Search results for: code composer studio
685 Board of Directors of Small and Medium-Sized Enterprises to Go Public: Characteristics and Moderating Factors
Authors: María-José Palacin-Sanchez, Filippo Di Pietro, Reyes Samaniego-Medina
Abstract:
This article examines, in an institutional context such as Spanish one, the corporate board structure characteristics and determinants in entrepreneurial firms to go public. Specifically, it explores these issues through all the initial public offerings in the Spanish Alternative Equity Market (MAB), which is a market segment for smaller growing companies. The results show that: a) firm size, age of the company, and the reputation of the auditor and the nominated advisor and Corporate Governance Code favour a larger and more independent board structure that enhances its monitoring functions; and b) leverage, opportunities of growth, sector risk and ownership by executive directors all lead towards a smaller broad of directors where the role of entrepreneurship provided by executive directors remains crucial. This reflects the delicate balance of power between small-business entrepreneurs and financial equity market forces, which demand more transparency and monitoring in the companies.Keywords: board composition, board size, corporate governance, IPO, SMEs
Procedia PDF Downloads 400684 Subband Coding and Glottal Closure Instant (GCI) Using SEDREAMS Algorithm
Authors: Harisudha Kuresan, Dhanalakshmi Samiappan, T. Rama Rao
Abstract:
In modern telecommunication applications, Glottal Closure Instants location finding is important and is directly evaluated from the speech waveform. Here, we study the GCI using Speech Event Detection using Residual Excitation and the Mean Based Signal (SEDREAMS) algorithm. Speech coding uses parameter estimation using audio signal processing techniques to model the speech signal combined with generic data compression algorithms to represent the resulting modeled in a compact bit stream. This paper proposes a sub-band coder SBC, which is a type of transform coding and its performance for GCI detection using SEDREAMS are evaluated. In SBCs code in the speech signal is divided into two or more frequency bands and each of these sub-band signal is coded individually. The sub-bands after being processed are recombined to form the output signal, whose bandwidth covers the whole frequency spectrum. Then the signal is decomposed into low and high-frequency components and decimation and interpolation in frequency domain are performed. The proposed structure significantly reduces error, and precise locations of Glottal Closure Instants (GCIs) are found using SEDREAMS algorithm.Keywords: SEDREAMS, GCI, SBC, GOI
Procedia PDF Downloads 356683 Radionuclides Transport Phenomena in Vadose Zone
Authors: R. Testoni, R. Levizzari, M. De Salve
Abstract:
Radioactive waste management is fundamental to safeguard population and environment by radiological risks. Environmental assessment of a site, where nuclear activities are located, allows understanding the hydro geological system and the radionuclides transport in groundwater and subsoil. Use of dedicated software is the basis of transport phenomena investigation and for dynamic scenarios prediction; this permits to understand the evolution of accidental contamination events, but at the same time the potentiality of the software itself can be verified. The aim of this paper is to perform a numerical analysis by means of HYDRUS 1D code, so as to evaluate radionuclides transport in a nuclear site in Piedmont region (Italy). In particular, the behaviour in vadose zone was investigated. An iterative assessment process was performed for risk assessment of radioactive contamination. The analysis therein developed considers the following aspects: i) hydro geological site characterization; ii) individuation of the main intrinsic and external site factors influencing water flow and radionuclides transport phenomena; iii) software potential for radionuclides leakage simulation purposes.Keywords: HYDRUS 1D, radionuclides transport phenomena, site characterization, radiation protection
Procedia PDF Downloads 397682 A Refinement Strategy Coupling Event-B and Planning Domain Definition Language (PDDL) for Planning Problems
Authors: Sabrine Ammar, Mohamed Tahar Bhiri
Abstract:
Automatic planning has a de facto standard language called Planning Domain Definition Language (PDDL) for describing planning problems. It aims to formalize the planning problems described by the concept of state space. PDDL-related dynamic analysis tools, namely planners and validators, are insufficient for verifying and validating PDDL descriptions. Indeed, these tools made it possible to detect errors a posteriori by means of test activity. In this paper, we recommend a formal approach coupling the two languages Event-B and PDDL, for automatic planning. Event-B is used for formal modeling by stepwise refinement with mathematical proofs of planning problems. Thus, this paper proposes a refinement strategy allowing to obtain reliable PDDL descriptions from an ultimate Event-B model correct by construction. The ultimate Event-B model, correct by construction which is supposed to be translatable into PDDL, is automatically translated into PDDL using our MDE Event-B2PDDL tool.Keywords: code generation, event-b, PDDL, refinement strategy, translation rules
Procedia PDF Downloads 196681 Bit Error Rate Analysis of Multiband OFCDM UWB System in UWB Fading Channel
Authors: Sanjay M. Gulhane, Athar Ravish Khan, Umesh W. Kaware
Abstract:
