Search results for: Distributed computing
1742 The Impact of the Composite Expanded Graphite PCM on the PV Panel Whole Year Electric Output: Case Study Milan
Authors: Hasan A Al-Asadi, Ali Samir, Afrah Turki Awad, Ali Basem
Abstract:
Integrating the phase change material (PCM) with photovoltaic (PV) panels is one of the effective techniques to minimize the PV panel temperature and increase their electric output. In order to investigate the impact of the PCM on the electric output of the PV panels for a whole year, a lumped-distributed parameter model for the PV-PCM module has been developed. This development has considered the impact of the PCM density variation between the solid phase and liquid phase. This contribution will increase the assessment accuracy of the electric output of the PV-PCM module. The second contribution is to assess the impact of the expanded composite graphite-PCM on the PV electric output in Milan for a whole year. The novel one-dimensional model has been solved using MATLAB software. The results of this model have been validated against literature experiment work. The weather and the solar radiation data have been collected. The impact of expanded graphite-PCM on the electric output of the PV panel for a whole year has been investigated. The results indicate this impact has an enhancement rate of 2.39% for the electric output of the PV panel in Milan for a whole year.Keywords: PV panel efficiency, PCM, numerical model, solar energy
Procedia PDF Downloads 1701741 Assessing the Effectiveness of Machine Learning Algorithms for Cyber Threat Intelligence Discovery from the Darknet
Authors: Azene Zenebe
Abstract:
Deep learning is a subset of machine learning which incorporates techniques for the construction of artificial neural networks and found to be useful for modeling complex problems with large dataset. Deep learning requires a very high power computational and longer time for training. By aggregating computing power, high performance computer (HPC) has emerged as an approach to resolving advanced problems and performing data-driven research activities. Cyber threat intelligence (CIT) is actionable information or insight an organization or individual uses to understand the threats that have, will, or are currently targeting the organization. Results of review of literature will be presented along with results of experimental study that compares the performance of tree-based and function-base machine learning including deep learning algorithms using secondary dataset collected from darknet.Keywords: deep-learning, cyber security, cyber threat modeling, tree-based machine learning, function-based machine learning, data science
Procedia PDF Downloads 1521740 Entomofauna Biodiversity of a Citrus Orchard in Baraki, Algeria
Authors: Ahlem Guerzou, Salheddine Doumandji
Abstract:
Orchards and minimally processed with surrounding hedges form a significant source of biodiversity. These orchards are an entire ecosystem, home to a rich insect fauna associated with the presence of a large diversity of plant species. The values of the richness and diversity rise when the intensity of the chemical protection is reduced emphasizing the importance of such orchard in the conservation of biodiversity. To show the interest hedges fauna perspective, we conducted a study in an orange grove located Baraki surrounded by hedges and windbreaks consist of several plant species. With the sweep net there were the invertebrate fauna of the herbaceous and after a year of inventory was collected consists of a 2177 individuals distributed among 156 species grouped into five classes and 15 orders fauna. Hymenoptera and Diptera are in first place with 34 species (AR% = 19.3%), followed by Coleoptera with 27 species (AR% = 15.3%), Homoptera dominate in the workforce with 735 individuals (AR% = 34.1%). The Shannon-Weaver index calculated reflects a great diversity of population sampled equal to 5.2 bits. The equitability is 0.7, showing a strong trend of balance between the numbers of species present.Keywords: biodiversity, citrus orchard, reaps net, hedges, Baraki
Procedia PDF Downloads 3161739 An Adaptive Opportunistic Transmission for Unlicensed Spectrum Sharing in Heterogeneous Networks
Authors: Daehyoung Kim, Pervez Khan, Hoon Kim
Abstract:
Efficient utilization of spectrum resources is a fundamental issue of wireless communications due to its scarcity. To improve the efficiency of spectrum utilization, the spectrum sharing for unlicensed bands is being regarded as one of key technologies in the next generation wireless networks. A number of schemes such as Listen-Before-Talk(LBT) and carrier sensor adaptive transmission (CSAT) have been suggested from this aspect, but more efficient sharing schemes are required for improving spectrum utilization efficiency. This work considers an opportunistic transmission approach and a dynamic Contention Window (CW) adjustment scheme for LTE-U users sharing the unlicensed spectrum with Wi-Fi, in order to enhance the overall system throughput. The decision criteria for the dynamic adjustment of CW are based on the collision evaluation, derived from the collision probability of the system. The overall performance can be improved due to the adaptive adjustment of the CW. Simulation results show that our proposed scheme outperforms the Distributed Coordination Function (DCF) mechanism of IEEE 802.11 MAC.Keywords: spectrum sharing, adaptive opportunistic transmission, unlicensed bands, heterogeneous networks
