Search results for: rectangular embedded foundations
722 Morphometry of Cervical Spinal Cord in Rabbit Using Design-Based Stereology
Authors: Hamed Chavoshi Pour, Javad Sadeghinejad
Abstract:
The spinal cord is a long structure that starts at the end of the medulla oblongata and is located within the vertebral canal. Physiologically, the spinal cord connects the brain with the peripheral nervous system for sensory and motor activities. The cervical spinal cord is an area of particular interest in medicine and veterinary medicine due to the high prevalence of diseases in this region. This study describes the morphometric features of the cervical spinal cord in rabbits using design-unbiased stereology. The cervical spinal cords of five male rabbits were dissected, and slabs were taken according to systematic uniform random sampling. Each slab was embedded in paraffin and cut into a 6-µm thick section, and stained with cresyl violet 0.1% for stereological estimations. The total spinal cord volume, volume fraction of grey and white matter, and also dorsal and ventral horns were estimated using point counting and Cavalieri's estimator. The total cervical spinal cord volume was 0.98 ± 0.07 cm³. The relative volume of white matter and grey matter was 70.6 ± 1.7% and 29.31 ± 1.67%, respectively. The dorsal horn and ventral horn volume were 13.86 ± 1.36% and 14.9 ± 0.62% of the whole cervical spinal cord. This knowledge of rabbit spinal cord findings may serve as a foundation for a translational model in spinal cord experimental research and provide basic findings for the diagnosis and treatment of spinal cord disorders.Keywords: stereology, spinal cord, rabbit, cervical
Procedia PDF Downloads 76721 Molecular Dynamics Simulation for Buckling Analysis at Nanocomposite Beams
Authors: Babak Safaei, A. M. Fattahi
Abstract:
In the present study we have investigated axial buckling characteristics of nanocomposite beams reinforced by single-walled carbon nanotubes (SWCNTs). Various types of beam theories including Euler-Bernoulli beam theory, Timoshenko beam theory and Reddy beam theory were used to analyze the buckling behavior of carbon nanotube-reinforced composite beams. Generalized differential quadrature (GDQ) method was utilized to discretize the governing differential equations along with four commonly used boundary conditions. The material properties of the nanocomposite beams were obtained using molecular dynamic (MD) simulation corresponding to both short-(10,10) SWCNT and long-(10,10) SWCNT composites which were embedded by amorphous polyethylene matrix. Then the results obtained directly from MD simulations were matched with those calculated by the mixture rule to extract appropriate values of carbon nanotube efficiency parameters accounting for the scale-dependent material properties. The selected numerical results were presented to indicate the influences of nanotube volume fractions and end supports on the critical axial buckling loads of nanocomposite beams relevant to long- and short-nanotube composites.Keywords: nanocomposites, molecular dynamics simulation, axial buckling, generalized differential quadrature (GDQ)
Procedia PDF Downloads 325720 Comparison of Steel and Composite Analysis of a Multi-Storey Building
Authors: Çiğdem Avcı Karataş
Abstract:
Mitigation of structural damage caused by earthquake and reduction of fatality is one of the main concerns of engineers in seismic prone zones of the world. To achieve this aim many technologies have been developed in the last decades and applied in construction and retrofit of structures. On the one hand Turkey is well-known a country of high level of seismicity; on the other hand steel-composite structures appear competitive today in this country by comparison with other types of structures, for example only-steel or concrete structures. Composite construction is the dominant form of construction for the multi-storey building sector. The reason why composite construction is often so good can be expressed in one simple way - concrete is good in compression and steel is good in tension. By joining the two materials together structurally these strengths can be exploited to result in a highly efficient design. The reduced self-weight of composite elements has a knock-on effect by reducing the forces in those elements supporting them, including the foundations. The floor depth reductions that can be achieved using composite construction can also provide significant benefits in terms of the costs of services and the building envelope. The scope of this paper covers analysis, materials take-off, cost analysis and economic comparisons of a multi-storey building with composite and steel frames. The aim of this work is to show that designing load carrying systems as composite is more economical than designing as steel. Design of the nine stories building which is under consideration is done according to the regulation of the 2007, Turkish Earthquake Code and by using static and dynamic analysis methods. For the analyses of the steel and composite systems, plastic analysis methods have been used and whereas steel system analyses have been checked in compliance with EC3 and composite system analyses have been checked in compliance with EC4. At the end of the comparisons, it is revealed that composite load carrying systems analysis is more economical than the steel load carrying systems analysis considering the materials to be used in the load carrying system and the workmanship to be spent for this job.Keywords: composite analysis, earthquake, steel, multi-storey building
Procedia PDF Downloads 571719 A Graph-Based Retrieval Model for Passage Search
