Search results for: power line communication
11192 Analysis Mechanized Boring (TBM) of Tehran Subway Line 7
Authors: Shahin Shabani, Pouya Pourmadadi
Abstract:
Tunnel boring machines (TBMs) have been used for the construction of various tunnels for mining projects for the purpose of access, conveyance of ore and waste, drainage, exploration, water supply and water diversion. Several mining projects have seen the successful and economic beneficial use of TBMs, and there is an increasing awareness of the benefits of TBMs for mining projects. Key technical considerations for the use of TBMs for the construction of tunnels for mining projects include geological issues (rock type, rock alteration, rock strength, rock abrasivity, durability, ground water inflows), depth of cover and the potential for overstressing/rockbursts, site access and terrain, portal locations, TBM constraints, minimum tunnel size, tunnel support requirements, contractor and labor experience, and project schedule demands. This study focuses on tunnelling mining, with the goal to develop methods and tools to be used to gain understanding of these processes, and to analyze metro of Tehran. The Metro Line 7 of Tehran is one of the Longest (26 Km) and deepest (27m) of projects that’s under implementation. Because of major differences like passing under all geotechnical layers of the town and encountering part of it with underground water table and also using mechanized excavation system, is one of special metro projects.Keywords: TBM, tunnel boring machines economic, metro, line 7
Procedia PDF Downloads 38411191 Design of a Universal Wireless Battery Charger
Authors: Ahmad B. Musamih, Ahmad A. Albloushi, Ahmed H. Alshemeili, Abdulaziz Y. Alfili, Ala A. Hussien
Abstract:
This paper proposes a universal wireless battery charger design for portable electronic devices. As the number of portable electronics devices increases, the demand for more flexible and reliable charging techniques is becoming more urgent. A wireless battery charger differs from a traditional charger in the way the power transferred to the battery. In the latter, the power is transferred through electrical wires that connect the charger terminals to the battery terminals, while in the former; the power is transferred by induction without electrical connections. With a detection algorithm that detects the battery size and chemistry, the proposed charger will be able to accommodate a wide range of applications, and will allow a more flexible and reliable option to most of today’s portable electronics.Keywords: efficiency, magnetically-coupled resonators, resonance frequency, wireless power transfer
Procedia PDF Downloads 45411190 Sidelobe Free Inverse Synthetic Aperture Radar Imaging of Non Cooperative Moving Targets Using WiFi
Authors: Jiamin Huang, Shuliang Gui, Zengshan Tian, Fei Yan, Xiaodong Wu
Abstract:
In recent years, with the rapid development of radio frequency technology, the differences between radar sensing and wireless communication in terms of receiving and sending channels, signal processing, data management and control are gradually shrinking. There has been a trend of integrated communication radar sensing. However, most of the existing radar imaging technologies based on communication signals are combined with synthetic aperture radar (SAR) imaging, which does not conform to the practical application case of the integration of communication and radar. Therefore, in this paper proposes a high-precision imaging method using communication signals based on the imaging mechanism of inverse synthetic aperture radar (ISAR) imaging. This method makes full use of the structural characteristics of the orthogonal frequency division multiplexing (OFDM) signal, so the sidelobe effect in distance compression is removed and combines radon transform and Fractional Fourier Transform (FrFT) parameter estimation methods to achieve ISAR imaging of non-cooperative targets. The simulation experiment and measured results verify the feasibility and effectiveness of the method, and prove its broad application prospects in the field of intelligent transportation.Keywords: integration of communication and radar, OFDM, radon, FrFT, ISAR
Procedia PDF Downloads 12611189 Integration of UPQC Based on Fuzzy Controller for Power Quality Enhancement in Distributed Network
Authors: M. Habab, C. Benachaiba, B. Mazari, H. Madi, C. Benoudjafer
Abstract:
The use of Distributed Generation (DG) has been increasing in recent years to fill the gap between energy supply and demand. This paper presents the grid connected wind energy system with UPQC based on fuzzy controller to compensate for voltage and current disturbances. The proposed system can improve power quality at the point of installation on power distribution systems. Simulation results show the capability of the DG-UPQC intelligent system to compensate sags voltage and current harmonics at the Point of Common Coupling (PCC).Keywords: shunt active filter, series active filter, UPQC, power quality, sags voltage, distributed generation, wind turbine
Procedia PDF Downloads 40711188 ANFIS Based Technique to Estimate Remnant Life of Power Transformer by Predicting Furan Contents
Authors: Priyesh Kumar Pandey, Zakir Husain, R. K. Jarial
Abstract:
Condition monitoring and diagnostic is important for testing of power transformer in order to estimate the remnant life. Concentration of furan content in transformer oil can be a promising indirect measurement of the aging of transformer insulation. The oil gets contaminated mainly due to ageing. The present paper introduces adaptive neuro fuzzy technique to correlate furanic compounds obtained by high performance liquid chromatography (HPLC) test and remnant life of the power transformer. The results are obtained by conducting HPLC test at TIFAC-CORE lab, NIT Hamirpur on thirteen power transformer oil samples taken from Himachal State Electricity Board, India.Keywords: adaptive neuro fuzzy technique, furan compounds, remnant life, transformer oil
Procedia PDF Downloads 46411187 Simplified Linear Regression Model to Quantify the Thermal Resilience of Office Buildings in Three Different Power Outage Day Times
Authors: Nagham Ismail, Djamel Ouahrani
Abstract:
Thermal resilience in the built environment reflects the building's capacity to adapt to extreme climate changes. In hot climates, power outages in office buildings pose risks to the health and productivity of workers. Therefore, it is of interest to quantify the thermal resilience of office buildings by developing a user-friendly simplified model. This simplified model begins with creating an assessment metric of thermal resilience that measures the duration between the power outage and the point at which the thermal habitability condition is compromised, considering different power interruption times (morning, noon, and afternoon). In this context, energy simulations of an office building are conducted for Qatar's summer weather by changing different parameters that are related to the (i) wall characteristics, (ii) glazing characteristics, (iii) load, (iv) orientation and (v) air leakage. The simulation results are processed using SPSS to derive linear regression equations, aiding stakeholders in evaluating the performance of commercial buildings during different power interruption times. The findings reveal the significant influence of glazing characteristics on thermal resilience, with the morning power outage scenario posing the most detrimental impact in terms of the shortest duration before compromising thermal resilience.Keywords: thermal resilience, thermal envelope, energy modeling, building simulation, thermal comfort, power disruption, extreme weather
Procedia PDF Downloads 7511186 Type of Dam Construction and It’s Challengings
Authors: Mokhtar Nikgoo
Abstract:
Definition of dam: A dam is one of the most important and widely used engineering structures, which means stopping or changing the course of water on a river. A lake is formed behind the dam, which is called (reservoir). Water is stored in the tank to be used when needed. The dam building industry is a great service to mankind in the use of water and land resources. If they build the dam in a suitable place, they will prevent floods. The water that collects behind the dam and in the dam's lake and reservoir is a valuable reserve for drinking by people and animals. Dry agricultural lands are also irrigated with this water. In addition, in many dams, the pressure caused by the water fall is directed by turbines, and the turbines move the power generation devices and provide power from electricityKeywords: dam, shaft, gallery, spillway, power plant
Procedia PDF Downloads 6211185 Nonlinear Power Measurement Algorithm of the Input Mix Components of the Noise Signal and Pulse Interference
Authors: Alexey V. Klyuev, Valery P. Samarin, Viktor F. Klyuev, Andrey V. Klyuev
Abstract:
A power measurement algorithm of the input mix components of the noise signal and pulse interference is considered. The algorithm efficiency analysis has been carried out for different interference to signal ratio. Algorithm performance features have been explored by numerical experiment results.Keywords: noise signal, pulse interference, signal power, spectrum width, detection
Procedia PDF Downloads 33711184 A Design Method for Wind Turbine Blade to Have Uniform Strength and Optimum Power Generation Performance
Authors: Pengfei Liu, Yiyi Xu
Abstract:
There have been substantial incidents of wind turbine blade fractures and failures due to the lack of systematic blade strength design method incorporated with the aerodynamic forces and power generation efficiency. This research was to develop a methodology and procedure for the wind turbine rotor blade strength taking into account the strength, integration, and aerodynamic performance in terms of power generation efficiency. The wind turbine blade designed using this method and procedure will have a uniform strength across the span to save unnecessary thickness in many blade radial locations and yet to maintain the optimum power generation performance. A turbine rotor code, taking into account both aerodynamic and structural properties, was developed. An existing wind turbine blade was used as an example. For a condition of extreme wind speed of 100 km per hour, the design reduced about 19% of material usage while maintaining the optimum power regeneration efficiency.Keywords: renewable energy, wind turbine, turbine blade strength, aerodynamics-strength coupled optimization
Procedia PDF Downloads 17911183 Reusing of HSS Hacksaw Blades as Rough Machining Tool
Authors: Raja V., Chokkalingam B.
