Search results for: fluent code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1617

Search results for: fluent code

687 Time-Dependent Behaviour of Reinforced Concrete Beams under Sustained and Repeated Loading

Authors: Sultan Daud, John P. Forth, Nikolaos Nikitas

Abstract:

The current study aims to highlight the loading characteristics impact on the time evolution (focusing particularly on long term effects) of the deformation of realized reinforced concrete beams. Namely the tension stiffening code provisions (i.e. within Eurocode 2) are reviewed with a clear intention to reassess their operational value and predicting capacity. In what follows the experimental programme adopted along with some preliminary findings and numerical modelling attempts are presented. For a range of long slender reinforced concrete simply supported beams (4200 mm) constant static sustained and repeated cyclic loadings were applied mapping the time evolution of deformation. All experiments were carried out at the Heavy Structures Lab of the University of Leeds. During tests the mid-span deflection, creep coefficient and shrinkage strains were monitored for duration of 90 days. The obtained results are set against the values predicted by Eurocode 2 and the tools within an FE commercial package (i.e. Midas FEA) to yield that existing knowledge and practise is at times over-conservative.

Keywords: Eurocode2, midas fea, repeated, sustained loading.

Procedia PDF Downloads 345
686 Effect of Model Dimension in Numerical Simulation on Assessment of Water Inflow to Tunnel in Discontinues Rock

Authors: Hadi Farhadian, Homayoon Katibeh

Abstract:

Groundwater inflow to the tunnels is one of the most important problems in tunneling operation. The objective of this study is the investigation of model dimension effects on tunnel inflow assessment in discontinuous rock masses using numerical modeling. In the numerical simulation, the model dimension has an important role in prediction of water inflow rate. When the model dimension is very small, due to low distance to the tunnel border, the model boundary conditions affect the estimated amount of groundwater flow into the tunnel and results show a very high inflow to tunnel. Hence, in this study, the two-dimensional universal distinct element code (UDEC) used and the impact of different model parameters, such as tunnel radius, joint spacing, horizontal and vertical model domain extent has been evaluated. Results show that the model domain extent is a function of the most significant parameters, which are tunnel radius and joint spacing.

Keywords: water inflow, tunnel, discontinues rock, numerical simulation

Procedia PDF Downloads 522
685 Roles of Governmental and Non-governmental Bodies on Chain Remand Complaints in Malaysia

Authors: Ifa Sirrhu Samsudin, Ramalinggam Rajamanickam, Rohaida Nordin

Abstract:

The practice of chain remand would cause human rights violations if the application was granted without reasonable cause and reason. This chain remand problem was tried to be addressed in 2007, which was amongst the factors that led to the amendment of the Criminal Procedure Code (CPC) at that time due to the defilement of human liberty. In Malaysia, there are governmental and non-governmental bodies that are active in ensuring that the human rights of the entire community are protected from being violated. The issue of wrongful detention involving chain remand during an investigation is not a new issue. This issue is constantly highlighted and efforts to address it are often raised by the responsible parties. This study aims to analyse the roles of these bodies in dealing with chain remand complaints in Malaysia using a qualitative research approach by way of in-depth interviews, roundtable discussions and documents analysis. The study discovered that these bodies were able to investigate the complaints but did not have a role in taking any actions. Their role is only to provide recommendations to the complainants to take action. Therefore, this study suggested the function should be given to certain bodies to curb the problem based on solid evidence.

Keywords: liberty, complaints, chain remand, government

Procedia PDF Downloads 180
684 Dual-Rail Logic Unit in Double Pass Transistor Logic

Authors: Hamdi Belgacem, Fradi Aymen

Abstract:

In this paper we present a low power, low cost differential logic unit (LU). The proposed LU receives dual-rail inputs and generates dual-rail outputs. The proposed circuit can be used in Arithmetic and Logic Units (ALU) of processor. It can be also dedicated for self-checking applications based on dual duplication code. Four logic functions as well as their inverses are implemented within a single Logic Unit. The hardware overhead for the implementation of the proposed LU is lower than the hardware overhead required for standard LU implemented with standard CMOS logic style. This new implementation is attractive as fewer transistors are required to implement important logic functions. The proposed differential logic unit can perform 8 Boolean logical operations by using only 16 transistors. Spice simulations using a 32 nm technology was utilized to evaluate the performance of the proposed circuit and to prove its acceptable electrical behaviour.