Authors: Junjie Zhong, Kai Hong, Lei Wang
Abstract:
Passage Retrieval (PR) plays an important role in many Natural Language Processing (NLP) tasks. Traditional efficient retrieval models relying on exact term-matching, such as TF-IDF or BM25, have nowadays been exceeded by pre-trained language models which match by semantics. Though they gain effectiveness, deep language models often require large memory as well as time cost. To tackle the trade-off between efficiency and effectiveness in PR, this paper proposes Graph Passage Retriever (GraphPR), a graph-based model inspired by the development of graph learning techniques. Different from existing works, GraphPR is end-to-end and integrates both term-matching information and semantics. GraphPR constructs a passage-level graph from BM25 retrieval results and trains a GCN-like model on the graph with graph-based objectives. Passages were regarded as nodes in the constructed graph and were embedded in dense vectors. PR can then be implemented using embeddings and a fast vector-similarity search. Experiments on a variety of real-world retrieval datasets show that the proposed model outperforms related models in several evaluation metrics (e.g., mean reciprocal rank, accuracy, F1-scores) while maintaining a relatively low query latency and memory usage.Keywords: efficiency, effectiveness, graph learning, language model, passage retrieval, term-matching model
Procedia PDF Downloads 148718 Microfluidic Chambers with Fluid Walls for Cell Biology
Authors: Cristian Soitu, Alexander Feuerborn, Cyril Deroy, Alfonso Castrejon-Pita, Peter R. Cook, Edmond J. Walsh
Abstract:
Microfluidics now stands as an academically mature technology after a quarter of a century research activities have delivered a vast array of proof of concepts for many biological workflows. However, translation to industry remains poor, with only a handful of notable exceptions – e.g. digital PCR, DNA sequencing – mainly because of biocompatibility issues, limited range of readouts supported or complex operation required. This technology exploits the domination of interfacial forces over gravitational ones at the microscale, replacing solid walls with fluid ones as building blocks for cell micro-environments. By employing only materials used by biologists for decades, the system is shown to be biocompatible, and easy to manufacture and operate. The method consists in displacing a continuous fluid layer into a pattern of isolated chambers overlaid with an immiscible liquid to prevent evaporation. The resulting fluid arrangements can be arrays of micro-chambers with rectangular footprint, which use the maximum surface area available, or structures with irregular patterns. Pliant, self-healing fluid walls confine volumes as small as 1 nl. Such fluidic structures can be reconfigured during the assays, giving the platform an unprecedented level of flexibility. Common workflows in cell biology are demonstrated – e.g. cell growth and retrieval, cloning, cryopreservation, fixation and immunolabeling, CRISPR-Cas9 gene editing, and proof-of-concept drug tests. This fluid-shaping technology is shown to have potential for high-throughput cell- and organism-based assays. The ability to make and reconfigure on-demand microfluidic circuits on standard Petri dishes should find many applications in biology, and yield more relevant phenotypic and genotypic responses when compared to standard microfluidic assays.Keywords: fluid walls, micro-chambers, reconfigurable, freestyle
Procedia PDF Downloads 193717 Simulation of Turbulent Flow in Channel Using Generalized Hydrodynamic Equations
Authors: Alex Fedoseyev
Abstract:
This study explores Generalized Hydrodynamic Equations (GHE) for the simulation of turbulent flows. The GHE was derived from the Generalized Boltzmann Equation (GBE) by Alexeev (1994). GBE was obtained by first principles from the chain of Bogolubov kinetic equations and considered particles of finite dimensions, Alexeev (1994). The GHE has new terms, temporal and spatial fluctuations compared to the Navier-Stokes equations (NSE). These new terms have a timescale multiplier τ, and the GHE becomes the NSE when τ is zero. The nondimensional τ is a product of the Reynolds number and the squared length scale ratio, τ=Re*(l/L)², where l is the apparent Kolmogorov length scale, and L is a hydrodynamic length scale. The turbulence phenomenon is not well understood and is not described by NSE. An additional one or two equations are required for the turbulence model, which may have to be tuned for specific problems. We show that, in the case of the GHE, no additional turbulence model is needed, and the turbulent velocity profile is obtained from the GHE. The 2D turbulent channel and circular pipe flows were investigated using a numerical solution of the GHE for several cases. The solutions are compared with the experimental data in the circular pipes and 2D channels by Nicuradse (1932, Prandtl Lab), Hussain and Reynolds (1975), Wei and Willmarth (1989), Van Doorne (2007), theory by Wosnik, Castillo and George (2000), and the relevant experiments on Superpipe setup at Princeton, data by Zagarola (1996) and Zagarola and Smits (1998), the Reynolds number is from Re=7200 to Re=960000. The numerical solution data compared well with the experimental data, as well as with the approximate analytical solution for turbulent flow in channel Fedoseyev (2023). The obtained results confirm that the Alexeev generalized hydrodynamic theory (GHE) is in good agreement with the experiments for turbulent flows. The proposed approach is limited to 2D and 3D axisymmetric channel geometries. Further work will extend this approach by including channels with square and rectangular cross-sections.Keywords: comparison with experimental data. generalized hydrodynamic equations, numerical solution, turbulent boundary layer, turbulent flow in channel