Abstract:
For rough cutting, in many industries and educational institutions using carbon steels or HSS single point cutting tools in center lathe machine. In power hacksaw blades, only the cutter teeth region used to parting off the given material. The portions other than the teeth can be used as a single point cutting tool for rough turning and facing on soft materials. The hardness and Tensile strength of this used Power hacksaw blade is almost same as conventional cutting tools. In this paper, the effect of power hacksaw blades over conventional tool has been compared. Thickness of the blade (1.6 mm) is very small compared to its length and width. Hence, a special tool holding device is designed to hold the tool.Keywords: hardness, high speed steels, power hacksaw blade, tensile strength
Procedia PDF Downloads 45711182 Performance Analysis of Arithmetic Units for IoT Applications
Authors: Nithiya C., Komathi B. J., Praveena N. G., Samuda Prathima
Abstract:
At present, the ultimate aim in digital system designs, especially at the gate level and lower levels of design abstraction, is power optimization. Adders are a nearly universal component of today's integrated circuits. Most of the research was on the design of high-speed adders to execute addition based on various adder structures. This paper discusses the ideal path for selecting an arithmetic unit for IoT applications. Based on the analysis of eight types of 16-bit adders, we found out Carry Look-ahead (CLA) produces low power. Additionally, multiplier and accumulator (MAC) unit is implemented with the Booth multiplier by using the low power adders in the order of preference. The design is synthesized and verified using Synopsys Design Compiler and VCS. Then it is implemented by using Cadence Encounter. The total power consumed by the CLA based booth multiplier is 0.03527mW, the total area occupied is 11260 um², and the speed is 2034 ps.Keywords: carry look-ahead, carry select adder, CSA, internet of things, ripple carry adder, design rule check, power delay product, multiplier and accumulator
Procedia PDF Downloads 11811181 Calculation and Comparison of a Turbofan Engine Performance Parameters with Various Definitions
Abstract:
In this paper, some performance parameters of a selected turbofan engine (JT9D) are analyzed. The engine is a high bypass turbofan engine which powers a wide-body aircraft and it produces 206 kN thrust force (thrust/weight ratio is 5.4). The objective parameters for the engine include calculation of power, specific fuel consumption, specific thrust, engine propulsive, thermal and overall efficiencies according to the various definitions given in the literature. Furthermore, in the case study, wasted energy from the exhaust is calculated at the maximum power setting (i.e. take off phase) for the engine.Keywords: turbofan, power, efficiency, trust
Procedia PDF Downloads 30111180 Promotion of Public Participation in Community Planning, Bang Nang Li Sub-District, Amphawa District, Samutsongkhram Province
Authors: Sakapas Saengchai, Wilasinee Jintalikitdee, Matinee Kongsatit, Natapol Puaprasert
Abstract:
The study on promotion of public participation in community planning is a qualitative research. The data collection tools included participating observation, in-depth interview and focus group of executives of sub-district administrative organizations, sub-district headmen, community leaders of 5 villages, including civil society forums for exchanging ideas of village members. The study results revealed that key promotions of public participation in community planning were as follows: 1) Perception on public authorities’ information: Public relations should be set and information on community planning, key principles of local people participation should be prepared. Collaboration with community leaders in each village via sub-district administrative organizations should be established. 2) Discussion: In civil society forums, village members should brainstorm their opinions towards community development, village development, quality of life, current situation and problems to be revolved. 3) Participation: Members of each village should jointly participate, with community leaders, in setting sub-district development policies and community development projects. 4) Collaboration: To achieve goals, communities of each member should participate in project implementation and activities of community plans. 5) People power promotion: In each stage of communication planning, community leaders, village committees, local people should jointly set directions of village development and make decisions. This will enhance their joint learning and create community driving power. Community will become strong leading to sustainable self-reliance.Keywords: people participation, community plans, community development, community driving power
