Search results for: crack extension path
1411 Analysis of Hydraulic Velocity in Fishway Using CCHE2D Model
Authors: Amir Abbas Kamanbedast, Masood Mohammad Shafipor, Amir Ghotboddin
Abstract:
Fish way is a structure that in generally using to migrate to the place where they are spawned and is made near the spillway. Preventing fish spawning or migrating to their original place by fishway structures can affect their lives in the river or even erase one access to intended environment. The main objective of these structures is establishing a safe path for fish migration. In the present study first the hydraulic specifications of Hamidieh diversion dam were assessed and then it is problems were evaluated. In this study the dimensions of the fish way, including velocity of pools, were evaluated by CCHE2D software. Then by change slope in this structure streamlines like velocity in the pools were measured. For calibration can be use measuring local velocities in some pools. The information can be seen the fishway width of 0.3 m has minimum rate of descent in the total number of structures (pools and overflow).Keywords: fishway, velocity, Hamidieh-Diversion Dam, CCHE2D model
Procedia PDF Downloads 4951410 Effect of Size, Geometry and Tensile Strength of Fibers on the Flexure of Hooked Steel Fiber Reinforced Concrete
Authors: Chuchai Sujivorakul
Abstract:
This research focused on the study of various parameters of fiber itself affecting on the flexure of hooked steel fiber reinforced concrete (HSFRC). The size of HSFRC beams was 150x150 mm in cross section and 550 mm in length, and the flexural test was carried out in accordance with EN-14651 standard. The test result was the relationship between centre-point load and crack-mount opening displacement (CMOD) at the centre notch. Controlled concrete had a compressive strength of 42 MPa. The investigated variables related to the hooked fiber itself were: (a) 3 levels of aspect ratio of fibers (65, 80 and 100); (b) 2 different fiber lengths (35 mm and 60 mm); (c) 2 different tensile strength of fibers (1100 MPa and 1500 MPa); and (d) 3 different fiber-end geometries (3D 4D and 5D fibers). The 3D hooked fibers have two plastic hinges at both ends, while the 4D and 5D hooked fibers are the newly developed steel fibers by Bekaert, and they have three and four plastic hinges at both ends, respectively. The hooked steel fibers were used in concrete with three different fiber contents, i.e., 20 30 and 40 kg/m³. From the study, it was found that all variables did not seem to affect the flexural strength at limit of proportionality (LOP) of HSFRC. However, they affected the residual flexural tensile strength (fR,j). It was observed that an increase in fiber lengths and the tensile strength the fibers would significantly increase in the fR,j of HSFRC, while the aspect ratio of the fiber would slightly effect the fR,j of HSFRC. Moreover, it was found that using 5D fibers would better enhance the fR,j and flexural behavior of HSFRC than 3D and 4D fibers, because they gave highest mechanical anchorage effect created by their hooked-end geometry.Keywords: hooked steel fibers, fiber reinforced concrete, EN-14651, flexural test
Procedia PDF Downloads 1701409 The Tense Dichotomy Between Shari'ah Compliance and the Goals of an Economic Bank
Authors: Camille Paldi
Abstract:
The tense dichotomy between Shari’ah compliance and the economic goals of an Islamic Bank produces a proliferation of reverse engineered products, which are barely in compliance with Islamic law. The result is basically a hybrid conventional banking system with conventional products in Islamic disguise using Arabic and Islamic terminology. Many Islamic financial professionals and academics advocate for the use of conventional products and devices despite their non-Shari’ah compliance based on commercial necessity and the need to compete. However, this dangerous trend will lead to the demise of the Islamic finance industry. Rather than thoughtlessly following conventional products and practice, Islamic finance professionals should delve into the Shari’ah to find the answers to the current Islamic banking conundrum and lead the industry on the right path of developing Shari’ah based products and using Shari’ah devices to hedge risk.Keywords: Islamic banking, Shari'ah, finance, investment
Procedia PDF Downloads 3471408 Practical Method for Failure Prediction of Mg Alloy Sheets during Warm Forming Processes
Authors: Sang-Woo Kim, Young-Seon Lee
Abstract:
An important concern in metal forming, even at elevated temperatures, is whether a desired deformation can be accomplished without any failure of the material. A detailed understanding of the critical condition for crack initiation provides not only the workability limit of a material but also a guide-line for process design. This paper describes the utilization of ductile fracture criteria in conjunction with the finite element method (FEM) for predicting the onset of fracture in warm metal working processes of magnesium alloy sheets. Critical damage values for various ductile fracture criteria were determined from uniaxial tensile tests and were expressed as the function of strain rate and temperature. In order to find the best criterion for failure prediction, Erichsen cupping tests under isothermal conditions and FE simulations combined with ductile fracture criteria were carried out. Based on the plastic deformation histories obtained from the FE analyses of the Erichsen cupping tests and the critical damage value curves, the initiation time and location of fracture were predicted under a bi-axial tensile condition. The results were compared with experimental results and the best criterion was recommended. In addition, the proposed methodology was used to predict the onset of fracture in non-isothermal deep drawing processes using an irregular shaped blank, and the results were verified experimentally.Keywords: magnesium, AZ31 alloy, ductile fracture, FEM, sheet forming, Erichsen cupping test
Procedia PDF Downloads 3731407 Communication in a Heterogeneous Ad Hoc Network
Authors: C. Benjbara, A. Habbani
Abstract:
Wireless networks are getting more and more used in every new technology or feature, especially those without infrastructure (Ad hoc mode) which provide a low cost alternative to the infrastructure mode wireless networks and a great flexibility for application domains such as environmental monitoring, smart cities, precision agriculture, and so on. These application domains present a common characteristic which is the need of coexistence and intercommunication between modules belonging to different types of ad hoc networks like wireless sensor networks, mesh networks, mobile ad hoc networks, vehicular ad hoc networks, etc. This vision to bring to life such heterogeneous networks will make humanity duties easier but its development path is full of challenges. One of these challenges is the communication complexity between its components due to the lack of common or compatible protocols standard. This article proposes a new patented routing protocol based on the OLSR standard in order to resolve the heterogeneous ad hoc networks communication issue. This new protocol is applied on a specific network architecture composed of MANET, VANET, and FANET.Keywords: Ad hoc, heterogeneous, ID-Node, OLSR
Procedia PDF Downloads 2151406 A Resilience Process Model of Natural Gas Pipeline Systems
Authors: Zhaoming Yang, Qi Xiang, Qian He, Michael Havbro Faber, Enrico Zio, Huai Su, Jinjun Zhang
Abstract:
Resilience is one of the key factors for system safety assessment and optimization, and resilience studies of natural gas pipeline systems (NGPS), especially in terms of process descriptions, are still being explored. Based on the three main stages, which are function loss process, recovery process, and waiting process, the paper has built functions and models which are according to the practical characteristics of NGPS and mainly analyzes the characteristics of deterministic interruptions. The resilience of NGPS also considers the threshold of the system function or users' satisfaction. The outcomes, which quantify the resilience of NGPS in different evaluation views, can be combined with the max flow and shortest path methods, help with the optimization of extra gas supplies and gas routes as well as pipeline maintenance strategies, the quick analysis of disturbance effects and the improvement of NGPS resilience evaluation accuracy.Keywords: natural gas pipeline system, resilience, process modeling, deterministic disturbance
Procedia PDF Downloads 1261405 A Study on the Wind Energy Produced in the Building Skin Using Piezoelectricity
Authors: Sara Mota Carmo
Abstract:
Nowadays, there is an increasing demand for buildings to be energetically autonomous through energy generation systems from renewable sources, according to the concept of a net zero energy building (NZEB). In this sense, the present study aims to study the integration of wind energy through piezoelectricity applied to the building skin. As a methodology, a reduced-scale prototype of a building was developed and tested in a wind tunnel, with the four façades monitored by recording the energy produced by each. The applied wind intensities varied between 2m/s and 8m/s and the four façades were compared with each other regarding the energy produced according to the intensity of wind and position in the wind. The results obtained concluded that it was not a sufficient system to generate sources to cover family residential buildings' energy needs. However, piezoelectricity is expanding and can be a promising path for a wind energy system in architecture as a complement to other renewable energy sources.Keywords: adaptative building skin, kinetic façade, wind energy in architecture, NZEB