Keywords: differential logic unit, double pass transistor logic, low power CMOS design, low cost CMOS design

Procedia PDF Downloads 449
683 Investigation of Soil Slopes Stability

Authors: Nima Farshidfar, Navid Daryasafar

Abstract:

In this paper, the seismic stability of reinforced soil slopes is studied using pseudo-dynamic analysis. Equilibrium equations that are applicable to the every kind of failure surface are written using Horizontal Slices Method. In written equations, the balance of the vertical and horizontal forces and moment equilibrium is fully satisfied. Failure surface is assumed to be log-spiral, and non-linear equilibrium equations obtained for the system are solved using Newton-Raphson Method. Earthquake effects are applied as horizontal and vertical pseudo-static coefficients to the problem. To solve this problem, a code was developed in MATLAB, and the critical failure surface is calculated using genetic algorithm. At the end, comparing the results obtained in this paper, effects of various parameters and the effect of using pseudo - dynamic analysis in seismic forces modeling is presented.

Keywords: soil slopes, pseudo-dynamic, genetic algorithm, optimization, limit equilibrium method, log-spiral failure surface

Procedia PDF Downloads 334
682 A Supply Chain Traceability Improvement Using RFID

Authors: Yaser Miaji, Mohammad Sabbagh

Abstract:

Radio Frequency Identification (RFID) is a technology which shares a similar concept with bar code. With RFID, the electromagnetic or electrostatic coupling in the RF portion of the electromagnetic spectrum is used to transmit signals. Supply chain management is aimed to keep going long-term performance of individual companies and the overall supply chain by maximizing customer satisfaction with minimum costs. One of the major issues in the supply chain management is product loss or shrinkage. In order to overcome this problem, this system which uses Radio Frequency Identification (RFID) technology will be able to RFID track and identify where losses are occurring and enable effective traceability. RFID brings a new dimension to supply chain management by providing a more efficient way of being able to identify and track items at the various stages throughout the supply chain. This system has been developed and tested to prove that RFID technology can be used to improve traceability in supply chain at low cost. Due to its simplicity in interface program and database management system using Visual Basic and MS Excel or MS Access the system can be more affordable and implemented even by small and medium scale industries.

Keywords: supply chain, RFID, tractability, radio frequency identification

Procedia PDF Downloads 482
681 Board of Directors of Small and Medium-Sized Enterprises to Go Public: Characteristics and Moderating Factors

Authors: María-José Palacin-Sanchez, Filippo Di Pietro, Reyes Samaniego-Medina

Abstract:

This article examines, in an institutional context such as Spanish one, the corporate board structure characteristics and determinants in entrepreneurial firms to go public. Specifically, it explores these issues through all the initial public offerings in the Spanish Alternative Equity Market (MAB), which is a market segment for smaller growing companies. The results show that: a) firm size, age of the company, and the reputation of the auditor and the nominated advisor and Corporate Governance Code favour a larger and more independent board structure that enhances its monitoring functions; and b) leverage, opportunities of growth, sector risk and ownership by executive directors all lead towards a smaller broad of directors where the role of entrepreneurship provided by executive directors remains crucial. This reflects the delicate balance of power between small-business entrepreneurs and financial equity market forces, which demand more transparency and monitoring in the companies.

Keywords: board composition, board size, corporate governance, IPO, SMEs

Procedia PDF Downloads 397
680 Simulation of Focusing of Diamagnetic Particles in Ferrofluid Microflows with a Single Set of Overhead Permanent Magnets

Authors: Shuang Chen, Zongqian Shi, Jiajia Sun, Mingjia Li

Abstract:

Microfluidics is a technology that small amounts of fluids are manipulated using channels with dimensions of tens to hundreds of micrometers. At present, this significant technology is required for several applications in some fields, including disease diagnostics, genetic engineering, and environmental monitoring, etc. Among these fields, manipulation of microparticles and cells in microfluidic device, especially separation, have aroused general concern. In magnetic field, the separation methods include positive and negative magnetophoresis. By comparison, negative magnetophoresis is a label-free technology. It has many advantages, e.g., easy operation, low cost, and simple design. Before the separation of particles or cells, focusing them into a single tight stream is usually a necessary upstream operation. In this work, the focusing of diamagnetic particles in ferrofluid microflows with a single set of overhead permanent magnets is investigated numerically. The geometric model of the simulation is based on the configuration of previous experiments. The straight microchannel is 24mm long and has a rectangular cross-section of 100μm in width and 50μm in depth. The spherical diamagnetic particles of 10μm in diameter are suspended into ferrofluid. The initial concentration of the ferrofluid c₀ is 0.096%, and the flow rate of the ferrofluid is 1.8mL/h. The magnetic field is induced by five identical rectangular neodymium−iron− boron permanent magnets (1/8 × 1/8 × 1/8 in.), and it is calculated by equivalent charge source (ECS) method. The flow of the ferrofluid is governed by the Navier–Stokes equations. The trajectories of particles are solved by the discrete phase model (DPM) in the ANSYS FLUENT program. The positions of diamagnetic particles are recorded by transient simulation. Compared with the results of the mentioned experiments, our simulation shows consistent results that diamagnetic particles are gradually focused in ferrofluid under magnetic field. Besides, the diamagnetic particle focusing is studied by varying the flow rate of the ferrofluid. It is in agreement with the experiment that the diamagnetic particle focusing is better with the increase of the flow rate. Furthermore, it is investigated that the diamagnetic particle focusing is affected by other factors, e.g., the width and depth of the microchannel, the concentration of the ferrofluid and the diameter of diamagnetic particles.

Keywords: diamagnetic particle, focusing, microfluidics, permanent magnet

Procedia PDF Downloads 128
679 Subband Coding and Glottal Closure Instant (GCI) Using SEDREAMS Algorithm

Authors: Harisudha Kuresan, Dhanalakshmi Samiappan, T. Rama Rao

Abstract:

In modern telecommunication applications, Glottal Closure Instants location finding is important and is directly evaluated from the speech waveform. Here, we study the GCI using Speech Event Detection using Residual Excitation and the Mean Based Signal (SEDREAMS) algorithm. Speech coding uses parameter estimation using audio signal processing techniques to model the speech signal combined with generic data compression algorithms to represent the resulting modeled in a compact bit stream. This paper proposes a sub-band coder SBC, which is a type of transform coding and its performance for GCI detection using SEDREAMS are evaluated. In SBCs code in the speech signal is divided into two or more frequency bands and each of these sub-band signal is coded individually. The sub-bands after being processed are recombined to form the output signal, whose bandwidth covers the whole frequency spectrum. Then the signal is decomposed into low and high-frequency components and decimation and interpolation in frequency domain are performed. The proposed structure significantly reduces error, and precise locations of Glottal Closure Instants (GCIs) are found using SEDREAMS algorithm.

Keywords: SEDREAMS, GCI, SBC, GOI

Procedia PDF Downloads 351
678 Radionuclides Transport Phenomena in Vadose Zone

Authors: R. Testoni, R. Levizzari, M. De Salve

Abstract:

Radioactive waste management is fundamental to safeguard population and environment by radiological risks. Environmental assessment of a site, where nuclear activities are located, allows understanding the hydro geological system and the radionuclides transport in groundwater and subsoil. Use of dedicated software is the basis of transport phenomena investigation and for dynamic scenarios prediction; this permits to understand the evolution of accidental contamination events, but at the same time the potentiality of the software itself can be verified. The aim of this paper is to perform a numerical analysis by means of HYDRUS 1D code, so as to evaluate radionuclides transport in a nuclear site in Piedmont region (Italy). In particular, the behaviour in vadose zone was investigated. An iterative assessment process was performed for risk assessment of radioactive contamination. The analysis therein developed considers the following aspects: i) hydro geological site characterization; ii) individuation of the main intrinsic and external site factors influencing water flow and radionuclides transport phenomena; iii) software potential for radionuclides leakage simulation purposes.