Procedia PDF Downloads 36711179 Culture and Deviance Told by Skin: Non Verbal Communication of Tattoos
Authors: Andreas Aceranti, Simonetta Vernocchi, Marco Colorato, Ludwig Conistabile, Martina Falappi
Abstract:
This study was born out of the necessity to delve into and understand the intricate world of tattoos, a millenary art that lays its foundation, although sometimes complex, for effective non-verbal communication. What is most astonishing about a phenomenon such as irreversibly branding the skin, which at first glance may appear superficial, especially in the eyes of those who do not fully understand its meaning, is the fact that it is actually one of the most enduring forms of communication: body modification through tattoos or ornamental dyes indicated the wearer's membership in a particular ethnic group, social class or religious community. Even within crime-based aggregations, tattoos had (and still have) the purpose of conveying one's affiliation to a particular group, thus making one's criminal identity known. The profession of a language and cultural mediator teaches that it is essential to be able to read between the lines to grasp all those aspects that words alone do not convey. Tattooing, therefore, becomes a tool of analysis and a language that is not secondary to be taken into account for an in-depth reading of the reality that surrounds us and of cultures different from our own.Keywords: tattoo, cultural tattoos, tattooing, non verbal communication
Procedia PDF Downloads 20411178 Solar Powered Front Wheel Drive (FWD) Electric Trike: An Innovation
Authors: Michael C. Barbecho, Romeo B. Morcilla
Abstract:
This study focused on the development of a solar powered front wheel drive electric trike for personal use and short distance travel, utilizing solar power and a variable speed transmission to adapt in places where varying road grades and unavailability of plug-in charging stations are of great problems. The actual performance of the vehicle was measured in terms of duration of charging using solar power, distance travel and battery power duration, top speed developed at full power, and load capacity. This project followed the research and development process which involved planning, designing, construction, and testing. Solar charging tests revealed that the vehicle requires 6 to 8 hours sunlight exposure to fully charge the batteries. At full charge, the vehicle can travel 35 km utilizing battery power down to 42%. Vehicle showed top speed of 25 kph at 0 to 3% road grade carrying a maximum load of 122 kg. The maximum climbing grade was 23% with the vehicle carrying a maximum load of 122 kg. Technically the project was feasible and can be a potential model for possible conversion of traditional Philippine made “pedicabs” and gasoline engine powered tricycle into modern electric vehicles. Moreover, it has several technical features and advantages over a commercialized electric vehicle such as the use solar charging system and variable speed power transmission and front drive power train for adaptability in any road gradient.Keywords: electric vehicle, solar vehicles, front drive, solar, solar power
Procedia PDF Downloads 57111177 Bug Localization on Single-Line Bugs of Apache Commons Math Library
Authors: Cherry Oo, Hnin Min Oo
Abstract:
Software bug localization is one of the most costly tasks in program repair technique. Therefore, there is a high claim for automated bug localization techniques that can monitor programmers to the locations of bugs, with slight human arbitration. Spectrum-based bug localization aims to help software developers to discover bugs rapidly by investigating abstractions of the program traces to make a ranking list of most possible buggy modules. Using the Apache Commons Math library project, we study the diagnostic accuracy using our spectrum-based bug localization metric. Our outcomes show that the greater performance of a specific similarity coefficient, used to inspect the program spectra, is mostly effective on localizing of single line bugs.Keywords: software testing, bug localization, program spectra, bug
Procedia PDF Downloads 14311176 Design of Single Phase Smart Energy Meter and Grid Tied Inverter for Smart Grid
Authors: Hamza Arif, Haroon Javaid
Abstract:
Based on hybrid energy concept of smart grid to synchronize and monitor power being generated at the user end. The ATMEGA328p controller of arduino is used as a processor unit that sends wireless data between user and power utility through NRF24L01 wireless modules. Current and potential transformer circuit are designed to sense the voltage and current at the utility and power being generated at the user end through solar panel. They are designed to interface with the arduino. The approach is used to demonstrate the concept of smart grid and to facilitate for further advancements in the field of smart grid technology. A PWM (Pulse Width Modulation) technique is used to synchronize the user output power with the utility supplier.Keywords: smart grid, hybrid energy, grid tied inverter, PWM