Procedia PDF Downloads 761404 Indexing and Incremental Approach Using Map Reduce Bipartite Graph (MRBG) for Mining Evolving Big Data
Authors: Adarsh Shroff
Abstract:
Big data is a collection of dataset so large and complex that it becomes difficult to process using data base management tools. To perform operations like search, analysis, visualization on big data by using data mining; which is the process of extraction of patterns or knowledge from large data set. In recent years, the data mining applications become stale and obsolete over time. Incremental processing is a promising approach to refreshing mining results. It utilizes previously saved states to avoid the expense of re-computation from scratch. This project uses i2MapReduce, an incremental processing extension to Map Reduce, the most widely used framework for mining big data. I2MapReduce performs key-value pair level incremental processing rather than task level re-computation, supports not only one-step computation but also more sophisticated iterative computation, which is widely used in data mining applications, and incorporates a set of novel techniques to reduce I/O overhead for accessing preserved fine-grain computation states. To optimize the mining results, evaluate i2MapReduce using a one-step algorithm and three iterative algorithms with diverse computation characteristics for efficient mining.Keywords: big data, map reduce, incremental processing, iterative computation
Procedia PDF Downloads 3501403 Internet of Things: Route Search Optimization Applying Ant Colony Algorithm and Theory of Computer Science
Authors: Tushar Bhardwaj
Abstract:
Internet of Things (IoT) possesses a dynamic network where the network nodes (mobile devices) are added and removed constantly and randomly, hence the traffic distribution in the network is quite variable and irregular. The basic but very important part in any network is route searching. We have many conventional route searching algorithms like link-state, and distance vector algorithms but they are restricted to the static point to point network topology. In this paper we propose a model that uses the Ant Colony Algorithm for route searching. It is dynamic in nature and has positive feedback mechanism that conforms to the route searching. We have also embedded the concept of Non-Deterministic Finite Automata [NDFA] minimization to reduce the network to increase the performance. Results show that Ant Colony Algorithm gives the shortest path from the source to destination node and NDFA minimization reduces the broadcasting storm effectively.Keywords: routing, ant colony algorithm, NDFA, IoT
Procedia PDF Downloads 4441402 Anomaly Detection Based Fuzzy K-Mode Clustering for Categorical Data
Authors: Murat Yazici
Abstract:
Anomalies are irregularities found in data that do not adhere to a well-defined standard of normal behavior. The identification of outliers or anomalies in data has been a subject of study within the statistics field since the 1800s. Over time, a variety of anomaly detection techniques have been developed in several research communities. The cluster analysis can be used to detect anomalies. It is the process of associating data with clusters that are as similar as possible while dissimilar clusters are associated with each other. Many of the traditional cluster algorithms have limitations in dealing with data sets containing categorical properties. To detect anomalies in categorical data, fuzzy clustering approach can be used with its advantages. The fuzzy k-Mode (FKM) clustering algorithm, which is one of the fuzzy clustering approaches, by extension to the k-means algorithm, is reported for clustering datasets with categorical values. It is a form of clustering: each point can be associated with more than one cluster. In this paper, anomaly detection is performed on two simulated data by using the FKM cluster algorithm. As a significance of the study, the FKM cluster algorithm allows to determine anomalies with their abnormality degree in contrast to numerous anomaly detection algorithms. According to the results, the FKM cluster algorithm illustrated good performance in the anomaly detection of data, including both one anomaly and more than one anomaly.Keywords: fuzzy k-mode clustering, anomaly detection, noise, categorical data
Procedia PDF Downloads 541401 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria
Authors: Egboja Simon, Agi Sunday
Abstract:
One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.Keywords: governance, security, food, development, conflict, hunger, society, sustainability