Keywords: HYDRUS 1D, radionuclides transport phenomena, site characterization, radiation protection

Procedia PDF Downloads 394
677 A Refinement Strategy Coupling Event-B and Planning Domain Definition Language (PDDL) for Planning Problems

Authors: Sabrine Ammar, Mohamed Tahar Bhiri

Abstract:

Automatic planning has a de facto standard language called Planning Domain Definition Language (PDDL) for describing planning problems. It aims to formalize the planning problems described by the concept of state space. PDDL-related dynamic analysis tools, namely planners and validators, are insufficient for verifying and validating PDDL descriptions. Indeed, these tools made it possible to detect errors a posteriori by means of test activity. In this paper, we recommend a formal approach coupling the two languages Event-B and PDDL, for automatic planning. Event-B is used for formal modeling by stepwise refinement with mathematical proofs of planning problems. Thus, this paper proposes a refinement strategy allowing to obtain reliable PDDL descriptions from an ultimate Event-B model correct by construction. The ultimate Event-B model, correct by construction which is supposed to be translatable into PDDL, is automatically translated into PDDL using our MDE Event-B2PDDL tool.

Keywords: code generation, event-b, PDDL, refinement strategy, translation rules

Procedia PDF Downloads 188
676 Bit Error Rate Analysis of Multiband OFCDM UWB System in UWB Fading Channel

Authors: Sanjay M. Gulhane, Athar Ravish Khan, Umesh W. Kaware

Abstract:

Orthogonal frequency and code division multiplexing (OFCDM) has received large attention as a modulation scheme to realize high data rate transmission. Multiband (MB) Orthogonal frequency division multiplexing (OFDM) Ultra Wide Band (UWB) system become promising technique for high data rate due to its large number of advantage over Singleband (UWB) system, but it suffer from coherent frequency diversity problem. In this paper we have proposed MB-OFCDM UWB system, in which two-dimensional (2D) spreading (time and frequency domain spreading), has been introduced, combining OFDM with 2D spreading, proposed system can provide frequency diversity. This paper presents the basic structure and main functions of the MB-OFCDM system, and evaluates the bit error rate BER performance of MB-OFDM and MB-OFCDM system under UWB indoor multi-path channel model. It is observe that BER curve of MB-OFCDM UWB improve its performance by 2dB as compare to MB-OFDM UWB system.

Keywords: MB-OFDM UWB system, MB-OFCDM UWB system, UWB IEEE channel model, BER

Procedia PDF Downloads 544
675 Functional Instruction Set Simulator of a Neural Network IP with Native Brain Float-16 Generator

Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula

Abstract:

A functional model to mimic the functional correctness of a neural network compute accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of GCC compilers to the BF-16 datatype, which we addressed with a native BF-16 generator integrated into our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex neural network accelerator design by proposing a functional model-based scoreboard or software model using SystemC. The proposed functional model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT, bringing up micro-steps of execution.

Keywords: ISA, neural network, Brain Float-16, DUT

Procedia PDF Downloads 88
674 Numerical Validation of Liquid Nitrogen Phase Change in a Star-Shaped Ambient Vaporizer

Authors: Yusuf Yilmaz, Gamze Gediz Ilis

Abstract:

Gas Nitrogen where has a boiling point of -189.52oC at atmospheric pressure widely used in the industry. Nitrogen that used in the industry should be transported in liquid form to the plant area. Ambient air vaporizer (AAV) generally used for vaporization of cryogenic gases such as liquid nitrogen (LN2), liquid oxygen (LOX), liquid natural gas (LNG), and liquid argon (LAR) etc. AAV is a group of star-shaped fin vaporizer. The design and the effect of the shape of fins of the vaporizer is one of the most important criteria for the performance of the vaporizer. In this study, the performance of AAV working with liquid nitrogen was analyzed numerically in a star-shaped aluminum finned pipe. The numerical analysis is performed in order to investigate the heat capacity of the vaporizer per meter pipe length. By this way, the vaporizer capacity can be predicted for the industrial applications. In order to achieve the validation of the numerical solution, the experimental setup is constructed. The setup includes a liquid nitrogen tank with a pressure of 9 bar. The star-shaped aluminum finned tube vaporizer is connected to the LN2 tank. The inlet and the outlet pressure and temperatures of the LN2 of the vaporizer are measured. The mass flow rate of the LN2 is also measured and collected. The comparison of the numerical solution is performed by these measured data. The ambient conditions of the experiment are given as boundary conditions to the numerical model. The surface tension and contact angle have a significant effect on the boiling of liquid nitrogen. Average heat transfer coefficient including convective and nucleated boiling components should be obtained for liquid nitrogen saturated flow boiling in the finned tube. Fluent CFD module is used to simulate the numerical solution. The turbulent k-ε model is taken to simulate the liquid nitrogen flow. The phase change is simulated by using the evaporation-condensation approach used with user-defined functions (UDF). The comparison of the numerical and experimental results will be shared in this study. Besides, the performance capacity of the star-shaped finned pipe vaporizer will be calculated in this study. Based on this numerical analysis, the performance of the vaporizer per unit length can be predicted for the industrial applications and the suitable pipe length of the vaporizer can be found for the special cases.