Orthogonal frequency and code division multiplexing (OFCDM) has received large attention as a modulation scheme to realize high data rate transmission. Multiband (MB) Orthogonal frequency division multiplexing (OFDM) Ultra Wide Band (UWB) system become promising technique for high data rate due to its large number of advantage over Singleband (UWB) system, but it suffer from coherent frequency diversity problem. In this paper we have proposed MB-OFCDM UWB system, in which two-dimensional (2D) spreading (time and frequency domain spreading), has been introduced, combining OFDM with 2D spreading, proposed system can provide frequency diversity. This paper presents the basic structure and main functions of the MB-OFCDM system, and evaluates the bit error rate BER performance of MB-OFDM and MB-OFCDM system under UWB indoor multi-path channel model. It is observe that BER curve of MB-OFCDM UWB improve its performance by 2dB as compare to MB-OFDM UWB system.Keywords: MB-OFDM UWB system, MB-OFCDM UWB system, UWB IEEE channel model, BER
Procedia PDF Downloads 549680 Functional Instruction Set Simulator of a Neural Network IP with Native Brain Float-16 Generator
Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula
Abstract:
A functional model to mimic the functional correctness of a neural network compute accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of GCC compilers to the BF-16 datatype, which we addressed with a native BF-16 generator integrated into our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex neural network accelerator design by proposing a functional model-based scoreboard or software model using SystemC. The proposed functional model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT, bringing up micro-steps of execution.Keywords: ISA, neural network, Brain Float-16, DUT
Procedia PDF Downloads 94679 Secure Network Coding against Content Pollution Attacks in Named Data Network
Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang
Abstract:
Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.Keywords: named data networking, content polloution attack, network coding signature, internet architecture
Procedia PDF Downloads 337678 New Restoration Reagent for Development of Erased Serial Number on Copper Metal Surface
Authors: Lav Kesharwani, Nalini Shankar, A. K. Gupta
Abstract:
A serial number is a unique code assigned for identification of a single unit. Serial number are present on many objects. In an attempt to hide the identity of the numbered item, the numbers are often obliterated or removed by mechanical methods. The present work was carried out with an objective to develop less toxic, less time consuming, more result oriented chemical etching reagent for restoration of serial number on the copper metal plate. Around nine different reagents were prepared using different combination of reagent along with standard reagent and it was applied over 50 erased samples of copper metal and compared it with the standard reagent for restoration of erased marks. After experiment, it was found that the prepared Etching reagent no. 3 (10 g FeCl3 + 20 ml glacial acetic acid + 100 ml distilled H2O) showed the best result for restoration of erased serial number on the copper metal plate .The reagent was also less toxic and less time consuming as compared to standard reagent (19 g FeCl3 + 6 ml cans. HCl + 100 ml distilled H2O).Keywords: serial number restoration, copper plate, obliteration, chemical method
Procedia PDF Downloads 556677 Simulation of Photocatalytic Degradation of Rhodamine B in Annular Photocatalytic Reactor
Authors: Jatinder Kumar, Ajay Bansal
Abstract:
Simulation of a photocatalytic reactor helps in understanding the complex behavior of the photocatalytic degradation. Simulation also aids the designing and optimization of the photocatalytic reactor. Lack of simulation strategies is a huge hindrance in the commercialization of the photocatalytic technology. With the increased performance of computational resources, and development of simulation software, computational fluid dynamics (CFD) is becoming an affordable engineering tool to simulate and optimize reactor designs. In the present paper, a CFD (Computational fluid dynamics) model for simulating the performance of an immobilized-titanium dioxide based annular photocatalytic reactor was developed. The computational model integrates hydrodynamics, species mass transport, and chemical reaction kinetics using a commercial CFD code Fluent 6.3.26. The CFD model was based on the intrinsic kinetic parameters determined experimentally in a perfectly mixed batch reactor. Rhodamine B, a complex organic compound, was selected as a test pollutant for photocatalytic degradation. It was observed that CFD could become a valuable tool to understand and improve the photocatalytic systems.Keywords: simulation, computational fluid dynamics (CFD), annular photocatalytic reactor, titanium dioxide
Procedia PDF Downloads 585676 Three Dimensional Simulation of the Transient Modeling and Simulation of Different Gas Flows Velocity and Flow Distribution in Catalytic Converter with Porous Media
Authors: Amir Reza Radmanesh, Sina Farajzadeh Khosroshahi, Hani Sadr
Abstract:
The transient catalytic converter performance is governed by complex interactions between exhaust gas flow and the monolithic structure of the catalytic converter. Stringent emission regulations around the world necessitate the use of highly-efficient catalytic converters in vehicle exhaust systems. Computational fluid dynamics (CFD) is a powerful tool for calculating the flow field inside the catalytic converter. Radial velocity profiles, obtained by a commercial CFD code, present very good agreement with respective experimental results published in the literature. However the applicability of CFD for transient simulations is limited by the high CPU demands. In the present work, Geometric modeling ceramic monolith substrate is done with square shaped channel type of Catalytic converter and it is coated platinum and palladium. This example illustrates the effect of flow distribution on thermal response of a catalytic converter and different gas flow velocities, during the critical phase of catalytic converter warm up.Keywords: catalytic converter, computational fluid dynamic, porous media, velocity distribution