Procedia PDF Downloads 3301400 Fixing the Identity Gap in Fashion: Magazines' Role in Consumption of Clothes
Authors: Kateryna Pilyarchuk
Abstract:
A dress has, since times immemorial, been used to communicate the wearer’s identity. When a new trend is born, fashionistas buy it not only with the purpose to beautify themselves, but also to acquire the collective identity. Fashion has become a means of narrating one’s stance and status. Thus, when one spends money on a brand, one pays for some unmaterial components associated with it. This paper will present some ways in which fashion magazines promote consumerism by drawing on women’s craving for collective identity and need to fill in their identity gap by means of a purchase. By applying the method of critical discursive psychology, it will present layers of ideology and positions that become visible in framing of the message in U.S. Harper’s Bazaar. In this context, fashion decisions that are presented to its readers will be critically evaluated from the gender perspective. It will be demonstrated that what is presented as a postfeminist choice in the neoliberal society is still, to a considerable extent, oppressive and driven by the male gaze. As the findings show, the contemporary female identities in fashion are still built on the principles of traditional femininity. Magazines and fashion discourse train women that they should fear being left out of fashion and, by extension, out of the category of the sexually appealing (from the male perspective).Keywords: collective identity, critical discursive psychology, fashion discourse, identity gap
Procedia PDF Downloads 1481399 Effective Scheduling of Hybrid Reconfigurable Microgrids Considering High Penetration of Renewable Sources
Authors: Abdollah Kavousi Fard
Abstract:
This paper addresses the optimal scheduling of hybrid reconfigurable microgrids considering hybrid electric vehicle charging demands. A stochastic framework based on unscented transform to model the high uncertainties of renewable energy sources including wind turbine and photovoltaic panels, as well as the hybrid electric vehicles’ charging demand. In order to get to the optimal scheduling, the network reconfiguration is employed as an effective tool for changing the power supply path and avoiding possible congestions. The simulation results are analyzed and discussed in three different scenarios including coordinated, uncoordinated and smart charging demand of hybrid electric vehicles. A typical grid-connected microgrid is employed to show the satisfying performance of the proposed method.Keywords: microgrid, renewable energy sources, reconfiguration, optimization
Procedia PDF Downloads 2721398 Autonomous Flight Performance Improvement of Load-Carrying Unmanned Aerial Vehicles by Active Morphing
Authors: Tugrul Oktay, Mehmet Konar, Mohamed Abdallah Mohamed, Murat Aydin, Firat Sal, Murat Onay, Mustafa Soylak
Abstract:
In this paper, it is aimed to improve autonomous flight performance of a load-carrying (payload: 3 kg and total: 6kg) unmanned aerial vehicle (UAV) through active wing and horizontal tail active morphing and also integrated autopilot system parameters (i.e. P, I, D gains) and UAV parameters (i.e. extension ratios of wing and horizontal tail during flight) design. For this purpose, a loadcarrying UAV (i.e. ZANKA-II) is manufactured in Erciyes University, College of Aviation, Model Aircraft Laboratory is benefited. Optimum values of UAV parameters and autopilot parameters are obtained using a stochastic optimization method. Using this approach autonomous flight performance of UAV is substantially improved and also in some adverse weather conditions an opportunity for safe flight is satisfied. Active morphing and integrated design approach gives confidence, high performance and easy-utility request of UAV users.Keywords: unmanned aerial vehicles, morphing, autopilots, autonomous performance
Procedia PDF Downloads 6731397 Keyloggers Prevention with Time-Sensitive Obfuscation
Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
Abstract:
Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.Keywords: authentication, computer security, keylogger, privacy, information leakage
Procedia PDF Downloads 1221396 Investigation of Stellram Indexable Milling Cutter XDLT09-D41 Tool Wear for Machining of Ti6Al4V
Authors: Saad Nawaz, Yu Gang, Miao Haibin
Abstract:
Titanium alloys are attractive materials for aerospace industry due to their exceptional strength to weight ratio that is maintained at elevated temperatures and their good corrosion resistance. Major applications of titanium alloys were military aerospace industry, but since last decade the trend has now shifted towards commercial industry. On the other hand, titanium alloys are notorious for being poor thermal conductor that leads to them being difficult materials for machining. In this experimental study, Stellram Indexable milling cutter XDLT09-D41 is used for rough down milling of Ti6Al4V for small depth of cut under different combinations of parameters and application of high-pressure coolant. The machining performance was evaluated in terms of tool wear, tool life, and thermal crack. The tool wear was mostly observed at the tool tip and at bottom part of tool thermal deformations were observed which propagated with respect to time. Flank wear due to scratching of the cutting chips and diffusion wear because of high thermal stresses were observed specially at the bottom of the cutting tool. It was found that maximum tool life was obtained at the speed of 40m/min, feed rate of 358mm/min and depth of cut of 0.8mm. In the end, it was concluded that machining of Ti6Al4V is a thermally dominant process which leads to high thermal stresses in machining zone that results in increasing tool wear rate and deformation propagation.Keywords: tool wear, cutting speed, flank wear , tool life
Procedia PDF Downloads 3161395 Impact of Mindfulness on Life Satisfaction among Chinese and Pakistani Students: The Mediating Roles of Resilience and Emotional Intelligence
Authors: Maaza Saeed
Abstract:
The current study examined the mediating roles of emotional intelligence (EI) and resilience in the relationship between mindfulness and life satisfaction among Chinese and Pakistani samples. 450 participants completed the mindful attention awareness scale, resilience scale, wong law emotional intelligence scale, and satisfaction with life scale from both cultures. Path analysis revealed that both emotional intelligence (EI) and resilience fully mediated the relationship between mindfulness and life satisfaction among participants of both cultures. Besides, a multi-group evaluation suggests that Chinese participants with significant EI scores are more likely to sustain greater life satisfaction than their Pakistani counterparts. Insinuation for prospective researches and current study pitfalls are discussed.Keywords: mindfulness, life satisfaction, resilience, emotional intelligence
Procedia PDF Downloads 821394 The Consequences of Cyberbullying and School Violence: Risk and Protective Factors
Authors: Ifigenia Stylianou
Abstract:
As more than three-quarters of students going online daily via computers, tablets, and smartphones, the phenomenon of cyberbullying is growing rapidly. Knowing that victims of online bullying are often also victims of traditional bullying and that traditional bullying is considered as an extension of cyberbullying. In this study, we aim to identify (1) whether cyberbullying lead to more intense forms of school bullying, and (2) whether some biological and environmental factors mediate between this relation, and act protectively to bullying and inappropriate behaviour in school. To answer this questions, a sample of X students, aged X, were asked to complete eight questionnaires (Personal Experiences Checklist, Inventory of Peers Attachment, Questionnaire on Teacher Interaction, School Climate Survey for Bullying, Strengths and Difficulties Questionnaire, Youth Psychopathic Traits Inventory-Short Form, Barratt Impulsiveness Scale-11) in X time periods. Results can provide us important information to improve understanding the factors that are related to bullying. In addition, the results can assist in developing intervention programs to tangle the issue of bullying at schools. All data have been collected and are currently being processed for statistical analyses.Keywords: cyberbullying, bullying, school climate, psychopathy traits, attachment, mediation factors
Procedia PDF Downloads 2341393 Three-Dimensional Jet Refraction Simulation Using a Gradient Term Suppression and Filtering Method
Authors: Lican Wang, Rongqian Chen, Yancheng You, Ruofan Qiu
Abstract:
In the applications of jet engine, open-jet wind tunnel and airframe, there wildly exists a shear layer formed by the velocity and temperature gradients between jet flow and surrounded medium. The presence of shear layer will refract and reflect the sound path that consequently influences the measurement results in far-field. To investigate and evaluate the shear layer effect, a gradient term suppression and filtering method is adopted to simulate sound propagation through a steady sheared flow in three dimensions. Two typical configurations are considered: one is an incompressible and cold jet flow in wind tunnel and the other is a compressible and hot jet flow in turbofan engine. A numerically linear microphone array is used to localize the position of given sound source. The localization error is presented and linearly fitted.Keywords: aeroacoustic, linearized Euler equation, acoustic propagation, source localization