Keywords: liquid nitrogen, numerical modeling, two-phase flow, cryogenics

Procedia PDF Downloads 116
673 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 334
672 Numerical Analysis of Charge Exchange in an Opposed-Piston Engine

Authors: Zbigniew Czyż, Adam Majczak, Lukasz Grabowski

Abstract:

The paper presents a description of geometric models, computational algorithms, and results of numerical analyses of charge exchange in a two-stroke opposed-piston engine. The research engine was a newly designed internal Diesel engine. The unit is characterized by three cylinders in which three pairs of opposed-pistons operate. The engine will generate a power output equal to 100 kW at a crankshaft rotation speed of 3800-4000 rpm. The numerical investigations were carried out using ANSYS FLUENT solver. Numerical research, in contrast to experimental research, allows us to validate project assumptions and avoid costly prototype preparation for experimental tests. This makes it possible to optimize the geometrical model in countless variants with no production costs. The geometrical model includes an intake manifold, a cylinder, and an outlet manifold. The study was conducted for a series of modifications of manifolds and intake and exhaust ports to optimize the charge exchange process in the engine. The calculations specified a swirl coefficient obtained under stationary conditions for a full opening of intake and exhaust ports as well as a CA value of 280° for all cylinders. In addition, mass flow rates were identified separately in all of the intake and exhaust ports to achieve the best possible uniformity of flow in the individual cylinders. For the models under consideration, velocity, pressure and streamline contours were generated in important cross sections. The developed models are designed primarily to minimize the flow drag through the intake and exhaust ports while the mass flow rate increases. Firstly, in order to calculate the swirl ratio [-], tangential velocity v [m/s] and then angular velocity ω [rad / s] with respect to the charge as the mean of each element were calculated. The paper contains comparative analyses of all the intake and exhaust manifolds of the designed engine. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK "PZL-KALISZ" S.A." and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.

Keywords: computational fluid dynamics, engine swirl, fluid mechanics, mass flow rates, numerical analysis, opposed-piston engine

Procedia PDF Downloads 196
671 New Restoration Reagent for Development of Erased Serial Number on Copper Metal Surface

Authors: Lav Kesharwani, Nalini Shankar, A. K. Gupta

Abstract:

A serial number is a unique code assigned for identification of a single unit. Serial number are present on many objects. In an attempt to hide the identity of the numbered item, the numbers are often obliterated or removed by mechanical methods. The present work was carried out with an objective to develop less toxic, less time consuming, more result oriented chemical etching reagent for restoration of serial number on the copper metal plate. Around nine different reagents were prepared using different combination of reagent along with standard reagent and it was applied over 50 erased samples of copper metal and compared it with the standard reagent for restoration of erased marks. After experiment, it was found that the prepared Etching reagent no. 3 (10 g FeCl3 + 20 ml glacial acetic acid + 100 ml distilled H2O) showed the best result for restoration of erased serial number on the copper metal plate .The reagent was also less toxic and less time consuming as compared to standard reagent (19 g FeCl3 + 6 ml cans. HCl + 100 ml distilled H2O).

Keywords: serial number restoration, copper plate, obliteration, chemical method

Procedia PDF Downloads 554
670 Three Dimensional Simulation of the Transient Modeling and Simulation of Different Gas Flows Velocity and Flow Distribution in Catalytic Converter with Porous Media

Authors: Amir Reza Radmanesh, Sina Farajzadeh Khosroshahi, Hani Sadr

Abstract:

The transient catalytic converter performance is governed by complex interactions between exhaust gas flow and the monolithic structure of the catalytic converter. Stringent emission regulations around the world necessitate the use of highly-efficient catalytic converters in vehicle exhaust systems. Computational fluid dynamics (CFD) is a powerful tool for calculating the flow field inside the catalytic converter. Radial velocity profiles, obtained by a commercial CFD code, present very good agreement with respective experimental results published in the literature. However the applicability of CFD for transient simulations is limited by the high CPU demands. In the present work, Geometric modeling ceramic monolith substrate is done with square shaped channel type of Catalytic converter and it is coated platinum and palladium. This example illustrates the effect of flow distribution on thermal response of a catalytic converter and different gas flow velocities, during the critical phase of catalytic converter warm up.