Procedia PDF Downloads 65716 Botswana and Nation-Building Theory
Authors: Rowland Brucken
Abstract:
This paper argues that nation-building theories that prioritize democratic governance best explain the successful post-independence development of Botswana. Three main competing schools of thought exist regarding the sequencing of policies that should occur to re-build weakened or failed states. The first posits that economic development should receive foremost attention, while democratization and a binding sense of nationalism can wait. A second group of experts identified constructing a sense of nationalism among a populace is necessary first, so that the state receives popular legitimacy and obedience that are prerequisites for development. Botswana, though, transitioned into a multi-party democracy and prosperous open economy due to the utilization of traditional democratic structures, enlightened and accountable leadership, and an educated technocratic civil service. With these political foundations already in place when the discovery of diamonds occurred, the resulting revenues were spent wisely on projects that grew the economy, improved basic living standards, and attracted foreign investment. Thus democratization preceded, and therefore provided an accountable basis for, economic development that might otherwise have been squandered by greedy and isolated elites to the detriment of the greater population. Botswana was one of the poorest nations in the world at the time of its independence in 1966, with little infrastructure, a dependence on apartheid South Africa for trade, and a largely subsistence economy. Over the next thirty years, though, its economy grew the fastest of any nation in the world. The transparent and judicious use of diamond returns is only a partial explanation, as the government also pursued economic diversification, mass education, and rural development in response to public needs. As nation-building has become a project undertaken by nations and multilateral agencies such as the United Nations and the North Atlantic Treaty Organization, Botswana may provide best practices that others should follow in attempting to reconstruct economically and politically unstable states.Keywords: Botswana, democratization, economic development, nation-building
Procedia PDF Downloads 507715 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 266714 Smart Demand Response: A South African Pragmatic, Non-Destructive and Alternative Advanced Metering Infrastructure-Based Maximum Demand Reduction Methodology
Authors: Christo Nicholls
Abstract:
The National Electricity Grid (NEG) in South Africa has been under strain for the last five years. This overburden of the NEG led Eskom (the State-Owned Entity responsible for the NEG) to implement a blunt methodology to assist them in reducing the maximum demand (MD) on the NEG, when required, called Loadshedding. The challenge of this methodology is that not only does it lead to immense technical issues with the distribution network equipment, e.g., transformers, due to the frequent abrupt off and on switching, it also has a broader negative fiscal impact on the distributors, as their key consumers (commercial & industrial) are now grid defecting due to the lack of Electricity Security Provision (ESP). This paper provides a pragmatic alternative methodology utilizing specific functionalities embedded within direct-connect single and three-phase Advanced Meter Infrastructure (AMI) Solutions deployed within the distribution network, in conjunction with a Multi-Agent Systems Based AI implementation focused on Automated Negotiation Peer-2-Peer trading. The results of this research clearly illustrate, not only does methodology provide a factual percentage contribution towards the NEG MD at the point of consideration, it also allows the distributor to leverage the real-time MD data from key consumers to activate complex, yet impact-measurable Demand Response (DR) programs.Keywords: AI, AMI, demand response, multi-agent
Procedia PDF Downloads 112713 Enhanced Test Scheme based on Programmable Write Time for Future Computer Memories
Authors: Nor Zaidi Haron, Fauziyah Salehuddin, Norsuhaidah Arshad, Sani Irwan Salim
Abstract:
Resistive random access memories (RRAMs) are one of the main candidates for future computer memories. However, due to their tiny size and immature device technology, the quality of the outgoing RRAM chips is seen as a serious issue. Defective RRAM cells might behave differently than existing semiconductor memories (Dynamic RAM, Static RAM, and Flash), meaning that they are difficult to be detected using existing test schemes. This paper presents an enhanced test scheme, referred to as Programmable Short Write Time (PSWT) that is able to improve the detection of faulty RRAM cells. It is developed by applying multiple weak write operations, each with different time durations. The test circuit embedded in the RRAM chip is made programmable in order to supply different weak write times during testing. The RRAM electrical model is described using Verilog-AMS language and is simulated using HSPICE simulation tools. Simulation results show that the proposed test scheme offers better open-resistive fault detection compared to existing test schemes.Keywords: memory fault, memory test, design-for-testability, resistive random access memory