Procedia PDF Downloads 858675 Analysis of Steel Beam-Column Joints Under Seismic Loads
Authors: Mizam Doğan
Abstract:
Adapazarı railway car factory, the only railway car factory of Turkey, was constructed in 1950. It was a steel design and it had filled beam sections and truss beam systems. Columns were steel profiles and box sections. The factory was damaged heavily on Izmit Earthquake and closed. In this earthquake 90% of damaged structures are reinforced concrete, the others are %7 prefabricated and 3% steel construction. As can be seen in statistical data, damaged industrial buildings in this earthquake were generally reinforced concrete and prefabricated structures. Adapazari railway car factory is the greatest steel structure damaged in the earthquake. This factory has 95% of the total damaged steel structure area. In this paper; earthquake damages on beams and columns of the factory are studied by considering TS648 'Turkish Standard Building Code for Steel Structures' and also damaged connection elements as welds, rivets and bolts are examined. A model similar to the damaged system is made and high-stress zones are searched. These examinations, conclusions, suggestions are explained by damage photos and details.Keywords: column-beam connection, seismic analysis, seismic load, steel structure
Procedia PDF Downloads 277674 Nature Manifestations: An Archetypal Analysis of Selected Nightwish Songs
Authors: Suzanne Strauss, Leandi Steenkamp
Abstract:
The Finnish symphonic metal band Nightwish is the brainchild of songwriter and lyricist TuomasHolopainen and the band recorded their first demonstration recording in 1996. The band has since produced nine full-length studio albums, the most recent being the 2020 album Human. :||: Nature., and has reached massive international success. The band is well known for songs about fantasy and escapism and employs many sonic, visual and branding tools and techniques to communicate these constructs to the audience. Among these, is the band’s creation of the so-called “Nightwish world and mythology” with a set of recurring characters and narratives which, in turn, creates a psychological anchor and safe space for Nightwish fans around the globe. Nature and the reverence of nature are central themes in Nightwish’s self-created mythology.Swiss psychologist Carl Jung’s theory of the collective unconscious identified a mysterious reservoir of psychological constructs common to all people, being derived from ancestral memory and experience, common to all humankind, and distinct from the individual’s personal unconscious. Furthermore, he defined archetypes as timeless collective patterns and images that springs forth from the collective unconscious. Archetypes can be actualized when they enter consciousness as images in interaction with the outside world. Archetypal patterns or images can manifest in different ways across world cultures, but follow common patterns, also known as archetypal themes and symbols. The Jungian approach to the psyche places great emphasis on nature, positing a direct link betweenthe concept of wholeness and responsible care for nature and the environment.In our proposed paper, we examine, by means of thematic content analysis, how Nightwish makes use of archetypal themes and symbols referring to nature and the environment in selected songs from their ninth full-length album Human. II Nature. Furthermore, we argue that the longing for and reverence of nature in selected Nightwish songs may serve as a type of “social intervention” and social critique on modern capitalist society. The type of social critique that the band offers is generally connoted intertextually and is not equally explicit in their songs. The band uses a unique combination of escapism, fantasy, and nature narratives to inspire a sense of wonder, enchantment, and magic in the listener. In this way, escapism, fantasy, and nature serve as postmodern frames of reference that aim to “re-enchant” the disenchanted and de-spiritualized. In this way, re-enchantment could also refer to spiritual and/or psychological healing and rebirth.Keywords: archetypes, metal music, nature, Nightwish, social interventions
Procedia PDF Downloads 111673 Providing Health Promotion Information by Digital Animation to International Visitors in Japan: A Factorial Design View of Nurses
Authors: Mariko Nishikawa, Masaaki Yamanaka, Ayami Kondo
Abstract:
Background: International visitors to Japan are at a risk of travel-related illnesses or injury that could result in hospitalization in a country where the language and customs are unique. Over twelve million international visitors came to Japan in 2015, and more are expected leading up to the Tokyo Olympics. One aspect of this is the potentially greater demand on healthcare services by foreign visitors. Nurses who take care of them have anxieties and concerns of their knowledge of the Japanese health system. Objectives: An effective distribution of travel-health information is vital for facilitating care for international visitors. Our research investigates whether a four-minute digital animation (Mari Info Japan), designed and developed by the authors and applied to a survey of 513 nurses who take care of foreigners daily, could clarify travel health procedures, reduce anxieties, while making it enjoyable to learn. Methodology: Respondents to a survey were divided