints, such as the Complex NP Constraint and the Wh-Island Constraint, what happens in L2 English? We present results from a study investigating how native Danish speakers judge extractions from island structures in L2 English. Our findings suggest that Danes transfer their native language parameter setting when asked to judge island constructions in English. This is compatible with the Full Transfer Full Access Hypothesis, as the latter predicts that Danish would have difficulties resetting their [+/- CP-recursion] parameter in English because they are not exposed to negative evidence.

Keywords: syntax, islands, second language acquisition, danish

Procedia PDF Downloads 99
4116 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 128
4115 Configuration Design and Optimization of the Movable Leg-Foot Lunar Soft-Landing Device

Authors: Shan Jia, Jinbao Chen, Jinhua Zhou, Jiacheng Qian

Abstract:

Lunar exploration is a necessary foundation for deep-space exploration. For the functional limitations of the fixed landers which are widely used currently and are to expand the detection range by the use of wheeled rovers with unavoidable path-repeatability, a movable lunar soft-landing device based on cantilever type buffer mechanism and leg-foot type walking mechanism is presented. Firstly, a 20 DoFs quadruped configuration based on pushrod is proposed. The configuration is of the bionic characteristics such as hip, knee and ankle joints, and can make the kinematics of the whole mechanism unchanged before and after buffering. Secondly, the multi-function main/auxiliary buffers based on crumple-energy absorption and screw-nut mechanism, as well as the telescopic device which could be used to protect the plantar force sensors during the buffer process are designed. Finally, the kinematic model of the whole mechanism is established, and the configuration optimization of the whole mechanism is completed based on the performance requirements of slope adaptation and obstacle crossing. This research can provide a technical solution integrating soft-landing, large-scale inspection and material-transfer for future lunar exploration and even mars exploration, and can also serve as the technical basis for developing the reusable landers.

Keywords: configuration design, lunar soft-landing device, movable, optimization

Procedia PDF Downloads 132
4114 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 264
4113 Idea Expropriation, Incentives, and Governance within Organizations

Authors: Gulseren Mutlu, Gurupdesh Pandher

Abstract:

This paper studies the strategic interplay between innovation, incentives, expropriation threat and disputes arising from expropriation from an intra-organization perspective. We present a simple principal-agent model with hidden actions and hidden information in which two employees can choose how much (innovative) effort to exert, whether to expropriate the innovation of the other employee and whether to dispute if innovation is expropriated. The organization maximizes its expected payoff by choosing the optimal reward scheme for both employees as well as whether to encourage or discourage disputes. We analyze two mechanisms under which innovative ideas are not expropriated. First, we show that under a non-contestable mechanism (in which the organization discourages disputes among employees), the organization has to offer a “rent” to the potential expropriator. However, under a contestable mechanism (in which the organization encourages disputes), there is no need for such rent. If the cost of resolving the dispute is negligible, the organization’s expected payoff is higher under a contestable mechanism. Second, we develop a comparable team mechanism in which innovation takes place as a result of the joint efforts of employees and innovation payments are made based on the team outcome. We show that if the innovation value is low and employees have similar productivity, then the organization is better off under a contestable mechanism. On the other hand, if the innovation value is high, the organization is better off under a team mechanism. Our results have important practical implications for the design of innovation reward system for employees, hiring policy and governance for different companies.

Keywords: innovation, incentives, expropriation threat, dispute resolution

Procedia PDF Downloads 595
4112 Soot Formation in the Field of Combustion

Authors: Nacira Mecheri, N. Boussid

Abstract:

A new chemical mechanism designed to study the process of forming the first aromatic ring (benzene) and polycyclic aromatic hydrocarbons (PAH) from a flame of acetylene (C2H2) has been developed. The mechanism developed, contains 50 chemical species involved in 268 reversible elementary reactions. The comparison between the results from modelling and experimental measurements allowed us to test the validity of the postulated mechanism in specific experimental conditions. Kinetic analysis of the flame by calculating the maximum rates for each elementary reaction, allowed us to identify key reactions pathways of consumption and formation of main precursors of soot.