Procedia PDF Downloads 2031392 Bag of Words Representation Based on Fusing Two Color Local Descriptors and Building Multiple Dictionaries
Authors: Fatma Abdedayem
Abstract:
We propose an extension to the famous method called Bag of words (BOW) which proved a successful role in the field of image categorization. Practically, this method based on representing image with visual words. In this work, firstly, we extract features from images using Spatial Pyramid Representation (SPR) and two dissimilar color descriptors which are opponent-SIFT and transformed-color-SIFT. Secondly, we fuse color local features by joining the two histograms coming from these descriptors. Thirdly, after collecting of all features, we generate multi-dictionaries coming from n random feature subsets that obtained by dividing all features into n random groups. Then, by using these dictionaries separately each image can be represented by n histograms which are lately concatenated horizontally and form the final histogram, that allows to combine Multiple Dictionaries (MDBoW). In the final step, in order to classify image we have applied Support Vector Machine (SVM) on the generated histograms. Experimentally, we have used two dissimilar image datasets in order to test our proposition: Caltech 256 and PASCAL VOC 2007.Keywords: bag of words (BOW), color descriptors, multi-dictionaries, MDBoW
Procedia PDF Downloads 2971391 Design and Implementation of a Monitoring System Using Arduino and MATLAB
Authors: Jonas P. Reges, Jessyca A. Bessa, Auzuir R. Alexandria
Abstract:
The research came up with the need of monitoring them of temperature and relative moisture in past work that enveloped the study of a greenhouse located in the Research and Extension Unit(UEPE). This research brought several unknowns that were resolved from bibliographical research. Based on the studies performed were found some monitoring methods, including the serial communication between the arduino and matlab which showed a great option due to the low cost. The project was conducted in two stages, the first, an algorithm was developed to the Arduino and Matlab, and second, the circuits were assembled and performed the monitoring tests the following variables: moisture, temperature, and distance. During testing it was possible to momentarily observe the change in the levels of monitored variables. The project showed satisfactory results, such as: real-time verification of the change of state variables, the low cost of acquisition of the prototype, possibility of easy change of programming for the execution of monitoring of other variables. Therefore, the project showed the possibility of monitoring through software and hardware that have easy programming and can be used in several areas. However, it is observed also the possibility of improving the project from a remote monitoring via Bluetooth or web server and through the control of monitored variables.Keywords: automation, monitoring, programming, arduino, matlab
Procedia PDF Downloads 5151390 Studying Methodological Maps on the Engineering Education Program
Authors: Elsaed Elsaed
Abstract:
With the constant progress in our daily lives through information and communication technology and the presence of abundant in research activities in the hardware and software associated with them, and develop and improve their performance, but still there is a need to provide all combined solutions in one business. A systematic mapping study was conducted to investigate the contributions that have been prepared, and the areas of knowledge that are explored further, and any aspects of the research used to divide the common understanding of the latest technology in software engineering education. Which, we have categorized into a well-defined engineering framework. An overview of current research topics and trends and their distribution by type of research and scope of application. In addition, the topics were grouped into groups and a list of proposed methods and frameworks and tools was used. The map shows that the current research impact is limited to a few areas of knowledge are needed to map a future path to fill the gaps in the instruction activities.Keywords: methodological maps, engineering education program, literature survey, communication technology
Procedia PDF Downloads 1401389 Fresh State Properties of Steel Fiber Reinforced Self Compacting Concrete
Authors: Anil Nis, Nilufer Ozyurt Zihnioglu
Abstract:
The object of the study is to investigate fresh state properties of the steel fiber reinforced self-compacting concrete (SFR-SCC). Three different steel fibers; straight (Vf:0.5%), hooked-end long (Vf:0.5% and 1%) and hybrid fibers (0.5%short+0.5%long) were used in the research aiming to obtain flow properties of non-fibrous self-compacting concrete. Fly ash was used as a supplementary with an optimum dosage of 30% of the total cementitious materials. Polycarboxylic ether based high-performance concrete superplasticizer was used to get high flowability with percentages ranging from 0.81% (non-fibrous SCC) to 1.07% (hybrid SF-SCC) of the cement weight. The flowability properties of SCCs were measured via slump flow and V-funnel tests; passing ability properties of SCCs were measured with J-Ring, L-Box, and U-Box tests. Workability results indicate that small increase on the superplasticizer dosages compensate the adverse effects of steel fibers on flowability properties of SSC. However, higher dosage fiber addition has a negative effect on passing ability properties, causing blocking of the mixes. In addition, compressive strength, tensile strength, and four point bending results were given. Results indicate that SCCs including steel fibers have superior performances on tensile and bending strength of concrete. Crack bridging capability of steel fibers prevents concrete from splitting, yields higher deformation and energy absorption capacities than non-fibrous SCCs.Keywords: fiber reinforced self-compacting concrete, fly ash, fresh state properties, steel fiber
Procedia PDF Downloads 2231388 Investigating Causes of Pavement Deterioration in Khartoum State, Sudan
Authors: Magdi Mohamed Eltayeb Zumrawi
Abstract:
It is quite essential to investigate the causes of pavement deterioration in order to select the proper maintenance technique. The objective of this study was to identify factors cause deterioration of recently constructed roads in Khartoum state. A comprehensive literature concerning the factors of road deterioration, common road defects and their causes were reviewed. Three major road projects with different deterioration reasons were selected for this study. The investigation involved field survey and laboratory testing on those projects to examine the existing pavement conditions. The results revealed that the roads investigated experienced severe failures in the forms of cracks, potholes and rutting in the wheel path. The causes of those failures were found mainly linked to poor drainage, traffic overloading, expansive subgrade soils and the use of low quality materials in construction. Based on the results, recommendations were provided to help highway engineers in selecting the most effective repair techniques for specific kinds of distresses.Keywords: pavement, deterioration, causes, failures
Procedia PDF Downloads 3541387 Explicit Iterative Scheme for Approximating a Common Solution of Generalized Mixed Equilibrium Problem and Fixed Point Problem for a Nonexpansive Semigroup in Hilbert Space
Authors: Mohammad Farid
Abstract:
In this paper, we introduce and study an explicit iterative method based on hybrid extragradient method to approximate a common solution of generalized mixed equilibrium problem and fixed point problem for a nonexpansive semigroup in Hilbert space. Further, we prove that the sequence generated by the proposed iterative scheme converge strongly to the common solution of generalized mixed equilibrium problem and fixed point problem for a nonexpansive semigroup. This common solution is the unique solution of a variational inequality problem and is the optimality condition for a minimization problem. The results presented in this paper are the supplement, extension and generalization of the previously known results in this area.Keywords: generalized mixed equilibrium problem, fixed-point problem, nonexpansive semigroup, variational inequality problem, iterative algorithms, hybrid extragradient method
Procedia PDF Downloads 4751386 Unpowered Knee Exoskeleton with Compliant Joints for Stair Descent Assistance
Authors: Pengfan Wu, Xiaoan Chen, Ye He, Tianchi Chen
Abstract:
This paper introduces the design of an unpowered knee exoskeleton to assist human walking by redistributing the moment of the knee joint during stair descent (SD). Considering the knee moment varying with the knee joint angle and the work of the knee joint is all negative, the custom-built spring was used to convert negative work into the potential energy of the spring during flexion, and the obtained energy work as assistance during extension to reduce the consumption of lower limb muscles. The human-machine adaptability problem was left by traditional rigid wearable due to the knee involves sliding and rotating without a fixed-axis rotation, and this paper designed the two-direction grooves to follow the human-knee kinematics, and the wire spring provides a certain resistance to the pin in the groove to prevent extra degrees of freedom. The experiment was performed on a normal stair by healthy young wearing the device on both legs with the surface electromyography recorded. The results show that the quadriceps (knee extensor) were reduced significantly.Keywords: unpowered exoskeleton, stair descent, knee compliant joint, energy redistribution