into two groups. The intervention group watched Mari Info Japan. The control group read a standard guidebook. The participants were requested to fill a two-page questionnaire called Mari Meter-X, STAI-Y in English and mark a face scale, before and after the interventions. The questions dealt with knowledge of health promotion, the Japanese healthcare system, cultural concerns, anxieties, and attitudes in Japan. Data were collected from an intervention group (n=83) and control group (n=83) of nurses in a hospital, Japan for foreigners from February to March, 2016. We analyzed the data using Text Mining Studio for open-ended questions and JMP for statistical significance. Results: We found that the intervention group displayed more confidence and less anxiety to take care of foreign patients compared to the control group. The intervention group indicated a greater comfort after watching the animation. However, both groups were most likely to be concerned about language, the cost of medical expenses, informed consent, and choice of hospital. Conclusions: From the viewpoint of nurses, the provision of travel-health information by digital animation to international visitors to Japan was more effective than traditional methods as it helped them be better prepared to treat travel-related diseases and injury among international visitors. This study was registered number UMIN000020867. Funding: Grant–in-Aid for Challenging Exploratory Research 2010-2012 & 2014-16, Japanese Government.Keywords: digital animation, health promotion, international visitor, Japan, nurse
Procedia PDF Downloads 307672 Machine Learning Based Gender Identification of Authors of Entry Programs
Authors: Go Woon Kwak, Siyoung Jun, Soyun Maeng, Haeyoung Lee
Abstract:
Entry is an education platform used in South Korea, created to help students learn to program, in which they can learn to code while playing. Using the online version of the entry, teachers can easily assign programming homework to the student and the students can make programs simply by linking programming blocks. However, the programs may be made by others, so that the authors of the programs should be identified. In this paper, as the first step toward author identification of entry programs, we present an artificial neural network based classification approach to identify genders of authors of a program written in an entry. A neural network has been trained from labeled training data that we have collected. Our result in progress, although preliminary, shows that the proposed approach could be feasible to be applied to the online version of entry for gender identification of authors. As future work, we will first use a machine learning technique for age identification of entry programs, which would be the second step toward the author identification.Keywords: artificial intelligence, author identification, deep neural network, gender identification, machine learning
Procedia PDF Downloads 323671 One-Dimension Model for Positive Displacement Pump with Cavitation Algorithm
Authors: Francesco Rizzuto, Matthew Stickland, Stephan Hannot
Abstract:
The simulation of a positive displacement pump system with commercial software for Computer Fluid Dynamics (CFD), will result in an enormous computational effort due to the complexity of the pump system. This drawback restricts the use of it to a specific part of the pump in one simulation. This research focuses on developing an algorithm that provides a suitable result in agreement with experiment data, without that computational effort. The compressible equations are solved with an explicit algorithm. A comparison is presented between the FV method with Monotonic Upwind scheme for Conservative Laws (MUSCL) with slope limiter and experimental results. The source term for cavitation and friction is introduced into the algorithm with a slipping strategy and solved with a 4th order Runge-Kutta scheme (RK4). Different pumps are modeled and analyzed to evaluate the flexibility of the code. The simulation required minimal computation time and resources without compromising the accuracy of the simulation results. Therefore, this algorithm highlights the feasibility of pressure pulsation simulation as a design tool for an industrial purpose.Keywords: cavitation, diaphragm, DVCM, finite volume, MUSCL, positive displacement pump
Procedia PDF Downloads 155670 Analyzing the Readiness of Resuscitation Team during Cardiac Arrest
Authors: J. Byimana, I. A. Muhire, J. E. Nzabahimana, A. Nyombayire
Abstract:
Introduction: A successful cardiopulmonary resuscitation during a sudden cardiac arrest can be delayed by different components including new hospital setting, lack of adequate training, lack of pre-established resuscitation team and ineffective communication and lead to an unexpected outcome which is death. The main objective of the study was to assess the readiness of resuscitation teams during cardiac arrest and the organizational approaches that would best support their functioning in a new hospital facility, and to detect any factor that may have contributed to responses. This study analyses the readiness of Resuscitation Team (RT) during cardiac arrest. —Material and methods: A prospective Analytic design was carried out at a newly established United Nations level 2 hospital facility, on four RTM (resuscitation team member). A semi structured questionnaire was used to collect data. —Results: This study highlights indicate that the response time during cardiac arrest simulation meet both American heart association (AHA) and European resuscitation council guidelines. The study offers useful evidence about the impact of a new facility on RTM performance and provides an exposure of staff to emergency events within the Work setting.Keywords: cardiac arrest, code blue, simulation, resuscitation team member