Keywords: benzene, PAH, acetylene, modeling, flame, soot

Procedia PDF Downloads 318
4111 “Double Layer” Theory of Hydrogenation

Authors: Vaclav Heral

Abstract:

Ideas about the mechanism of heterogeneous catalytic hydrogenation are diverse. The Horiuti-Polanyi mechanism is most often referred to, based on the idea of a semi-hydrogenated state. In our opinion, it does not represent a satisfactory explanation of the hydrogenation mechanism, because, for example: (1) It neglects the fact that the bond of atomic hydrogen to the metal surface is strongly polarized, (2) It does not explain why a surface deprived of atomic hydrogen (by thermal desorption or by alkyne) loses isomerization capabilities, but hydrogenation capabilities remain preserved, (3) It was observed that during the hydrogenation of 1-alkenes, the reaction can be of the 0th order to hydrogen and to the alkene at the same time, which is excluded during the competitive adsorption of both reactants on the catalyst surface. We offer an alternative mechanism that satisfactorily explains many of the ambiguities: It is the idea of an independent course of olefin isomerization, catalyzed by acidic atomic hydrogen bonded on the surface of the catalyst, in addition to the hydrogenation itself, in which a two-layer complex appears on the surface of the catalyst: olefin bound to the surface and molecular hydrogen bound to it in the second layer. The rate-determining step of hydrogenation is the conversion of this complex into the final product. We believe that the Horiuti-Polanyi mechanism is flawed and we naturally think that our two-layer theory better describes the experimental findings.

Keywords: acidity of hydrogenation catalyst, Horiuti-Polanyi, hydrogenation, two-layer hydrogenation

Procedia PDF Downloads 52
4110 Series-Parallel Systems Reliability Optimization Using Genetic Algorithm and Statistical Analysis

Authors: Essa Abrahim Abdulgader Saleem, Thien-My Dao

Abstract:

The main objective of this paper is to optimize series-parallel system reliability using Genetic Algorithm (GA) and statistical analysis; considering system reliability constraints which involve the redundant numbers of selected components, total cost, and total weight. To perform this work, firstly the mathematical model which maximizes system reliability subject to maximum system cost and maximum system weight constraints is presented; secondly, a statistical analysis is used to optimize GA parameters, and thirdly GA is used to optimize series-parallel systems reliability. The objective is to determine the strategy choosing the redundancy level for each subsystem to maximize the overall system reliability subject to total cost and total weight constraints. Finally, the series-parallel system case study reliability optimization results are showed, and comparisons with the other previous results are presented to demonstrate the performance of our GA.

Keywords: reliability, optimization, meta-heuristic, genetic algorithm, redundancy

Procedia PDF Downloads 320
4109 Generic Model for Timetabling Problems by Integer Linear Programmimg Approach

Authors: Nur Aidya Hanum Aizam, Vikneswary Uvaraja

Abstract:

The agenda of showing the scheduled time for performing certain tasks is known as timetabling. It widely used in many departments such as transportation, education, and production. Some difficulties arise to ensure all tasks happen in the time and place allocated. Therefore, many researchers invented various programming model to solve the scheduling problems from several fields. However, the studies in developing the general integer programming model for many timetabling problems are still questionable. Meanwhile, this thesis describe about creating a general model which solve different types of timetabling problems by considering the basic constraints. Initially, the common basic constraints from five different fields are selected and analyzed. A general basic integer programming model was created and then verified by using the medium set of data obtained randomly which is much similar to realistic data. The mathematical software, AIMMS with CPLEX as a solver has been used to solve the model. The model obtained is significant in solving many timetabling problems easily since it is modifiable to all types of scheduling problems which have same basic constraints.