Procedia PDF Downloads 3501738 Ethical Perspectives on Implementation of Computer Aided Design Curriculum in Architecture in Nigeria: A Case Study of Chukwuemeka Odumegwu Ojukwu University, Uli
Authors: Kelechi Ezeji
Abstract:
The use of Computer Aided Design (CAD) technologies has become pervasive in the Architecture, Engineering and Construction (AEC) industry. This has led to its inclusion as an important part of the training module in the curriculum for Architecture Schools in Nigeria. This paper examines the ethical questions that arise in the implementation of Computer Aided Design (CAD) Content of the curriculum for Architectural education. Using existing literature, it begins this scrutiny from the propriety of inclusion of CAD into the education of the architect and the obligations of the different stakeholders in the implementation process. It also examines the questions raised by the negative use of computing technologies as well as perceived negative influence of the use of CAD on design creativity. Survey methodology was employed to gather data from the Department of Architecture, Chukwuemeka Odumegwu Ojukwu University Uli, which has been used as a case study on how the issues raised are being addressed. The paper draws conclusions on what will make for successful ethical implementation.Keywords: computer aided design, curriculum, education, ethics
Procedia PDF Downloads 4121737 Total Quality Management and Competitive Advantage in Companies
Authors: Malki Fatima Zahra Nadia, Kellal Cheiimaa, Brahimi Houria
Abstract:
Total Quality Management (TQM) is one of the most important modern management systems in marketing, that help organizations to survive and remain competitive in the dynamic market with frequent changes. It assists them in gaining a competitive advantage, growth, and excellence compared to their competitors. To understand the impact of TQM on competitive advantage in economic companies, a study was conducted in Ooredoo Telecommunications Company. A questionnaire was designed and distributed to OOredoo' 75 employees in each of the departments of leadership, quality assurance, quality control, research and development, production, customer service, Similarly, resulting in the retrieval of 72 questionnaires. To analyze the descriptive results of the study, the SPSS software version 25 was used. Additionally, Structural Equation Modeling (SEM) with the help of Smart Pls4 software was utilized to test the study's hypotheses. The study concluded that there is an impact between total quality management and competitive advantage in Ooredoo company to different degrees. On this basis, the study recommended the need to implement the total quality management system at the level of all organizations and in various fields.Keywords: total quality management, ISO system, competitive advantage, competitive strategies
Procedia PDF Downloads 711736 A Parallel Implementation of Artificial Bee Colony Algorithm within CUDA Architecture
Authors: Selcuk Aslan, Dervis Karaboga, Celal Ozturk
Abstract:
Artificial Bee Colony (ABC) algorithm is one of the most successful swarm intelligence based metaheuristics. It has been applied to a number of constrained or unconstrained numerical and combinatorial optimization problems. In this paper, we presented a parallelized version of ABC algorithm by adapting employed and onlooker bee phases to the Compute Unified Device Architecture (CUDA) platform which is a graphical processing unit (GPU) programming environment by NVIDIA. The execution speed and obtained results of the proposed approach and sequential version of ABC algorithm are compared on functions that are typically used as benchmarks for optimization algorithms. Tests on standard benchmark functions with different colony size and number of parameters showed that proposed parallelization approach for ABC algorithm decreases the execution time consumed by the employed and onlooker bee phases in total and achieved similar or better quality of the results compared to the standard sequential implementation of the ABC algorithm.Keywords: Artificial Bee Colony algorithm, GPU computing, swarm intelligence, parallelization
Procedia PDF Downloads 3751735 Analyze of Nanoscale Materials and Devices for Future Communication and Telecom Networks in the Gas Refinery
Authors: Mohamad Bagher Heidari, Hefzollah Mohammadian
Abstract:
New discoveries in materials on the nanometer-length scale are expected to play an important role in addressing ongoing and future challenges in the field of communication. Devices and systems for ultra-high speed short and long range communication links, portable and power efficient computing devices, high-density memory and logics, ultra-fast interconnects, and autonomous and robust energy scavenging devices for accessing ambient intelligence and needed information will critically depend on the success of next-generation emerging nonmaterials and devices. This article presents some exciting recent developments in nonmaterials that have the potential to play a critical role in the development and transformation of future intelligent communication and telecom networks in the gas refinery. The industry is benefiting from nanotechnology advances with numerous applications including those in smarter sensors, logic elements, computer chips, memory storage devices, optoelectronics.Keywords: nonmaterial, intelligent communication, nanoscale, nanophotonic, telecom