Procedia PDF Downloads 221669 Error Probability of Multi-User Detection Techniques
Authors: Komal Babbar
Abstract:
Multiuser Detection is the intelligent estimation/demodulation of transmitted bits in the presence of Multiple Access Interference. The authors have presented the Bit-error rate (BER) achieved by linear multi-user detectors: Matched filter (which treats the MAI as AWGN), Decorrelating and MMSE. In this work, authors investigate the bit error probability analysis for Matched filter, decorrelating, and MMSE. This problem arises in several practical CDMA applications where the receiver may not have full knowledge of the number of active users and their signature sequences. In particular, the behavior of MAI at the output of the Multi-user detectors (MUD) is examined under various asymptotic conditions including large signal to noise ratio; large near-far ratios; and a large number of users. In the last section Authors also shows Matlab Simulation results for Multiuser detection techniques i.e., Matched filter, Decorrelating, MMSE for 2 users and 10 users.Keywords: code division multiple access, decorrelating, matched filter, minimum mean square detection (MMSE) detection, multiple access interference (MAI), multiuser detection (MUD)
Procedia PDF Downloads 527668 A Mixed Integer Linear Programming Model for Container Collection
Authors: J. Van Engeland, C. Lavigne, S. De Jaeger
Abstract:
In the light of the transition towards a more circular economy, recovery of products, parts or materials will gain in importance. Additionally, the EU proximity principle related to waste management and emissions generated by transporting large amounts of end-of-life products, shift attention to local recovery networks. The Flemish inter-communal cooperation for municipal solid waste management Meetjesland (IVM) is currently investigating the set-up of such a network. More specifically, the network encompasses the recycling of polyvinyl chloride (PVC), which is collected in separate containers. When these containers are full, a truck should transport them to the processor which can recycle the PVC into new products. This paper proposes a model to optimize the container collection. The containers are located at different Civic Amenity sites (CA sites) in a certain region. Since people can drop off their waste at these CA sites, the containers will gradually fill up during a planning horizon. If a certain container is full, it has to be collected and replaced by an empty container. The collected waste is then transported to a single processor. To perform this collection and transportation of containers, the responsible firm has a set of vehicles stationed at a single depot and different personnel crews. A vehicle can load exactly one container. If a trailer is attached to the vehicle, it can load an additional container. Each day of the planning horizon, the different crews and vehicles leave the depot to collect containers at the different sites. After loading one or two containers, the crew has to drive to the processor for unloading the waste and to pick up empty containers. Afterwards, the crew can again visit sites or it can return to the depot to end its collection work for that day. All along the collection process, the crew has to respect the opening hours of the sites. In order to allow for some flexibility, a crew is allowed to wait a certain amount of time at the gate of a site until it opens. The problem described can be modelled as a variant to the PVRP-TW (Periodic Vehicle Routing Problem with Time Windows). However, a vehicle can at maximum load two containers, hence only two subsequent site visits are possible. For that reason, we will refer to the model as a model for building tactical waste collection schemes. The goal is to a find a schedule describing which crew should visit which CA site on which day to minimize the number of trucks and the routing costs. The model was coded in IBM CPLEX Optimization studio and applied to a number of test instances. Good results were obtained, and specific suggestions concerning route and truck costs could be made. For a large range of input parameters, collection schemes using two trucks are obtained.Keywords: container collection, crew scheduling, mixed integer linear programming, waste management
Procedia PDF Downloads 134667 Experimental and Numerical Analyses of Tehran Research Reactor
Authors: A. Lashkari, H. Khalafi, H. Khazeminejad, S. Khakshourniya
Abstract:
In this paper, a numerical model is presented. The model is used to analyze a steady state thermo-hydraulic and reactivity insertion transient in TRR reference cores respectively. The model predictions are compared with the experiments and PARET code results. The model uses the piecewise constant and lumped parameter methods for the coupled point kinetics and thermal-hydraulics modules respectively. The advantages of the piecewise constant method are simplicity, efficiency and accuracy. A main criterion on the applicability range of this model is that the exit coolant temperature remains below the saturation temperature, i.e. no bulk boiling occurs in the core. The calculation values of power and coolant temperature, in steady state and positive reactivity insertion scenario, are in good agreement with the experiment values. However, the model is a useful tool for the transient analysis of most research reactor encountered in practice. The main objective of this work is using simple calculation methods and benchmarking them with experimental data. This model can be used for training proposes.Keywords: thermal-hydraulic, research reactor, reactivity insertion, numerical modeling