Keywords: AIMMS mathematical software, integer linear programming, scheduling problems, timetabling

Procedia PDF Downloads 414
4108 4-DOFs Parallel Mechanism for Minimally Invasive Robotic Surgery

Authors: Khalil Ibrahim, Ahmed Ramadan, Mohamed Fanni, Yo Kobayashi, Ahmed Abo-Ismail, Masakatus G. Fujie

Abstract:

This paper deals with the design process and the dynamic control simulation of a new type of 4-DOFs parallel mechanism that can be used as an endoscopic surgical manipulator. The proposed mechanism, 2-PUU_2-PUS, is designed based on the screw theory and the parallel virtual chain type synthesis method. Based on the structure analysis of the 4-DOF parallel mechanism, the inverse position equation is studied using the inverse analysis theory of kinematics. The design and the stress analysis of the mechanism are investigated using SolidWorks software. The virtual prototype of the parallel mechanism is constructed, and the dynamic simulation is performed using ADAMS TM software. The system model utilizing PID and PI controllers has been built using MATLAB software. A more realistic simulation in accordance with a given bending angle and point to point control is implemented by the use of both ADAMS/MATLAB software. The simulation results showed that this control method has solved the coordinate control for the 4-DOF parallel manipulator so that each output is feedback to the four driving rods. From the results, the tracking performance is achieved. Other control techniques, such as intelligent ones, are recommended to improve the tracking performance and reduce the numerical truncation error.

Keywords: parallel mechanisms, medical robotics, tracjectory control, virtual chain type synthesis method

Procedia PDF Downloads 443
4107 Aircraft Line Maintenance Equipped with Decision Support System

Authors: B. Sudarsan Baskar, S. Pooja Pragati, S. Raj Kumar

Abstract:

The cost effectiveness in aircraft maintenance is of high privilege in the recent days. The cost effectiveness can be effectively made when line maintenance activities are incorporated at airports during Turn around time (TAT). The present work outcomes the shortcomings that affect the dispatching of the aircrafts, aiming at high fleet operability and low maintenance cost. The operational and cost constraints have been discussed and a suggestive alternative mechanism is proposed. The possible allocation of all deferred maintenance tasks to a set of all deferred maintenance tasks to a set of suitable airport resources have termed as alternative and is discussed in this paper from the data’s collected from the kingfisher airlines.

Keywords: decision support system, aircraft maintenance planning, maintenance-cost, RUL(remaining useful life), logistics, supply chain management

Procedia PDF Downloads 478
4106 Land, History and Housing: Colonial Legacies and Land Tenure in Kuala Lumpur

Authors: Nur Fareza Mustapha

Abstract:

Solutions to policy problems need to be curated to the local context, taking into account the trajectory of the local development path to ensure its efficacy. For Kuala Lumpur, rapid urbanization and migration into the city for the past few decades have increased the demand for housing to accommodate a growing urban population. As a critical factor affecting housing affordability, land supply constraints have been attributed to intensifying market pressures, which grew in tandem with the demands of urban development, along with existing institutional constraints in the governance of land. While demand-side pressures are inevitable given the fixed supply of land, supply-side constraints in regulations distort markets and if addressed inappropriately, may lead to mistargeted policy interventions. Given Malaysia’s historical development, regulatory barriers for land may originate from the British colonial period, when many aspects of the current laws governing tenure were introduced and formalized, and henceforth, became engrained in the system. This research undertakes a postcolonial institutional analysis approach to uncover the causal mechanism driving the evolution of land tenure systems in post-colonial Kuala Lumpur. It seeks to determine the sources of these shifts, focusing on the incentives and bargaining positions of actors during periods of institutional flux/change. It aims to construct a conceptual framework to further this understanding and to elucidate how this historical trajectory affects current access to urban land markets for housing. Archival analysis is used to outline and analyse the evolution of land tenure systems in Kuala Lumpur while stakeholder interviews are used to analyse its impact on the current urban land market, with a particular focus on the provision of and access to affordable housing in the city. Preliminary findings indicate that many aspects of the laws governing tenure that were introduced and formalized during the British colonial period have endured until the present day. Customary rules of tenure were displaced by rules following a European tradition, which found legitimacy through a misguided interpretation of local laws regarding the ownership of land. Colonial notions of race and its binary view of native vs. non-natives have also persisted in the construction and implementation of current legislation regarding land tenure. More concrete findings from this study will generate a more nuanced understanding of the regulatory land supply constraints in Kuala Lumpur, taking into account both the long and short term spatial and temporal processes that affect how these rules are created, implemented and enforced.