Procedia PDF Downloads 3331734 Contention Window Adjustment in IEEE 802.11-based Industrial Wireless Networks
Authors: Mohsen Maadani, Seyed Ahmad Motamedi
Abstract:
The use of wireless technology in industrial networks has gained vast attraction in recent years. In this paper, we have thoroughly analyzed the effect of contention window (CW) size on the performance of IEEE 802.11-based industrial wireless networks (IWN), from delay and reliability perspective. Results show that the default values of CWmin, CWmax, and retry limit (RL) are far from the optimum performance due to the industrial application characteristics, including short packet and noisy environment. An adaptive CW algorithm (payload-dependent) has been proposed to minimize the average delay. Finally a simple, but effective CW and RL setting has been proposed for industrial applications which outperforms the minimum-average-delay solution from maximum delay and jitter perspective, at the cost of a little higher average delay. Simulation results show an improvement of up to 20%, 25%, and 30% in average delay, maximum delay and jitter respectively.Keywords: average delay, contention window, distributed coordination function (DCF), jitter, industrial wireless network (IWN), maximum delay, reliability, retry limit
Procedia PDF Downloads 4151733 Barriers to the Use of Factoring Accounts Receivables: Ghanaian Contractor’s Perception
Authors: E. Kissi, V. K. Acheamfour, J. J. Gyimah, T. Adjei-Kumi
Abstract:
Factoring accounts receivable is widely accepted as an alternative financing source and utilized in almost every industry that sells business-to-business or business-to-government. However, its patronage in the construction industry is very limited as some barriers hinder its application in the construction industry. This study aims at assessing the barriers to the use of factoring accounts receivables in the Ghanaian construction industry. The study adopted the sequential exploratory research method where structured and unstructured questionnaires were conveniently distributed to D1K1 and D2K2 construction firms in Ghana. Using the one-sample t-test and Kendall’s Coefficient of concordance data was analyzed. The most severe challenge concluded is the high cost of factoring patronage. Other critical challenges identified were low knowledge on factoring processes, inadequate access to information on factoring, and high risks involved in factoring. Hence, it is recommended that contractors should be made aware of the prospects of factoring of accounts receivables in the construction industry. This study serves as basis for further rigorous research into factoring of accounts receivables in the industry.Keywords: barriers, contractors, factoring accounts receivables, Ghanaian, perception
Procedia PDF Downloads 1311732 Point-of-Interest Recommender Systems for Location-Based Social Network Services
Authors: Hoyeon Park, Yunhwan Keon, Kyoung-Jae Kim
Abstract:
Location Based Social Network services (LBSNs) is a new term that combines location based service and social network service (SNS). Unlike traditional SNS, LBSNs emphasizes empirical elements in the user's actual physical location. Point-of-Interest (POI) is the most important factor to implement LBSNs recommendation system. POI information is the most popular spot in the area. In this study, we would like to recommend POI to users in a specific area through recommendation system using collaborative filtering. The process is as follows: first, we will use different data sets based on Seoul and New York to find interesting results on human behavior. Secondly, based on the location-based activity information obtained from the personalized LBSNs, we have devised a new rating that defines the user's preference for the area. Finally, we have developed an automated rating algorithm from massive raw data using distributed systems to reduce advertising costs of LBSNs.Keywords: location-based social network services, point-of-interest, recommender systems, business analytics
Procedia PDF Downloads 2281731 Comparison Between Genetic Algorithms and Particle Swarm Optimization Optimized Proportional Integral Derirative and PSS for Single Machine Infinite System
Authors: Benalia Nadia, Zerzouri Nora, Ben Si Ali Nadia
Abstract:
Abstract: Among the many different modern heuristic optimization methods, genetic algorithms (GA) and the particle swarm optimization (PSO) technique have been attracting a lot of interest. The GA has gained popularity in academia and business mostly because to its simplicity, ability to solve highly nonlinear mixed integer optimization problems that are typical of complex engineering systems, and intuitiveness. The mechanics of the PSO methodology, a relatively recent heuristic search tool, are modeled after the swarming or cooperative behavior of biological groups. It is suitable to compare the performance of the two techniques since they both aim to solve a particular objective function but make use of distinct computing methods. In this article, PSO and GA optimization approaches are used for the parameter tuning of the power system stabilizer and Proportional integral derivative regulator. Load angle and rotor speed variations in the single machine infinite bus bar system is used to measure the performance of the suggested solution.Keywords: SMIB, genetic algorithm, PSO, transient stability, power system stabilizer, PID