Procedia PDF Downloads 401666 Corporate Codes of Ethics and Earnings Discretion: International Evidence
Authors: Chu Chen, Giorgio Gotti, Tony Kang, Michael Wolfe
Abstract:
This study examines the role of codes of ethics in reducing the extent to which managers’ act opportunistically in reporting earnings. Corporate codes of ethics, by clarifying the boundaries of ethical corporate behaviors and making relevant social norms more salient, have the potential to deter managers from engaging in opportunistic financial reporting practices. In a sample of international companies, we find that the quality of corporate codes of ethics is associated with higher earnings quality, i.e., lower discretionary accruals. Our results are confirmed for a subsample of firms more likely to be engaging in opportunistic reporting behavior, i.e., firms that just meet or beat analysts’ forecasts. Further, codes of ethics play a greater role in reducing earnings management for firms in countries with weaker investor protection mechanisms. Our results suggest that corporate codes of ethics can be a viable alternative to country-level investor protection mechanisms in curbing aggressive reporting behaviors.Keywords: corporate ethics policy, code of ethics, business ethics, earnings discretion, accruals
Procedia PDF Downloads 287665 2D CFD-PBM Coupled Model of Particle Growth in an Industrial Gas Phase Fluidized Bed Polymerization Reactor
Authors: H. Kazemi Esfeh, V. Akbari, M. Ehdaei, T. N. G. Borhani, A. Shamiri, M. Najafi
Abstract:
In an industrial fluidized bed polymerization reactor, particle size distribution (PSD) plays a significant role in the reactor efficiency evaluation. The computational fluid dynamic (CFD) models coupled with population balance equation (CFD-PBM) have been extensively employed to investigate the flow behavior in the poly-disperse multiphase fluidized bed reactors (FBRs) utilizing ANSYS Fluent code. In this study, an existing CFD-PBM/ DQMOM coupled modeling framework has been used to highlight its potential to analyze the industrial-scale gas phase polymerization reactor. The predicted results reveal an acceptable agreement with the observed industrial data in terms of pressure drop and bed height. The simulated results also indicate that the higher particle growth rate can be achieved for bigger particles. Hence, the 2D CFD-PBM/DQMOM coupled model can be used as a reliable tool for analyzing and improving the design and operation of the gas phase polymerization FBRs.Keywords: computational fluid dynamics, population balance equation, fluidized bed polymerization reactor, direct quadrature method of moments
Procedia PDF Downloads 367664 Wind Interference Effect on Tall Building
Authors: Atul K. Desai, Jigar K. Sevalia, Sandip A. Vasanwala
Abstract:
When a building is located in an urban area, it is exposed to a wind of different characteristics then wind over an open terrain. This is development of turbulent wake region behind an upstream building. The interaction with upstream building can produce significant changes in the response of the tall building. Here, in this paper, an attempt has been made to study wind induced interference effects on tall building. In order to study wind induced interference effect (IF) on Tall Building, initially a tall building (which is termed as Principal Building now on wards) with square plan shape has been considered with different Height to Width Ratio and total drag force is obtained considering different terrain conditions as well as different incident wind direction. Then total drag force on Principal Building is obtained by considering adjacent building which is termed as Interfering Building now on wards with different terrain conditions and incident wind angle. To execute study, Computational Fluid Dynamics (CFD) Code namely Fluent and Gambit have been used.Keywords: computational fluid dynamics, tall building, turbulent, wake region, wind
Procedia PDF Downloads 551663 Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Authors: Adi A. Maaita, Hamza A. A. Al Sewadi
Abstract:
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.Keywords: cryptosystems, information security agreement, key distribution, random numbers
Procedia PDF Downloads 268662 Corrosion Protection and Failure Mechanism of ZrO₂ Coating on Zirconium Alloy Zry-4 under Varied LiOH Concentrations in Lithiated Water at 360°C and 18.5 MPa
Authors: Guanyu Jiang, Donghai Xu, Huanteng Liu
Abstract:
After the Fukushima-Daiichi accident, the development of accident tolerant fuel cladding materials to improve reactor safety has become a hot topic in the field of nuclear industry. ZrO₂ has a satisfactory neutron economy and can guarantee the fission chain reaction process, which enables it to be a promising coating for zirconium alloy cladding. Maintaining a good corrosion resistance in primary coolant loop during normal operations of Pressurized Water Reactors is a prerequisite for ZrO₂ as a protective coating on zirconium alloy cladding. Research on the corrosion performance of ZrO₂ coating in nuclear water chemistry is relatively scarce, and existing reports failed to provide an in-depth explanation for the failure causes of ZrO₂ coating. Herein, a detailed corrosion process of ZrO₂ coating in lithiated water at 360 °C and 18.5 MPa was proposed based on experimental research and molecular dynamics simulation. Lithiated water with different LiOH solutions in the present work was deaerated and had a dissolved oxygen concentration of < 10 ppb. The concentration of Li (as LiOH) was determined to be 2.3 ppm, 70 ppm, and 500 ppm, respectively. Corrosion tests were conducted in a static autoclave. Modeling and corresponding calculations were operated on Materials Studio software. The