Procedia PDF Downloads 2211175 Re-Imagining and De-Constructing the Global Security Architecture
Authors: Smita Singh
Abstract:
The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.Keywords: hegemonic discourse, global security, non-proliferation regime, power politics
Procedia PDF Downloads 31811174 Assessing Available Power from a Renewable Energy Source in the Southern Hemisphere using Anisotropic Model
Authors: Asowata Osamede, Trudy Sutherland
Abstract:
The purpose of this paper is to assess the available power from a Renewable Energy Source (off-grid photovoltaic (PV) panel) in the Southern Hemisphere using anisotropic model. Direct solar radiation is the driving force in photovoltaics. In a basic PV panels in the Southern Hemisphere, Power conversion is eminent, and this is achieved by the PV cells converting solar energy into electrical energy. In this research, the results was determined for a 6 month period from September 2022 through February 2023. Preliminary results, which include Normal Probability plot, data analysis - R2 value, effective conversion-time per week and work-time per day, indicate a favorably comparison between the empirical results and the simulation results.Keywords: power-conversion, mathematical model, PV panels, DC-DC converters, direct solar radiation
Procedia PDF Downloads 8511173 Cable Diameter Effect on the Contact Temperature of Power Automotive Connector
Authors: Amine Beloufa, Mohamed Amirat
Abstract:
In the electric vehicle, high power leads to high current; automotive power connector should resist to this high current in order to avoid a serious damage caused by the increase of contact temperature. The purpose of this paper is to analyze experimentally and numerically the effect of the cable diameter variation on the decrease of contact temperature. For this reason, a finite element model was developed to calculate the numerical contact temperature for several cable diameters and several electrical high currents. Also, experimental tests were established in order to validate this numerical model. Results show that the influence of cable diameter on the contact temperature is never neglected.Keywords: contact temperature, experimental test, finite element, power automotive connector
Procedia PDF Downloads 26311172 “I” on the Web: Social Penetration Theory Revised
Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology
Abstract:
The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information
Procedia PDF Downloads 37111171 Enhancing Problem Communication and Management Using Civil Information Modeling for Infrastructure Projects
Authors: Yu-Cheng Lin, Yu-Chih Su
Abstract:
Generally, there are many numerous existing problems during the construction phase special in civil engineering. The problems communication and management (PCM) of civil engineering are important and necessary to enhance the performance of construction management. The civil information modelling (CIM) approach is used to retain information with digital format and assist easy updating and transferring of information in the 3D environment for all related civil and infrastructure projects. When the application of CIM technology is adopted in infrastructure projects, all the related project participants can discuss problems and obtain feedback and responds among project participants integrated with the assistance of CIM models 3D illustration. Usually, electronic mail (e-mail) is one of the most popular communication tools among all related participants for rapid transit system (MRT), also known as a subway or metro, construction project in Taiwan. Furthermore, all interfaces should be traced and managed effectively during the process. However, there are many problems with the use of e-mail for communication of all interfaces. To solve the above problems, this study proposes a CIM-based Problem Communication and Management (CPCM) system to improve performance of problem communication and management. The CPCM system is applied to a case study of an MRT project in Taiwan to identify its CPCM effectiveness. Case study results show that the proposed CPCM system and Markup-enabled CIM Viewer are effective CIM-based communication tools in CIM-supported PCM work of civil engineering. Finally, this study identifies conclusion, suggestion, benefits, and limitations for further applications.Keywords: building information modeling, civil information modeling, infrastructure, general contractor
Procedia PDF Downloads 15211170 OILU Tag: A Projective Invariant Fiducial System
Authors: Youssef Chahir, Messaoud Mostefai, Salah Khodja
Abstract:
This paper presents the development of a 2D visual marker, derived from a recent patented work in the field of numbering systems. The proposed fiducial uses a group of projective invariant straight-line patterns, easily detectable and remotely recognizable. Based on an efficient data coding scheme, the developed marker enables producing a large panel of unique real time identifiers with highly distinguishable patterns. The proposed marker Incorporates simultaneously decimal and binary information, making it readable by both humans and machines. This important feature opens up new opportunities for the development of efficient visual human-machine communication and monitoring protocols. Extensive experiment tests validate the robustness of the marker against acquisition and geometric distortions.Keywords: visual markers, projective invariants, distance map, level sets
Procedia PDF Downloads 16311169 Design and Implementation of Medium Access Control Based Routing on Real Wireless Sensor Networks Testbed
Authors: Smriti Agarwal, Ashish Payal, B. V. R. Reddy
Abstract:
IEEE 802.15.4 is a Low Rate Wireless Personal Area Networks (LR-WPAN) standard combined with ZigBee, which is going to enable new applications in Wireless Sensor Networks (WSNs) and Internet of Things (IoT) domain. In recent years, it has become a popular standard for WSNs. Wireless communication among sensor motes, enabled by IEEE 802.15.4 standard, is extensively replacing the existing wired technology in a wide range of monitoring and control applications. Researchers have proposed a routing framework and mechanism that interacts with the IEEE 802.15.4 standard using software platform. In this paper, we have designed and implemented MAC based routing (MBR) based on IEEE 802.15.4 standard using a hardware platform “SENSEnuts”. The experimental results include data through light and temperature sensors obtained from communication between PAN coordinator and source node through coordinator, MAC address of some modules used in the experimental setup, topology of the network created for simulation and the remaining battery power of the source node. Our experimental effort on a WSN Testbed has helped us in bridging the gap between theoretical and practical aspect of implementing IEEE 802.15.4 for WSNs applications.Keywords: IEEE 802.15.4, routing, WSN, ZigBee
Procedia PDF Downloads 40611168 The Influence of Disturbances Generated by Arc Furnaces on the Power Quality
Authors: Z. Olczykowski
Abstract:
The paper presents the impact of work on the electric arc furnace. Arc equipment is one of the largest receivers powered by the power system. Electric arc disturbances arising during melting process occurring in these furnaces are the cause of an abrupt change of the passive power of furnaces. Currents drawn by these devices undergo an abrupt change, which in turn cause voltage fluctuations and light flicker. The quantitative evaluation of the voltage fluctuations is now the basic criterion of assessment of an influence of unquiet receiver on the supplying net. The paper presents the method of determination of range of voltage fluctuations and light flicker at parallel operation of arc devices. The results of measurements of voltage fluctuations and light flicker indicators recorded in power supply networks of steelworks were presented, with different number of parallel arc devices. Measurements of energy quality parameters were aimed at verifying the proposed method in practice. It was also analyzed changes in other parameters of electricity: the content of higher harmonics, asymmetry, voltage dips.Keywords: power quality, arc furnaces, propagation of voltage fluctuations, disturbances
Procedia PDF Downloads 13711167 Investigation of Design Process of an Impedance Matching in the Specific Frequency for Radio Frequency Application
Authors: H. Nabaei, M. Joghataie
Abstract:
In this article, we study the design methods of matched filter with commercial software including CST Studio and ADS in specific frequency: 900 MHz. At first, we select two amounts of impedance for studying matching of them. Then, using by matched filter utility tool in ADS software, we simulate and deviate the elements of matched filters. In the following, we implement matched filter in CST STUDIO software. The simulated results show the great conformity in this field. Also, we peruse scattering and Impedance parameters in the Derivative structure. Finally, the layout of matched filter is obtained by the schematic tool of CST STUDIO. In fact, here, we present the design process of matched filters in the specific frequency.Keywords: impedance matching, lumped element, transmission line, maximum power transmission, 3D layout
Procedia PDF Downloads 50211166 Electromagnetic Assessment of Submarine Power Cable Degradation Using Finite Element Method and Sensitivity Analysis
Authors: N. Boutra, N. Ravot, J. Benoit, O. Picon
Abstract:
Submarine power cables used for offshore wind farms electric energy distribution and transmission are subject to numerous threats. Some of the risks are associated with transport, installation and operating in harsh marine environment. This paper describes the feasibility of an electromagnetic low frequency sensing technique for submarine power cable failure prediction. The impact of a structural damage shape and material variability on the induced electric field is evaluated. The analysis is performed by modeling the cable using the finite element method, we use sensitivity analysis in order to identify the main damage characteristics affecting electric field variation. Lastly, we discuss the results obtained.Keywords: electromagnetism, finite element method, sensitivity analysis, submarine power cables
Procedia PDF Downloads 35611165 Compensation for Victims of Crime and Abuse of Power in Nigeria
Authors: Kolawole Oyekan Jamiu
Abstract:
In Nigerian criminal law, a victim of an offence plays little or no role in the prosecution of an offender. The state concentrates only on imposing punishment on the offender while the victims of crime and abuse of power by security agencies are abandoned without any compensation either from the State or the offender. It has been stated that the victim of crime is the forgotten man in our criminal justice system. He sets the criminal law in motion but then goes into oblivion. Our present criminal law does not recognise the right of the victim to take part in the prosecution of the case or his right to compensation. The victim is merely a witness in a state versus case. This paper examines the meaning of the phrase ‘the victims of crime and abuse of power’. It needs to be noted that there is no definition of these two categories of victims in any statute in Nigeria. The paper also considers the United Nations General Assembly Declaration of Basic Principle of Justice for Victims and abuse of power. This declaration was adopted by the United Nations General Assembly on the 25th of November 1985. The declaration contains copious provisions on compensation for the victims of crime and abuse of power. Unfortunately, the declaration is not, in itself a legally binding instrument and has been given little or no attention since the coming into effect in1985. This paper examines the role of the judiciary in ensuring that victims of crime and abuse of power in Nigeria are compensated. While some Judges found it difficult to award damages to victims of abuse of power others have given some landmark rulings and awarded substantial damages. The criminal justice ( victim’s remedies) Bill shall also be examined. The Bill comprises of 74 sections and it spelt out the procedures for compensating the victims of crime and abuse of power in Nigeria. Finally, the paper also examines the practicability of awarding damages to victims of crime whether the offender is convicted or not and in addition, the possibility of granting all equitable remedies available in civil cases to victims of crime and abuse of power so that the victims will be restored to the earlier position before the crime.Keywords: compensation, damages, restitution, victims
Procedia PDF Downloads 72711164 Embedment Design Concept of Signature Tower in Chennai
Authors: M. Gobinath, S. Balaji
Abstract:
Assumptions in model inputs: Grade of concrete=40 N/mm2 (for slab), Grade of concrete=40 N/mm2 (for shear wall), Grade of Structural steel (plate girder)=350 N/mm2 (yield strength), Ultimate strength of structural steel=490 N/mm2, Grade of rebar=500 N/mm2 (yield strength), Applied Load=1716 kN (un-factored). Following assumptions are made for the mathematical modelling of RCC with steel embedment: (1) The bond between the structural steel and concrete is neglected. (2) The stiffener is provided with shear studs to transfer the shear force. Hence nodal connectivity is established between solid nodes (concrete) and shell elements (stiffener) at those locations. (3) As the end reinforcements transfer either tension/compression, it is modeled as line element and connected to solid nodes. (4) In order to capture the bearing of bottom flange on to the concrete, the line element of plan size of solid equal to the cross section of line elements is connected between solid and shell elements below for bottom flange and above for top flange. (5) As the concrete cannot resist tension at the interface (i.e., between structural steel and RCC), the tensile stiffness is assigned as zero and only compressive stiffness is enabled to take. Hence, non-linear static analysis option is invoked.Keywords: structure, construction, signature tower, embedment design concept
Procedia PDF Downloads 30111163 Proposal of Data Collection from Probes
Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik
Abstract:
In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.Keywords: communication, computer network, data collection, probe
Procedia PDF Downloads 360