Procedia PDF Downloads 1251385 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 3981384 An Exposition of Principles of Islamic Fiscal Policy
Authors: Muhammad A. Ishaq, S. U. R. Aliyu
Abstract:
This paper on an exposition of Islamic fiscal policy attempts to discuss the basic principles of Islamic fiscal policy in an Islamic economy. The paper presents a number of definitions of the subject matter, its nature and its tools of application. Government spending, taxation and public borrowings were identified as the tools of the policy. The paper identifies zakat both as a veritable source of revenue and a major instrument of economic stabilization. Furthermore, the paper presents an algebraic 2-sector and 3-sector models from the basic Keynesian model. The paper posits that in view of uniqueness of its instruments, absence of interest rate in the economy and the policy’s derive towards socioeconomic justice and redistribution, Islamic fiscal policy is capable of stabilizing Islamic economy and ushering it into the path of long term economic growth and prosperity.Keywords: automatic built-in-stabilizers, government spending, Islamic fiscal policy, taxation, zakat
Procedia PDF Downloads 3391383 Generalized Approach to Linear Data Transformation
Authors: Abhijith Asok
Abstract:
This paper presents a generalized approach for the simple linear data transformation, Y=bX, through an integration of multidimensional coordinate geometry, vector space theory and polygonal geometry. The scaling is performed by adding an additional ’Dummy Dimension’ to the n-dimensional data, which helps plot two dimensional component-wise straight lines on pairs of dimensions. The end result is a set of scaled extensions of observations in any of the 2n spatial divisions, where n is the total number of applicable dimensions/dataset variables, created by shifting the n-dimensional plane along the ’Dummy Axis’. The derived scaling factor was found to be dependent on the coordinates of the common point of origin for diverging straight lines and the plane of extension, chosen on and perpendicular to the ’Dummy Axis’, respectively. This result indicates the geometrical interpretation of a linear data transformation and hence, opportunities for a more informed choice of the factor ’b’, based on a better choice of these coordinate values. The paper follows on to identify the effect of this transformation on certain popular distance metrics, wherein for many, the distance metric retained the same scaling factor as that of the features.Keywords: data transformation, dummy dimension, linear transformation, scaling
Procedia PDF Downloads 2971382 Simulation of Glass Breakage Using Voronoi Random Field Tessellations
Authors: Michael A. Kraus, Navid Pourmoghaddam, Martin Botz, Jens Schneider, Geralt Siebert
Abstract:
Fragmentation analysis of tempered glass gives insight into the quality of the tempering process and defines a certain degree of safety as well. Different standard such as the European EN 12150-1 or the American ASTM C 1048/CPSC 16 CFR 1201 define a minimum number of fragments required for soda-lime safety glass on the basis of fragmentation test results for classification. This work presents an approach for the glass breakage pattern prediction using a Voronoi Tesselation over Random Fields. The random Voronoi tessellation is trained with and validated against data from several breakage patterns. The fragments in observation areas of 50 mm x 50 mm were used for training and validation. All glass specimen used in this study were commercially available soda-lime glasses at three different thicknesses levels of 4 mm, 8 mm and 12 mm. The results of this work form a Bayesian framework for the training and prediction of breakage patterns of tempered soda-lime glass using a Voronoi Random Field Tesselation. Uncertainties occurring in this process can be well quantified, and several statistical measures of the pattern can be preservation with this method. Within this work it was found, that different Random Fields as basis for the Voronoi Tesselation lead to differently well fitted statistical properties of the glass breakage patterns. As the methodology is derived and kept general, the framework could be also applied to other random tesselations and crack pattern modelling purposes.Keywords: glass breakage predicition, Voronoi Random Field Tessellation, fragmentation analysis, Bayesian parameter identification
Procedia PDF Downloads 160