Procedia PDF Downloads 387712 Development the Sensor Lock Knee Joint and Evaluation of Its Effect on Walking and Energy Consumption in Subjects With Quadriceps Weakness
Authors: Mokhtar Arazpour
Abstract:
Objectives: Recently a new kind of stance control knee joint has been developed called the 'sensor lock.' This study aimed to develop and evaluate 'sensor lock', which could potentially solve the problems of walking parameters and gait symmetry in subjects with quadriceps weakness. Methods: Nine subjects with quadriceps weakness were enrolled in this study. A custom-made knee ankle foot orthosis (KAFO) with the same set of components was constructed for each participant. Testing began after orthotic gait training was completed with each of the KAFOs and subjects demonstrated that they could safely walk with crutches. Subjects rested 30 minutes between each trial. The 10 meters walking test is used to assess walking speed in meters/second (m/s). The total time taken to ambulate 6 meters (m) is recorded to the nearest hundredth of a second. 6 m is then divided by the total time (in seconds) taken to ambulate and recorded in m/s. The 6 Minutes Walking Test was used to assess walking endurance in this study. Participants walked around the perimeter of a set circuit for a total of six minutes. To evaluate Physiological cost index (PCI), the subjects were asked to walk using each type of KAFOs along a pre-determined 40 m rectangular walkway at their comfortable self-selected speed. A stopwatch was used to calculate the speed of walking by measuring the time between starting and stopping time and the distance walked. Results: The use of a KAFO fitted with the “sensor lock” knee joint resulted in improvements to walking speed, distance walked and physiological cost index when compared with the knee joint in lock mode. Conclusions: This study demonstrated that the use of a KAFO with the “sensor lock” knee joint could provide significant benefits for subjects with a quadriceps weakness when compared to a KAFO with the knee joint in lock mode.Keywords: stance control knee joint, knee ankle foot orthosis, quadriceps weakness, walking, energy consumption
Procedia PDF Downloads 125711 Compact 3-D Co-Planar Waveguide Fed Dual-Port Ultrawideband-Multiple-Input and Multiple-Output Antenna with WLAN Band-Notched Characteristics
Authors: Asim Quddus
Abstract:
A miniaturized three dimensional co-planar waveguide (CPW) two-port MIMO antenna, exhibiting high isolation and WLAN band-notched characteristics is presented in this paper for ultrawideband (UWB) communication applications. The microstrip patch antenna operates as a single UWB antenna element. The proposed design is a cuboid-shaped structure having compact size of 35 x 27 x 45 mm³. Radiating as well as decoupling structure is placed around cuboidal polystyrene sheet. The radiators are 27 mm apart, placed Face-to-Face in vertical direction. Decoupling structure is placed on the side walls of polystyrene. The proposed antenna consists of an oval shaped radiating patch. A rectangular structure with fillet edges is placed on ground plan to enhance the bandwidth. The proposed antenna exhibits a good impedance match (S11 ≤ -10 dB) over frequency band of 2 GHz – 10.6 GHz. A circular slotted structure is employed as a decoupling structure on substrate, and it is placed on the side walls of polystyrene to enhance the isolation between antenna elements. Moreover, to achieve immunity from WLAN band distortion, a modified, inverted crescent shaped slotted structure is etched on radiating patches to achieve band-rejection characteristics at WLAN frequency band 4.8 GHz – 5.2 GHz. The suggested decoupling structure provides isolation better than 15 dB over the desired UWB spectrum. The envelope correlation coefficient (ECC) and gain for the MIMO antenna are analyzed as well. Finite Element Method (FEM) simulations are carried out in Ansys High Frequency Structural Simulator (HFSS) for the proposed design. The antenna is realized on a Rogers RT/duroid 5880 with thickness 1 mm, relative permittivity ɛr = 2.2. The proposed antenna achieves a stable omni-directional radiation patterns as well, while providing rejection at desired WLAN band. The S-parameters as well as MIMO parameters like ECC are analyzed and the results show conclusively that the design is suitable for portable MIMO-UWB applications.Keywords: 3-D antenna, band-notch, MIMO, UWB
Procedia PDF Downloads 296710 A Generalization of Planar Pascal’s Triangle to Polynomial Expansion and Connection with Sierpinski Patterns
Authors: Wajdi Mohamed Ratemi
Abstract:
The very well-known stacked sets of numbers referred to as Pascal’s triangle present the coefficients of the binomial expansion of the form (x+y)n. This paper presents an approach (the Staircase Horizontal Vertical, SHV-method) to the generalization of planar Pascal’s triangle for polynomial expansion of the form (x+y+z+w+r+⋯)n. The presented generalization of Pascal’s triangle is different from other generalizations of Pascal’s triangles given in the literature. The coefficients of the generalized Pascal’s triangles, presented in this work, are generated by inspection, using embedded Pascal’s triangles. The coefficients of I-variables expansion are generated by horizontally laying out the Pascal’s elements of (I-1) variables expansion, in a staircase manner, and multiplying them with the relevant columns of vertically laid out classical Pascal’s elements, hence avoiding factorial calculations for generating the coefficients of the polynomial expansion. Furthermore, the classical Pascal’s triangle has some pattern built into it regarding its odd and even numbers. Such pattern is known as the Sierpinski’s triangle. In this study, a presentation of Sierpinski-like patterns of the generalized Pascal’s triangles is given. Applications related to those coefficients of the binomial expansion (Pascal’s triangle), or polynomial expansion (generalized Pascal’s triangles) can be in areas of combinatorics, and probabilities.Keywords: pascal’s triangle, generalized pascal’s triangle, polynomial expansion, sierpinski’s triangle, combinatorics, probabilities