calculation of adsorption energy and dynamics parameters were undertaken by the Energy task and Dynamics task of the Forcite module, respectively. The protective effect and failure mechanism of ZrO₂ coating on Zry-4 under varied LiOH concentrations was further revealed by comparison with the coating corrosion performance in pure water (namely 0 ppm Li). ZrO₂ coating provided a favorable corrosion protection with the occurrence of localized corrosion at low LiOH concentrations. Factors influencing corrosion resistance mainly include pitting corrosion extension, enhanced Li+ permeation, short-circuit diffusion of O²⁻ and ZrO₂ phase transformation. In highly-concentrated LiOH solutions, intergranular corrosion, internal oxidation, and perforation resulted in coating failure. Zr ions were released to coating surface to form flocculent ZrO₂ and ZrO₂ clusters due to the strong diffusion and dissolution tendency of α-Zr in the Zry-4 substrate. Considering that primary water of Pressurized Water Reactors usually includes 2.3 ppm Li, the stability of ZrO₂ make itself a candidate fuel cladding coating material. Under unfavorable conditions with high Li concentrations, more boric acid should be added to alleviate caustic corrosion of ZrO₂ coating once it is used. This work can provide some references to understand the service behavior of nuclear coatings under variable water chemistry conditions and promote the in-pile application of ZrO₂ coating.Keywords: ZrO₂ coating, Zry-4, corrosion behavior, failure mechanism, LiOH concentration
Procedia PDF Downloads 85661 Molecular Docking Analysis of Flavonoids Reveal Potential of Eriodictyol for Breast Cancer Treatment
Authors: Nicole C. Valdez, Vincent L. Borromeo, Conrad C. Chong, Ahmad F. Mazahery
Abstract:
Breast cancer is the most prevalent cancer worldwide, where the majority of cases are estrogen-receptor positive and involve 2 receptor proteins. The binding of estrogen to estrogen receptor alpha (ERα) promotes breast cancer growth, while it's binding to estrogen-receptor beta (ERβ) inhibits tumor growth. While natural products have been a promising source of chemotherapeutic agents, the challenge remains in finding a bioactive compound that specifically targets cancer cells, minimizing side effects on normal cells. Flavonoids are natural products that act as phytoestrogens and induce the same response as estrogen. They are able to compete with estrogen for binding to ERα; however, it has a higher binding affinity for ERβ. Their abundance in nature and low toxicity make them a potential candidate for breast cancer treatment. This study aimed to determine which particular flavonoids can specifically recognize ERβ and potentially be used for breast cancer treatment through molecular docking. A total of 206 flavonoids comprised of 97 isoflavones and 109 flavanones were collected from ZINC15, while the 3D structures of ERβ and ERα were obtained from Protein Data Bank. These flavonoid subclasses were chosen as they bind more strongly to ERs due to their chemical structure. The structures of the flavonoid ligands were converted using Open Babel, while the estrogen receptor protein structures were prepared using Autodock MGL Tools. The optimal binding site was found using BIOVIA Discovery Studio Visualizer before docking all flavonoids on both ERβ and ERα through Autodock Vina. Genistein is a flavonoid that exhibits anticancer effects by binding to ERβ, so its binding affinity was used as a baseline. Eriodictyol and 4”,6”-Di-O-Galloylprunin both exceeded genistein’s binding affinity for ERβ and was lower than its binding affinity for ERα. Of the two, eriodictyol was pursued due to its antitumor properties on a lung cancer cell line and on glioma cells. It is able to arrest the cell cycle at the G2/M phase by inhibiting the mTOR/PI3k/Akt cascade and is able to induce apoptosis via the PI3K/Akt/NF-kB pathway. Protein pathway and gene analysis were also conducted using ChEMBL and PANTHER and it was shown that eriodictyol might induce anticancer effects through the ROS1, CA7, KMO, and KDM1A genes which are involved in cell proliferation in breast cancer, non-small cell lung cancer, and other diseases. The high binding affinity of eriodictyol to ERβ, as well as its potential affected genes and antitumor effects, therefore, make it a candidate for the development of new breast cancer treatment. Verification through in vitro experiments such as checking the upregulation and downregulation of genes through qPCR and checking cell cycle arrest using a flow cytometry assay is recommended.Keywords: breast cancer, estrogen receptor, flavonoid, molecular docking
Procedia PDF Downloads 89660 Construction of a Desktop Arduino Controlled Propeller Test Stand
Authors: Brian Kozak, Ryan Ferguson, Evan Hockeridge
Abstract:
Aerospace engineering and aeronautical engineering students studying propulsion often learn about propellers and their importance in aviation propulsion. In order to reinforce concepts introduced in the classroom, laboratory projects are used. However, to test a full scale propeller, an engine mounted on a test stand must be used. This engine needs to be enclosed in a test cell for appropriated safety requirements, is expensive to operate, and requires a significant amount of time to change propellers. In order to decrease costs and time requirements, the authors designed and built an electric motor powered desktop Arduino controlled test stand. This test stand is used to enhance student understanding of propeller size and pitch on thrust. The test stand can accommodate propellers up to 25 centimeters in diameter. The code computer allowed for the motor speed to be increased or decreased by 1% per second. Outputs that are measured are thrust, motor rpm, amperes, voltage, and motor temperature. These data are exported as a .CVS file and can be imported into a graphing program for data analysis.Keywords: Arduino, Laboratory Project, Test stand, Propeller