Keywords: colonial discourse, historical institutionalism, housing, land policy, post-colonial city

Procedia PDF Downloads 106
4105 In silico Model of Transamination Reaction Mechanism

Authors: Sang-Woo Han, Jong-Shik Shin

Abstract:

w-Transaminase (w-TA) is broadly used for synthesizing chiral amines with a high enantiopurity. However, the reaction mechanism of w-TA has been not well studied, contrary to a-transaminase (a-TA) such as AspTA. Here, we propose in silico model on the reaction mechanism of w-TA. Based on the modeling results which showed large free energy gaps between external aldimine and quinonoid on deamination (or ketimine and quinonoid on amination), withdrawal of Ca-H seemed as a critical step which determines the reaction rate on both amination and deamination reactions, which is consistent with previous researches. Hyperconjugation was also observed in both external aldimine and ketimine which weakens Ca-H bond to elevate Ca-H abstraction.

Keywords: computational modeling, reaction intermediates, w-transaminase, in silico model

Procedia PDF Downloads 521
4104 Young’s Modulus Variability: Influence on Masonry Vault Behavior

Authors: Abdelmounaim Zanaz, Sylvie Yotte, Fazia Fouchal, Alaa Chateauneuf

Abstract:

This paper presents a methodology for probabilistic assessment of bearing capacity and prediction of failure mechanism of masonry vaults at the ultimate state with consideration of the natural variability of Young’s modulus of stones. First, the computation model is explained. The failure mode is the most reported mode, i.e. the four-hinge mechanism. Based on this assumption, the study of a vault composed of 16 segments is presented. The Young’s modulus of the segments is considered as random variable defined by a mean value and a coefficient of variation CV. A relationship linking the vault bearing capacity to the modulus variation of voussoirs is proposed. The failure mechanisms, in addition to that observed in the deterministic case, are identified for each CV value as well as their probability of occurrence. The results show that the mechanism observed in the deterministic case has decreasing probability of occurrence in terms of CV, while the number of other mechanisms and their probability of occurrence increase with the coefficient of variation of Young’s modulus. This means that if a significant change in the Young modulus of the segments is proven, taken it into account in computations becomes mandatory, both for determining the vault bearing capacity and for predicting its failure mechanism.

Keywords: masonry, mechanism, probability, variability, vault

Procedia PDF Downloads 424
4103 A Discussion on Electrically Small Antenna Property

Authors: Riki H. Patel, Arpan Desia, Trushit Upadhayay

Abstract:

The demand of compact antenna is ever increasing since the inception of wireless communication devices. In the age of wireless communication, requirement of miniaturized antennas is quite high. It is quite often that antenna dimensions are decided based on application based requirement compared to practical antenna constraints. The tradeoff in efficiency and other antenna parameters against to antenna size is always a debatable issue. The article presents detailed review of fundamentals of electrically small antennas and its potential applications. In addition, constraints and challenges of electrically small antennas are also presented in the article.

Keywords: bandwidth, communication, electrically small antenna, communication engineering

Procedia PDF Downloads 504
4102 Sustainability of Widlife Community Based Natural Resource Management under Benefit Sharing Mechanism in Game Management Areas in Zambia

Authors: Darius Phiri, Moses Chibesa, Donald Zulu, Robby Kasubika

Abstract:

In Zambia, wildlife is co-managed by Zambia Wildlife Authority (ZAWA) and the local communities by sharing management responsibilities and benefits derived from harvesting wildlife resources under a benefit sharing mechanism. Although the benefit sharing mechanism has been formulated under good principles, it is still facing numerous challenges. In response to these challenges, a study on the sustainability of ZAWA benefit sharing mechanism was carried out in order to assess its potential and continuity in line with community empowerment and wildlife resources management. Systematic sampling was used with a sampling intensity of 4% to administer three types of questionnaires to community members in Mumbwa Game Management Area (GMA), ZAWA officers, and to the Ministry of Tourism, Environment and Natural Resources (MTENR) staffs. The collected data was then analysed using SPSS version 16.5. The findings indicated that many people in the GMA do not participate fully because of lacking satisfactory benefits. However, the mechanism contribute to the community well-being and can still remain sustainable especially if measures to address the current challenges are put in place.