Procedia PDF Downloads 367709 Influence of the 3D Printing Parameters on the Dynamic Characteristics of Composite Structures
Authors: Ali Raza, Rūta Rimašauskienė
Abstract:
In the current work, the fused deposition modelling (FDM) technique is used to manufacture PLA reinforced with carbon fibre composite structures with two unique layer patterns, 0°\0° and 0°\90°. The purpose of the study is to investigate the dynamic characteristics of each fabricated composite structure. The Macro Fiber Composite (MFC) is embedded with 0°/0° and 0°/90° structures to investigate the effect of an MFC (M8507-P2 type) patch on vibration amplitude suppression under dynamic loading circumstances. First, modal analysis testing was performed using a Polytec 3D laser vibrometer to identify bending mode shapes, natural frequencies, and vibration amplitudes at the corresponding natural frequencies. To determine the stiffness of each structure, several loads were applied at the free end of the structure, and the deformation was recorded using a laser displacement sensor. The findings confirm that a structure with 0°\0° layers pattern was found to have more stiffness compared to a 0°\90° structure. The maximum amplitude suppression in each structure was measured using a laser displacement sensor at the first resonant frequency when the control voltage signal with optimal phase was applied to the MFC. The results confirm that the 0°/0° pattern's structure exhibits a higher displacement reduction than the 0°/90° pattern. Moreover, stiffer structures have been found to perform amplitude suppression more effectively.Keywords: carbon fibre composite, MFC, modal analysis stiffness, stiffness
Procedia PDF Downloads 63708 Thermophoresis Particle Precipitate on Heated Surfaces
Authors: Rebhi A. Damseh, H. M. Duwairi, Benbella A. Shannak
Abstract:
This work deals with heat and mass transfer by steady laminar boundary layer flow of a Newtonian, viscous fluid over a vertical flat plate with variable surface heat flux embedded in a fluid saturated porous medium in the presence of thermophoresis particle deposition effect. The governing partial differential equations are transformed into no-similar form by using special transformation and solved numerically by using an implicit finite difference method. Many results are obtained and a representative set is displaced graphically to illustrate the influence of the various physical parameters on the wall thermophoresis deposition velocity and concentration profiles. It is found that the increasing of thermophoresis constant or temperature differences enhances heat transfer rates from vertical surfaces and increase wall thermophoresis velocities; this is due to favourable temperature gradients or buoyancy forces. It is also found that the effect of thermophoresis phenomena is more pronounced near pure natural convection heat transfer limit; because this phenomenon is directly a temperature gradient or buoyancy forces dependent. Comparisons with previously published work in the limits are performed and the results are found to be in excellent agreement.Keywords: thermophoresis, porous medium, variable surface heat flux, heat transfer
Procedia PDF Downloads 202707 Influence of Cathodic Protection on High Strength, Pre-Stressed Corroded Tendons
Authors: Ibrahim R. Elomari, Fin O'Flaherty, Ibrahim R. Elomari, Paul Lambert
Abstract:
Cathodic protection (CP) is a technique commonly used to arrest corrosion of steel in infrastructure. However, it is not generally used on high strength, pre-stressed tendons due to the risk of hydrogen generation, leading to possible embrittlement. This paper investigates its use in such circumstances where the applied protection potential is varied to determine if CP can be safely employed on pre-stressed tendons. Plain steel tendons measuring 5.4 mm diameter were pre-stressed in timber moulds and embedded in sand/cement mortar, formulated to represent gunite. Two levels of pre-stressing were investigated (400MPa and 1200MPa). Pre-corrosion of 0% (control), 3% and 6% target loss of cross-sectional area was applied to replicate service conditions. Impressed current cathodic protection (ICCP) was then applied to the tendons at two levels of potential to identify any effect on strength. Instant-off values up to -950mV were used for normal protection with values of -1100mV or more negative to achieve overprotection. Following the ICCP phase, the tendons were removed from the mortar, cleaned and weighed to confirm actual percentage of corrosion. Tensile tests were then conducted on the tendons. The preliminary results show the influence of normal levels and overprotection of CP on the ultimate strength of the tendons.Keywords: pre-stressed concrete, corrosion, cathodic protection, hydrogen embrittlement
Procedia PDF Downloads 266706 Prediction of Phonon Thermal Conductivity of F.C.C. Al by Molecular Dynamics Simulation
Authors: Leila Momenzadeh, Alexander V. Evteev, Elena V. Levchenko, Tanvir Ahmed, Irina Belova, Graeme Murch
Abstract:
In this work, the phonon thermal conductivity of f.c.c. Al is investigated in detail in the temperature range 100 – 900 K within the framework of equilibrium molecular dynamics simulations making use of the Green-Kubo formalism and one of the most reliable embedded-atom method potentials. It is found that the heat current auto-correlation function of the f.c.c. Al model demonstrates a two-stage temporal decay similar to the previously observed for f.c.c Cu model. After the first stage of decay, the heat current auto-correlation function of the f.c.c. Al model demonstrates a peak in the temperature range 100-800 K. The intensity of the peak decreases as the temperature increases. At 900 K, it transforms to a shoulder. To describe the observed two-stage decay of the heat current auto-correlation function of the f.c.c. Al model, we employ decomposition model recently developed for phonon-mediated thermal transport in a monoatomic lattice. We found that the electronic contribution to the total thermal conductivity of f.c.c. Al dominates over the whole studied temperature range. However, the phonon contribution to the total thermal conductivity of f.c.c. Al increases as temperature decreases. It is about 1.05% at 900 K and about 12.5% at 100 K.Keywords: aluminum, gGreen-Kubo formalism, molecular dynamics, phonon thermal conductivity
Procedia PDF Downloads 413705 Modeling Bessel Beams and Their Discrete Superpositions from the Generalized Lorenz-Mie Theory to Calculate Optical Forces over Spherical Dielectric Particles
Authors: Leonardo A. Ambrosio, Carlos. H. Silva Santos, Ivan E. L. Rodrigues, Ayumi K. de Campos, Leandro A. Machado
Abstract:
In this work, we propose an algorithm developed under Python language for the modeling of ordinary scalar Bessel beams and their discrete superpositions and subsequent calculation of optical forces exerted over dielectric spherical particles. The mathematical formalism, based on the generalized Lorenz-Mie theory, is implemented in Python for its large number of free mathematical (as SciPy and NumPy), data visualization (Matplotlib and PyJamas) and multiprocessing libraries. We also propose an approach, provided by a synchronized Software as Service (SaaS) in cloud computing, to develop a user interface embedded on a mobile application, thus providing users with the necessary means to easily introduce desired unknowns and parameters and see the graphical outcomes of the simulations right at their mobile devices. Initially proposed as a free Android-based application, such an App enables data post-processing in cloud-based architectures and visualization of results, figures and numerical tables.Keywords: Bessel Beams and Frozen Waves, Generalized Lorenz-Mie Theory, Numerical Methods, optical forces
Procedia PDF Downloads 380704 Analysis of Natural Convection within a Hexagonal Enclosure Full with Nanofluid (Water-Cu) Under Effect of the Position of the Inner Obstacle
Authors: Lakhdar Rahmani, Benhanifia Kada, Brahim Mebarki
Abstract:
The present paper aims to investigate the natural convection of nanofluid (water-cu) inside a hexagonal enclosure shape embedded with a square obstacle in the presence of hot and cold side walls. The governing equations were solved in a non-uniform unstructured grid by employing the Galerkin finite element method using the software COMSOL Multiphysics. The objective of this study is to analyze the influence of Rayleigh number (103 < Ra < 105), the position of the obstacle, which is located in three different positions (center, bottom, and top side ), and the effect of Nanoparticles volume concentration (0 < Ø < 0.2) on the thermal behavior inside the enclosure, The results are reported as contours of isotherms, streamlines, and average Nusselt numbers. The obtained results illustrate that the increase in the Rayleigh number (Ra) and the Nanoparticles concentration ( Ø ) leads to an increase in the Nusselt number (Nu average ) that signifies the rate of heat transfer in the studied enclosure, in addition to the best performance observed with the position of obstacle that is located at the middle of the enclosure, where has a high effect in improving the heat transfer along the enclosure comparatively with the rest different positions.Keywords: natural convection, nanofluid (water-Cu), hexagonal enclosure, Nusselt numbers, Rayleigh number
Procedia PDF Downloads 90703 Casting Lots for Candidature in General Elections: An Un-Named Political System
Authors: Talib Jan Abasindhi
Abstract:
Democracy has reached almost every nuke & corner of the globe. It is well embedded in the political systems found in the majority of the countries in the world. Political parties, their manifestos, and programs are educating their people for better democracy and good governance, as well as service delivery in many countries around the globe. Although democracy in Pakistan by itself is in its infancy stage, yet, there is a region consisting of three districts (administrative units) lying in the North of the country where democracy is yet unknown to a wide range of population bounded into a series of mountains from Himalayan and Karakuram ranges. Political parties are struggling now to get their roots in the area while disrupting the traditional and tribal electoral system prevailing in the region. This paper will shed light on an interesting subject of casting lots for nomination as candidatures for general and local bodies’ elections in Kohistani region in Pakistan. The people of wisdom and knowledge in the modern world deem such societies as uncivilized where these practices are found. No one can believe it in today’s world, yet, this practice has been common in Kohistani region over the past many decades, and there have been many reasons for this too. Through this paper, we shall not only make others aware of the process and procedure practiced in casting the lots in elections in democratic Pakistan, but rather we shall also talk about its very basic reasons and suggestions as a solution for this menace to be eliminated.Keywords: democracy, casting lots, governance, Kohistani region