Procedia PDF Downloads 219659 Image Transform Based on Integral Equation-Wavelet Approach
Authors: Yuan Yan Tang, Lina Yang, Hong Li
Abstract:
Harmonic model is a very important approximation for the image transform. The harmanic model converts an image into arbitrary shape; however, this mode cannot be described by any fixed functions in mathematics. In fact, it is represented by partial differential equation (PDE) with boundary conditions. Therefore, to develop an efficient method to solve such a PDE is extremely significant in the image transform. In this paper, a novel Integral Equation-Wavelet based method is presented, which consists of three steps: (1) The partial differential equation is converted into boundary integral equation and representation by an indirect method. (2) The boundary integral equation and representation are changed to plane integral equation and representation by boundary measure formula. (3) The plane integral equation and representation are then solved by a method we call wavelet collocation. Our approach has two main advantages, the shape of an image is arbitrary and the program code is independent of the boundary. The performance of our method is evaluated by numerical experiments.Keywords: harmonic model, partial differential equation (PDE), integral equation, integral representation, boundary measure formula, wavelet collocation
Procedia PDF Downloads 558658 A Proposed Framework for Software Redocumentation Using Distributed Data Processing Techniques and Ontology
Authors: Laila Khaled Almawaldi, Hiew Khai Hang, Sugumaran A. l. Nallusamy
Abstract:
Legacy systems are crucial for organizations, but their intricacy and lack of documentation pose challenges for maintenance and enhancement. Redocumentation of legacy systems is vital for automatically or semi-automatically creating documentation for software lacking sufficient records. It aims to enhance system understandability, maintainability, and knowledge transfer. However, existing redocumentation methods need improvement in data processing performance and document generation efficiency. This stems from the necessity to efficiently handle the extensive and complex code of legacy systems. This paper proposes a method for semi-automatic legacy system re-documentation using semantic parallel processing and ontology. Leveraging parallel processing and ontology addresses current challenges by distributing the workload and creating documentation with logically interconnected data. The paper outlines challenges in legacy system redocumentation and suggests a method of redocumentation using parallel processing and ontology for improved efficiency and effectiveness.Keywords: legacy systems, redocumentation, big data analysis, parallel processing
Procedia PDF Downloads 45657 Crack Width Evaluation for Flexural RC Members with Axial Tension
Authors: Sukrit Ghorai
Abstract:
Proof of controlling crack width is a basic condition for securing suitable performance in serviceability limit state. The cracking in concrete can occur at any time from the casting of time to the years after the concrete has been set in place. Most codes struggle with offering procedure for crack width calculation. There is lack in availability of design charts for designers to compute crack width with ease. The focus of the study is to utilize design charts and parametric equations in calculating crack width with minimum error. The paper contains a simplified procedure to calculate crack width for reinforced concrete (RC) sections subjected to bending with axial tensile force following the guidelines of Euro code [DS EN-1992-1-1 & DS EN-1992-1-2]. Numerical examples demonstrate the application of the suggested procedure. Comparison with parallel analytical tools support the validity of result and show the percentage deviation of crack width in both the procedures. The technique is simple, user-friendly and ready to evolve for a greater spectrum of section sizes and materials.Keywords: concrete structures, crack width calculation, serviceability limit state, structural design, bridge engineering
Procedia PDF Downloads 383656 Gestural Pragmatic Inference among Primates: An Experimental Approach
Authors: Siddharth Satishchandran, Brian Khumalo
Abstract:
Humans are able to derive semantic content from syntactic and pragmatic sources. Multimodal evidence from signaling theory, which examines communication between individuals within and across species, suggests that non-human primates possess similar syntactic and pragmatic capabilities. However, the extent remains unknown because primate pragmatics are relatively under-examined. Our paper reviews research within communication theory amongst non-human primates to understand current theoretical trends. We examine evidence for primate pragmatic capacities through observational, experimental, and theoretical work on gestures. Given fragmented theoretical perspectives, we provide a unified framework of communication for future research that contextualizes the available research under code biology. To achieve this, we rely on biological semiotics (biosemiotics), the philosophy of biology investigating prelinguistic meaning-making as a function of signs and codes. We close by discussing areas of potential research for studying gestural pragmatics amongst non-human primates, particularly chimpanzees (Pan troglodytes), Diana monkeys (Cercopithecus diana), and other potential candidates.Keywords: pragmatics, non-human primates, gestural communication, biological semiotics
Procedia PDF Downloads 39