Keywords: benefit sharing, concessions, licenses, poaching, local communities, sustainability

Procedia PDF Downloads 373
4101 Growth Mechanism, Structural and Compositional Properties of Cu₂ZnSnS₄ (CZTS) Thin Films Deposited by Sputtering Method from a Compound Target

Authors: Sanusi Abdullahi, Musa Momoh, Abubakar Umar Moreh, Aminu Muhammad Bayawa, Olubunmi Popoola

Abstract:

Kesterite-type Cu₂ZnSnS₄ (CZTS) thin films were deposited on corning glass from a single quaternary target. In this study, we investigated the growth mechanism and the influence of thin film thickness on the structural and compositional properties of CZTS films. All the four samples (as-deposited inclusive) show peaks corresponding to kesterite-type structure. The diffraction peaks of (112) are sharp and the small characteristics peaks of the kesterite structure such as (220)/ (204) and (312)/ (116) are also clearly observed in X-ray diffraction pattern. These results indicate that the quaternary CZTS would be a potential candidate for solar cell applications.

Keywords: RF sputtering, Cu2ZnSnS4 thin film, annealing, growth mechanism, annealing, growth mechanism, renewable energy

Procedia PDF Downloads 353
4100 Internal Financing Constraints and Corporate Investment: Evidence from Indian Manufacturing Firms

Authors: Gaurav Gupta, Jitendra Mahakud

Abstract:

This study focuses on the significance of internal financing constraints on the determination of corporate fixed investments in the case of Indian manufacturing companies. Financing constraints companies which have less internal fund or retained earnings face more transaction and borrowing costs due to imperfections in the capital market. The period of study is 1999-2000 to 2013-2014 and we consider 618 manufacturing companies for which the continuous data is available throughout the study period. The data is collected from PROWESS data base maintained by Centre for Monitoring Indian Economy Pvt. Ltd. Panel data methods like fixed effect and random effect methods are used for the analysis. The Likelihood Ratio test, Lagrange Multiplier test, and Hausman test results conclude the suitability of the fixed effect model for the estimation. The cash flow and liquidity of the company have been used as the proxies for the internal financial constraints. In accordance with various theories of corporate investments, we consider other firm specific variable like firm age, firm size, profitability, sales and leverage as the control variables in the model. From the econometric analysis, we find internal cash flow and liquidity have the significant and positive impact on the corporate investments. The variables like cost of capital, sales growth and growth opportunities are found to be significantly determining the corporate investments in India, which is consistent with the neoclassical, accelerator and Tobin’s q theory of corporate investment. To check the robustness of results, we divided the sample on the basis of cash flow and liquidity. Firms having cash flow greater than zero are put under one group, and firms with cash flow less than zero are put under another group. Also, the firms are divided on the basis of liquidity following the same approach. We find that the results are robust to both types of companies having positive and negative cash flow and liquidity. The results for other variables are also in the same line as we find for the whole sample. These findings confirm that internal financing constraints play a significant role for determination of corporate investment in India. The findings of this study have the implications for the corporate managers to focus on the projects having higher expected cash inflows to avoid the financing constraints. Apart from that, they should also maintain adequate liquidity to minimize the external financing costs.

Keywords: cash flow, corporate investment, financing constraints, panel data method

Procedia PDF Downloads 222
4099 Power and Wear Reduction Using Composite Links of Crank-Rocker Mechanism with Optimum Transmission Angle

Authors: Khaled M. Khader, Mamdouh I. Elimy

Abstract:

Reducing energy consumption became the major concern for all countries of the world during the recent decades. In general, power saving is currently the nominal goal of most industrial countries. It is well known that fossil fuels are the main pillar of development of world countries. Unfortunately, the increased rate of fossil fuel consumption will lead to serious problems caused by an expected depletion of fuels. Moreover, dangerous gases and vapors emission lead to severe environmental problems during fuel burning. Consequently, most engineering sectors especially the mechanical sectors are looking for improving any machine accompanied by reducing its energy consumption. Crank-Rocker planar mechanism is the most applied in mechanical systems. Besides, it is one of the most significant parts of the machines for obtaining the oscillatory motion. The transmission angle of this mechanism can be considered as an optimum value when its extreme values are equally varied around 90°. In addition, the transmission angle plays an important role in decreasing the required driving power and improving the dynamic properties of the mechanism. Hence, appropriate selection of mechanism links lengthens, which assures optimum transmission angle leads to decreasing the driving power. Moreover, mechanism's links manufactured from composite materials afford link's lightweight, which decreases the required driving torque. Furthermore, wear and corrosion problems can be treated through using composite links instead of using metal ones. This paper is dealing with improving the performance of crank-rocker mechanism using composite links due to their flexural elastic modulus values and stiffness in addition to high damping of composite materials.