Procedia PDF Downloads 69702 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA
Authors: S. Saju, G. Thirugnanam
Abstract:
In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet
Procedia PDF Downloads 528701 The Populist Rhetoric: The Symmetry of Environmentalism and Gandhianism in the Indian Mainstream Academia
Authors: Akanksha Indora
Abstract:
Environmental problems are considered a vital social issue in terms of the world’s problems with pollution, environmental degradation, and resource depletion. And populism is about appropriating the social issues according to the social condition for mobilizing a mass and constructing a ‘general will’. Populism encourages a move towards a common cause, it channelizes the emotions of the ‘common people’ towards a nation and nature. The Gandhian ideology has been received as a dominant ideology and the ‘only’ solution to environmental problems. This paper strives to understand the symmetry of environmentalism and Gandhianismi.e., how the debate on the environment in India has been primarily studied through the Gandhian ideology. The Indian Social Sciences visualize the broader issues of the environment from these perspectives, thus, making it a hegemonic approach. Being anti pluralist rhetoric is major rhetoric in the becoming of a populist. This paper shall focus on the idea that how this hegemonic construction of Gandhian ideology in the debates on environmentalism has contributed to the making of anti-pluralistic rhetoric. This anti-pluralistic rhetoric has eliminated the possibility of a pluralistic perspective in the debates on the environment. The quest for a moral inspiration embedded in Gandhianism, whose situatedness is found in the Hindu Social order, seems to have been completely rationalized through the larger politics of knowledge and thus making it appear as the only way forward when it is not.Keywords: environmental populism, gandhianism, populist rhetoric, environmentalism
Procedia PDF Downloads 117700 Bystanders' Behavior during Emergencies
Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport
Abstract:
The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping
Procedia PDF Downloads 122699 Printing Thermal Performance: An Experimental Exploration of 3DP Polymers for Facade Applications
Authors: Valeria Piccioni, Matthias Leschok, Ina Cheibas, Illias Hischier, Benjamin Dillenburger, Arno Schlueter, Matthias Kohler, Fabio Gramazio
Abstract:
The decarbonisation of the building sector requires the development of building components that provide energy efficiency while producing minimal environmental impact. Recent advancements in large-scale 3D printing have shown that it is possible to fabricate components with embedded performances that can be tuned for their specific application. We investigate the potential of polymer 3D printing for the fabrication of translucent facade components. In this study, we explore the effect of geometry on thermal insulation of printed cavity structures following a Hot Box test method. The experimental results are used to calibrate a finite-element simulation model which can support the informed design of 3D printed insulation structures. We show that it is possible to fabricate components providing thermal insulation ranging from 1.7 to 0.95 W/m2K only by changing the internal cavity distribution and size. Moreover, we identify design guidelines that can be used to fabricate components for different climatic conditions and thermal insulation requirements. The research conducted provides the first insights into the thermal behaviour of polymer 3DP facades on a large scale. These can be used as design guidelines for further research toward performant and low-embodied energy 3D printed facade components.Keywords: 3D printing, thermal performance, polymers, facade components, hot-box method
Procedia PDF Downloads 181698 Large-Eddy Simulations for Aeronautical Systems
Authors: R. R. Mankbadi
Abstract:
There are several technologically-important flow situations in which there is a need to control the outcome of the fluid flow. This could include flow separation, drag, noise, as well as particulate separations, to list only a few. One possible approach is the passive control, in which the design geometry is changed. An alternative approach is the Active Flow Control (AFC) technology in which an actuator is embedded in the flow field to change the outcome. Examples of AFC are pulsed jets, synthetic jets, plasma actuators, heating, and cooling, etc. In this work will present an overview of the development of this field. Some examples will include Airfoil Noise Suppression: Large-Eddy Simulations (LES) is used to simulate the effect of synthetic jet actuator on controlling the far field sound of a transitional airfoil. The results show considerable suppression of the noise if the synthetic jet is operated at frequencies. Mixing Enhancement and suppression: Results will be presented to show that imposing acoustic excitations at the nozzle exit can lead to enhancement or reduction of the jet plume mixing. In vertical takeoff of Aircrafts or in Space Launch, we will present results on the effects of water injection on reducing noise, and on protecting the structure and payload from fatigue damage. Other applications will include airfoil-gust interaction and propulsion systems optimizations.Keywords: aeroacoustics, flow control, aerodynamics, large eddy simulations