Keywords: catalytic converter, computational fluid dynamic, porous media, velocity distribution

Procedia PDF Downloads 855
669 Analysis of Steel Beam-Column Joints Under Seismic Loads

Authors: Mizam Doğan

Abstract:

Adapazarı railway car factory, the only railway car factory of Turkey, was constructed in 1950. It was a steel design and it had filled beam sections and truss beam systems. Columns were steel profiles and box sections. The factory was damaged heavily on Izmit Earthquake and closed. In this earthquake 90% of damaged structures are reinforced concrete, the others are %7 prefabricated and 3% steel construction. As can be seen in statistical data, damaged industrial buildings in this earthquake were generally reinforced concrete and prefabricated structures. Adapazari railway car factory is the greatest steel structure damaged in the earthquake. This factory has 95% of the total damaged steel structure area. In this paper; earthquake damages on beams and columns of the factory are studied by considering TS648 'Turkish Standard Building Code for Steel Structures' and also damaged connection elements as welds, rivets and bolts are examined. A model similar to the damaged system is made and high-stress zones are searched. These examinations, conclusions, suggestions are explained by damage photos and details.

Keywords: column-beam connection, seismic analysis, seismic load, steel structure

Procedia PDF Downloads 274
668 Machine Learning Based Gender Identification of Authors of Entry Programs

Authors: Go Woon Kwak, Siyoung Jun, Soyun Maeng, Haeyoung Lee

Abstract:

Entry is an education platform used in South Korea, created to help students learn to program, in which they can learn to code while playing. Using the online version of the entry, teachers can easily assign programming homework to the student and the students can make programs simply by linking programming blocks. However, the programs may be made by others, so that the authors of the programs should be identified. In this paper, as the first step toward author identification of entry programs, we present an artificial neural network based classification approach to identify genders of authors of a program written in an entry. A neural network has been trained from labeled training data that we have collected. Our result in progress, although preliminary, shows that the proposed approach could be feasible to be applied to the online version of entry for gender identification of authors. As future work, we will first use a machine learning technique for age identification of entry programs, which would be the second step toward the author identification.

Keywords: artificial intelligence, author identification, deep neural network, gender identification, machine learning

Procedia PDF Downloads 319
667 One-Dimension Model for Positive Displacement Pump with Cavitation Algorithm

Authors: Francesco Rizzuto, Matthew Stickland, Stephan Hannot

Abstract:

The simulation of a positive displacement pump system with commercial software for Computer Fluid Dynamics (CFD), will result in an enormous computational effort due to the complexity of the pump system. This drawback restricts the use of it to a specific part of the pump in one simulation. This research focuses on developing an algorithm that provides a suitable result in agreement with experiment data, without that computational effort. The compressible equations are solved with an explicit algorithm. A comparison is presented between the FV method with Monotonic Upwind scheme for Conservative Laws (MUSCL) with slope limiter and experimental results. The source term for cavitation and friction is introduced into the algorithm with a slipping strategy and solved with a 4th order Runge-Kutta scheme (RK4). Different pumps are modeled and analyzed to evaluate the flexibility of the code. The simulation required minimal computation time and resources without compromising the accuracy of the simulation results. Therefore, this algorithm highlights the feasibility of pressure pulsation simulation as a design tool for an industrial purpose.