Keywords: Composite Material, Crank-Rocker Mechanism, Transmission angle, Design techniques, Power Saving

Procedia PDF Downloads 279
4098 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 312
4097 Semi-Supervised Hierarchical Clustering Given a Reference Tree of Labeled Documents

Authors: Ying Zhao, Xingyan Bin

Abstract:

Semi-supervised clustering algorithms have been shown effective to improve clustering process with even limited supervision. However, semi-supervised hierarchical clustering remains challenging due to the complexities of expressing constraints for agglomerative clustering algorithms. This paper proposes novel semi-supervised agglomerative clustering algorithms to build a hierarchy based on a known reference tree. We prove that by enforcing distance constraints defined by a reference tree during the process of hierarchical clustering, the resultant tree is guaranteed to be consistent with the reference tree. We also propose a framework that allows the hierarchical tree generation be aware of levels of levels of the agglomerative tree under creation, so that metric weights can be learned and adopted at each level in a recursive fashion. The experimental evaluation shows that the additional cost of our contraint-based semi-supervised hierarchical clustering algorithm (HAC) is negligible, and our combined semi-supervised HAC algorithm outperforms the state-of-the-art algorithms on real-world datasets. The experiments also show that our proposed methods can improve clustering performance even with a small number of unevenly distributed labeled data.

Keywords: semi-supervised clustering, hierarchical agglomerative clustering, reference trees, distance constraints

Procedia PDF Downloads 524
4096 Technical Efficiency and Challenges of Smallholder Horticultural Farmers in Ghana: A Wake-Up Call for Policy Implementers

Authors: Freda E. Asem, R. D. Osei, D. B. Sarpong, J. K. Kuwornu

Abstract:

While market access remains important, Ghana’s major handicap is her inability to sustain export growth on the open market. The causes of these could be attributed to inefficiency, lack of competitiveness and supply-side constraints. This study examined the challenges faced by smallholder horticultural farmers and how it relates to their technical efficiency. The study employed mixed methods to address the problem. Using the Millennium Development Account (MiDA) Farmer Based Organization survey data on farm households in 23 districts in Ghana, the study assessed the technical efficiency of smallholder horticultural farmers (taking into account production risks). Focus group discussions (FGDs) and in-depth interviews were also conducted on smallholder mango, pineapple, and chilli pepper farmers selected districts in Ghana. Results revealed the constraints faced by smallholder horticultural farmers to be marketing, training, funding, accessibility, and affordability of inputs, land, access to credit, and the disconnect between themselves and policy makers and implementers.

Keywords: productivity, gender, policy, efficiency, constraints

Procedia PDF Downloads 463
4095 A New Evolutionary Algorithm for Multi-Objective Cylindrical Spur Gear Design Optimization

Authors: Hammoudi Abderazek

Abstract:

The present paper introduces a modified adaptive mixed differential evolution (MAMDE) to select the main geometry parameters of specific cylindrical spur gear. The developed algorithm used the self-adaptive mechanism in order to update the values of mutation and crossover factors. The feasibility rules are used in the selection phase to improve the search exploration of MAMDE. Moreover, the elitism is performed to keep the best individual found in each generation. For the constraints handling the normalization method is used to treat each constraint design equally. The finite element analysis is used to confirm the optimization results for the maximum bending resistance. The simulation results reached in this paper indicate clearly that the proposed algorithm is very competitive in precision gear design optimization.

Keywords: evolutionary algorithm, spur gear, tooth profile, meta-heuristics

Procedia PDF Downloads 110