Procedia PDF Downloads 287697 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 71696 Investigation on Polymer Based Nano-Silver as Food Packaging Materials
Authors: A. M. Metak, T. T. Ajaal, Amal Metak, Tawfik Ajaal
Abstract:
Commercial nanocomposite food packaging type nano-silver containers were characterised using scanning electron microscopy (SEM) and energy-dispersive X-Ray spectroscopy (EDX). The presence of nanoparticles consistent with the incorporation of 1% nano-silver (Ag) and 0.1% titanium dioxide (TiO2) nanoparticle into polymeric materials formed into food containers was confirmed. Both nanomaterials used in this type of packaging appear to be embedded in a layered configuration within the bulk polymer. The dimensions of the incorporated nanoparticles were investigated using X-Ray diffraction (XRD) and determined by calculation using the Scherrer Formula; these were consistent with Ag and TiO2 nanoparticles in the size range 20-70nm both were spherical shape nanoparticles. Antimicrobial assessment of the nanocomposite container has also been performed and the results confirm the antimicrobial activity of Ag and TiO2 nanoparticles in food packaging containers. Migration assessments were performed in a wide range of food matrices to determine the migration of nanoparticles from the packages. The analysis was based on the relevant European safety directives and involved the application of inductively coupled plasma mass spectrometry (ICP-MS) to identify the range of migration risk. The data pertain to insignificance levels of migration of Ag and TiO2 nanoparticles into the selected food matrices.Keywords: nano-silver, antimicrobial food packaging, migration, titanium dioxide
Procedia PDF Downloads 368695 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farmingas Web of Things to Cloud Interface Using PaaS
Authors: Sumaya Ismail, Aijaz Ahmad Reshi
Abstract:
The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to the Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them with web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular, the Representational State Transfer protocol (REST) was extended for the specific requirements of the application. The Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway
Procedia PDF Downloads 104694 Factory Virtual Environment Development for Augmented and Virtual Reality
Authors: Michal Gregor, Jiri Polcar, Petr Horejsi, Michal Simon
Abstract:
Machine visualization is an area of interest with fast and progressive development. We present a method of machine visualization which will be applicable in real industrial conditions according to current needs and demands. Real factory data were obtained in a newly built research plant. Methods described in this paper were validated on a case study. Input data were processed and the virtual environment was created. The environment contains information about dimensions, structure, disposition, and function. Hardware was enhanced by modular machines, prototypes, and accessories. We added new functionalities and machines into the virtual environment. The user is able to interact with objects such as testing and cutting machines, he/she can operate and move them. Proposed design consists of an environment with two degrees of freedom of movement. Users are in touch with items in the virtual world which are embedded into the real surroundings. This paper describes the development of the virtual environment. We compared and tested various options of factory layout virtualization and visualization. We analyzed possibilities of using a 3D scanner in the layout obtaining process and we also analyzed various virtual reality hardware visualization methods such as Stereoscopic (CAVE) projection, Head Mounted Display (HMD), and augmented reality (AR) projection provided by see-through glasses.Keywords: augmented reality, spatial scanner, virtual environment, virtual reality
Procedia PDF Downloads 407693 Travel Behavior Simulation of Bike-Sharing System Users in Kaoshiung City
Authors: Hong-Yi Lin, Feng-Tyan Lin
Abstract:
In a Bike-sharing system (BSS), users can easily rent bikes from any station in the city for mid-range or short-range trips. BSS can also be integrated with other types of transport system, especially Green Transportation system, such as rail transport, bus etc. Since BSS records time and place of each pickup and return, the operational data can reflect more authentic and dynamic state of user behaviors. Furthermore, land uses around docking stations are highly associated with origins and destinations for the BSS users. As urban researchers, what concerns us more is to take BSS into consideration during the urban planning process and enhance the quality of urban life. This research focuses on the simulation of travel behavior of BSS users in Kaohsiung. First, rules of users’ behavior were derived by analyzing operational data and land use patterns nearby docking stations. Then, integrating with Monte Carlo method, these rules were embedded into a travel behavior simulation model, which was implemented by NetLogo, an agent-based modeling tool. The simulation model allows us to foresee the rent-return behaviour of BSS in order to choose potential locations of the docking stations. Also, it can provide insights and recommendations about planning and policies for the future BSS.Keywords: agent-based model, bike-sharing system, BSS operational data, simulation
Procedia PDF Downloads 333