Keywords: cavitation, diaphragm, DVCM, finite volume, MUSCL, positive displacement pump

Procedia PDF Downloads 151
666 Analyzing the Readiness of Resuscitation Team during Cardiac Arrest

Authors: J. Byimana, I. A. Muhire, J. E. Nzabahimana, A. Nyombayire

Abstract:

Introduction: A successful cardiopulmonary resuscitation during a sudden cardiac arrest can be delayed by different components including new hospital setting, lack of adequate training, lack of pre-established resuscitation team and ineffective communication and lead to an unexpected outcome which is death. The main objective of the study was to assess the readiness of resuscitation teams during cardiac arrest and the organizational approaches that would best support their functioning in a new hospital facility, and to detect any factor that may have contributed to responses. This study analyses the readiness of Resuscitation Team (RT) during cardiac arrest. —Material and methods: A prospective Analytic design was carried out at a newly established United Nations level 2 hospital facility, on four RTM (resuscitation team member). A semi structured questionnaire was used to collect data. —Results: This study highlights indicate that the response time during cardiac arrest simulation meet both American heart association (AHA) and European resuscitation council guidelines. The study offers useful evidence about the impact of a new facility on RTM performance and provides an exposure of staff to emergency events within the Work setting.

Keywords: cardiac arrest, code blue, simulation, resuscitation team member

Procedia PDF Downloads 218
665 Error Probability of Multi-User Detection Techniques

Authors: Komal Babbar

Abstract:

Multiuser Detection is the intelligent estimation/demodulation of transmitted bits in the presence of Multiple Access Interference. The authors have presented the Bit-error rate (BER) achieved by linear multi-user detectors: Matched filter (which treats the MAI as AWGN), Decorrelating and MMSE. In this work, authors investigate the bit error probability analysis for Matched filter, decorrelating, and MMSE. This problem arises in several practical CDMA applications where the receiver may not have full knowledge of the number of active users and their signature sequences. In particular, the behavior of MAI at the output of the Multi-user detectors (MUD) is examined under various asymptotic conditions including large signal to noise ratio; large near-far ratios; and a large number of users. In the last section Authors also shows Matlab Simulation results for Multiuser detection techniques i.e., Matched filter, Decorrelating, MMSE for 2 users and 10 users.

Keywords: code division multiple access, decorrelating, matched filter, minimum mean square detection (MMSE) detection, multiple access interference (MAI), multiuser detection (MUD)

Procedia PDF Downloads 522
664 Experimental and Numerical Analyses of Tehran Research Reactor

Authors: A. Lashkari, H. Khalafi, H. Khazeminejad, S. Khakshourniya

Abstract:

In this paper, a numerical model is presented. The model is used to analyze a steady state thermo-hydraulic and reactivity insertion transient in TRR reference cores respectively. The model predictions are compared with the experiments and PARET code results. The model uses the piecewise constant and lumped parameter methods for the coupled point kinetics and thermal-hydraulics modules respectively. The advantages of the piecewise constant method are simplicity, efficiency and accuracy. A main criterion on the applicability range of this model is that the exit coolant temperature remains below the saturation temperature, i.e. no bulk boiling occurs in the core. The calculation values of power and coolant temperature, in steady state and positive reactivity insertion scenario, are in good agreement with the experiment values. However, the model is a useful tool for the transient analysis of most research reactor encountered in practice. The main objective of this work is using simple calculation methods and benchmarking them with experimental data. This model can be used for training proposes.

Keywords: thermal-hydraulic, research reactor, reactivity insertion, numerical modeling

Procedia PDF Downloads 397
663 Corporate Codes of Ethics and Earnings Discretion: International Evidence

Authors: Chu Chen, Giorgio Gotti, Tony Kang, Michael Wolfe

Abstract:

This study examines the role of codes of ethics in reducing the extent to which managers’ act opportunistically in reporting earnings. Corporate codes of ethics, by clarifying the boundaries of ethical corporate behaviors and making relevant social norms more salient, have the potential to deter managers from engaging in opportunistic financial reporting practices. In a sample of international companies, we find that the quality of corporate codes of ethics is associated with higher earnings quality, i.e., lower discretionary accruals. Our results are confirmed for a subsample of firms more likely to be engaging in opportunistic reporting behavior, i.e., firms that just meet or beat analysts’ forecasts. Further, codes of ethics play a greater role in reducing earnings management for firms in countries with weaker investor protection mechanisms. Our results suggest that corporate codes of ethics can be a viable alternative to country-level investor protection mechanisms in curbing aggressive reporting behaviors.