Procedia PDF Downloads 801730 A Study on Application of Elastic Theory for Computing Flexural Stresses in Preflex Beam
Authors: Nasiri Ahmadullah, Shimozato Tetsuhiro, Masayuki Tai
Abstract:
This paper presents the step-by-step procedure for using Elastic Theory to calculate the internal stresses in composite bridge girders prestressed by the Preflexing Technology, called Prebeam in Japan and Preflex beam worldwide. Elastic Theory approaches preflex beams the same way as it does the conventional composite girders. Since preflex beam undergoes different stages of construction, calculations are made using different sectional and material properties. Stresses are calculated in every stage using the properties of the specific section. Stress accumulation gives the available stress in a section of interest. Concrete presence in the section implies prestress loss due to creep and shrinkage, however; more work is required to be done in this field. In addition to the graphical presentation of this application, this paper further discusses important notes of graphical comparison between the results of an experimental-only research carried out on a preflex beam, with the results of simulation based on the elastic theory approach, for an identical beam using Finite Element Modeling (FEM) by the author.Keywords: composite girder, Elastic Theory, preflex beam, prestressing
Procedia PDF Downloads 2791729 Structural Equation Modeling Semiparametric in Modeling the Accuracy of Payment Time for Customers of Credit Bank in Indonesia
Authors: Adji Achmad Rinaldo Fernandes
Abstract:
The research was conducted to apply semiparametric SEM modeling to the timeliness of paying credit. Semiparametric SEM is structural modeling in which two combined approaches of parametric and nonparametric approaches are used. The analysis method in this research is semiparametric SEM with a nonparametric approach using a truncated spline. The data in the study were obtained through questionnaires distributed to Bank X mortgage debtors and are confidential. The study used 3 variables consisting of one exogenous variable, one intervening endogenous variable, and one endogenous variable. The results showed that (1) the effect of capacity and willingness to pay variables on timeliness of payment is significant, (2) modeling the capacity variable on willingness to pay also produces a significant estimate, (3) the effect of the capacity variable on the timeliness of payment variable is not influenced by the willingness to pay variable as an intervening variable, (4) the R^2 value of 0.763 or 76.33% indicates that the model has good predictive relevance.Keywords: structural equation modeling semiparametric, credit bank, accuracy of payment time, willingness to pay
Procedia PDF Downloads 431728 An Analytical View to the Habitat Strategies of the Butterfly-Like Insects (Neuroptera: Ascalaphidae)
Authors: Hakan Bozdoğan
Abstract:
The goal of this paper is to evaluate the species richness, diversity and structure of in different habitats in the Kahramanmaraş Province in Turkey by using a mathematical program called as Geo-Gebra Software. The Ascalaphidae family comprises the most visually remarkable members of the order Neuroptera due to large dimensions, aerial predatory behaviour and dragonfly-like (or even butterfly-like) habits, allowing an immediate recognition also for occasional observers. Otherwise, they are one of the more poorly known families of the order in respect to biology, ecology and especially larval morphology. This discrepancy appears particularly noteworthy considering that it is a fairly large family (ca. 430 species) widely distributed in tropical and temperate areas of the World. The use of Dynamic Geometry, Analytical Softwares provides researchers a great way of visualising mathematical objects and encourage them to carry out tasks to interact with such objects and add to support of their researching. In this study we implemented; Circle with Center Through Point, Perpendicular Line, Vectors and Rays, Segments and Locus to elucidate the ecological and habitat behaviours of Butterfly-like lacewings in an analytical plane by using Geo-Gebra.Keywords: neuroptera, Ascalaphidae, geo-gebra software, habitat selectivity
Procedia PDF Downloads 2771727 Insertion Loss Improvement of a Two-Port Saw Resonator Based on AlN via Alloying with Transition Metals
Authors: Kanouni Fares
Abstract:
This paper describes application of X-doped AlN (X=Sc, Cr and Y) to wideband surface acoustic wave (SAW) resonators in 200–300 MHz range. First, it is shown theoretically that Cr doped AlN thin film has the highest piezoelectric strain constant, accompanied by a lowest mechanical softening compared to Sc doped AlScN and Y doped AlN thin films for transition metals concentrations ranging from 0 to 25%. Next, the impact of transition metals (Sc, Cr and Y) concentration have been carried out for the first time, in terms of surface wave velocity, electrode reflectivity, transduction coefficient and distributed finger capacitance. Finely, the insertion loss of two-port SAW resonator based on AlXN (X=Sc, Cr and Y) deposited on sapphire substrate is obtained using P-matrix model, and it is shown that AlCrN-SAW resonator exhibit lower insertion loss compared to those based on AlScN and AlYN for metal concentrations of 25%.This finding may position Cr doped AlN as a prime piezoelectric material for low loss SAW resonators whose performance can be tuned via Cr composition.Keywords: P-Matrix, SAW-delay line, interdigital transducer, nitride aluminum, metals transition