Keywords: corporate ethics policy, code of ethics, business ethics, earnings discretion, accruals

Procedia PDF Downloads 283
662 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 267
661 Construction of a Desktop Arduino Controlled Propeller Test Stand

Authors: Brian Kozak, Ryan Ferguson, Evan Hockeridge

Abstract:

Aerospace engineering and aeronautical engineering students studying propulsion often learn about propellers and their importance in aviation propulsion. In order to reinforce concepts introduced in the classroom, laboratory projects are used. However, to test a full scale propeller, an engine mounted on a test stand must be used. This engine needs to be enclosed in a test cell for appropriated safety requirements, is expensive to operate, and requires a significant amount of time to change propellers. In order to decrease costs and time requirements, the authors designed and built an electric motor powered desktop Arduino controlled test stand. This test stand is used to enhance student understanding of propeller size and pitch on thrust. The test stand can accommodate propellers up to 25 centimeters in diameter. The code computer allowed for the motor speed to be increased or decreased by 1% per second. Outputs that are measured are thrust, motor rpm, amperes, voltage, and motor temperature. These data are exported as a .CVS file and can be imported into a graphing program for data analysis.

Keywords: Arduino, Laboratory Project, Test stand, Propeller

Procedia PDF Downloads 215
660 Image Transform Based on Integral Equation-Wavelet Approach

Authors: Yuan Yan Tang, Lina Yang, Hong Li

Abstract:

Harmonic model is a very important approximation for the image transform. The harmanic model converts an image into arbitrary shape; however, this mode cannot be described by any fixed functions in mathematics. In fact, it is represented by partial differential equation (PDE) with boundary conditions. Therefore, to develop an efficient method to solve such a PDE is extremely significant in the image transform. In this paper, a novel Integral Equation-Wavelet based method is presented, which consists of three steps: (1) The partial differential equation is converted into boundary integral equation and representation by an indirect method. (2) The boundary integral equation and representation are changed to plane integral equation and representation by boundary measure formula. (3) The plane integral equation and representation are then solved by a method we call wavelet collocation. Our approach has two main advantages, the shape of an image is arbitrary and the program code is independent of the boundary. The performance of our method is evaluated by numerical experiments.

Keywords: harmonic model, partial differential equation (PDE), integral equation, integral representation, boundary measure formula, wavelet collocation

Procedia PDF Downloads 553
659 A Proposed Framework for Software Redocumentation Using Distributed Data Processing Techniques and Ontology

Authors: Laila Khaled Almawaldi, Hiew Khai Hang, Sugumaran A. l. Nallusamy

Abstract:

Legacy systems are crucial for organizations, but their intricacy and lack of documentation pose challenges for maintenance and enhancement. Redocumentation of legacy systems is vital for automatically or semi-automatically creating documentation for software lacking sufficient records. It aims to enhance system understandability, maintainability, and knowledge transfer. However, existing redocumentation methods need improvement in data processing performance and document generation efficiency. This stems from the necessity to efficiently handle the extensive and complex code of legacy systems. This paper proposes a method for semi-automatic legacy system re-documentation using semantic parallel processing and ontology. Leveraging parallel processing and ontology addresses current challenges by distributing the workload and creating documentation with logically interconnected data. The paper outlines challenges in legacy system redocumentation and suggests a method of redocumentation using parallel processing and ontology for improved efficiency and effectiveness.

Keywords: legacy systems, redocumentation, big data analysis, parallel processing

Procedia PDF Downloads 41
658 Crack Width Evaluation for Flexural RC Members with Axial Tension

Authors: Sukrit Ghorai

Abstract:

Proof of controlling crack width is a basic condition for securing suitable performance in serviceability limit state. The cracking in concrete can occur at any time from the casting of time to the years after the concrete has been set in place. Most codes struggle with offering procedure for crack width calculation. There is lack in availability of design charts for designers to compute crack width with ease. The focus of the study is to utilize design charts and parametric equations in calculating crack width with minimum error. The paper contains a simplified procedure to calculate crack width for reinforced concrete (RC) sections subjected to bending with axial tensile force following the guidelines of Euro code [DS EN-1992-1-1 & DS EN-1992-1-2]. Numerical examples demonstrate the application of the suggested procedure. Comparison with parallel analytical tools support the validity of result and show the percentage deviation of crack width in both the procedures. The technique is simple, user-friendly and ready to evolve for a greater spectrum of section sizes and materials.

Keywords: concrete structures, crack width calculation, serviceability limit state, structural design, bridge engineering

Procedia PDF Downloads 380