Procedia PDF Downloads 1191726 Communities’ Attitudes and Perceptions of Protected Areas in South Africa: Insights from the Somkhanda Game Reserve
Authors: Sakhile Nsukwini, Urmilla Bob
Abstract:
Meaningful community participation is essential to the long-term success of protected areas. Hence, it is important to understand what drives neighbouring communities’ attitudes and perceptions towards protected areas. This study sought to determine local community attitudes towards conservation and protected areas, as well as their perceptions of benefits and participation at Somkhanda Game Reserve. Semi-structured interviews were held with experienced park officials, while a structured household survey and focus group discussions were conducted across two surrounding villages. The results highlighted a number of interesting findings, including support for biodiversity conservation and protected areas balanced by considerable negativity towards the Somkhanda Game Reserve itself. It was also determined that despite stated co-management policies, community residents perceived there was little meaningful participation, and benefits were poorly communicated and unfairly distributed. Practical suggestions were made for cooperatively developing more effective participation with the communities, despite limited available resources.Keywords: communities, protected areas, perceptions, co-management, land restitution
Procedia PDF Downloads 1121725 The Impact of Interrelationship between Business Intelligence and Knowledge Management on Decision Making Process: An Empirical Investigation of Banking Sector in Jordan
Authors: Issa M. Shehabat, Huda F. Y. Nimri
Abstract:
This paper aims to study the relationship between knowledge management in its processes, including knowledge creation, knowledge sharing, knowledge organization, and knowledge application, and business intelligence tools, including OLAP, data mining, and data warehouse, and their impact on the decision-making process in the banking sector in Jordan. A total of 200 questionnaires were distributed to the sample of the study. The study hypotheses were tested using the statistical package SPSS. Study findings suggest that decision-making processes were positively related to knowledge management processes. Additionally, the components of business intelligence had a positive impact on decision-making. The study recommended conducting studies similar to this study in other sectors such as the industrial, telecommunications, and service sectors to contribute to enhancing understanding of the role of the knowledge management processes and business intelligence tools.Keywords: business intelligence, knowledge management, decision making, Jordan, banking sector
Procedia PDF Downloads 1421724 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 1441723 Increasing the System Availability of Data Centers by Using Virtualization Technologies
Authors: Chris Ewe, Naoum Jamous, Holger Schrödl
Abstract:
Like most entrepreneurs, data center operators pursue goals such as profit-maximization, improvement of the company’s reputation or basically to exist on the market. Part of those aims is to guarantee a given quality of service. Quality characteristics are specified in a contract called the service level agreement. Central part of this agreement is non-functional properties of an IT service. The system availability is one of the most important properties as it will be shown in this paper. To comply with availability requirements, data center operators can use virtualization technologies. A clear model to assess the effect of virtualization functions on the parts of a data center in relation to the system availability is still missing. This paper aims to introduce a basic model that shows these connections, and consider if the identified effects are positive or negative. Thus, this work also points out possible disadvantages of the technology. In consequence, the paper shows opportunities as well as risks of data center virtualization in relation to system availability.Keywords: availability, cloud computing IT service, quality of service, service level agreement, virtualization
Procedia PDF Downloads 5341722 Renovation Planning Model for a Shopping Mall
Authors: Hsin-Yun Lee
Abstract:
In this study, the pedestrian simulation VISWALK integration and application platform ant algorithms written program made to construct a renovation engineering schedule planning mode. The use of simulation analysis platform construction site when the user running the simulation, after calculating the user walks in the case of construction delays, the ant algorithm to find out the minimum delay time schedule plan, and add volume and unit area deactivated loss of business computing, and finally to the owners and users of two different positions cut considerations pick out the best schedule planning. To assess and validate its effectiveness, this study constructed the model imported floor of a shopping mall floor renovation engineering cases. Verify that the case can be found from the mode of the proposed project schedule planning program can effectively reduce the delay time and the user's walking mall loss of business, the impact of the operation on the renovation engineering facilities in the building to a minimum.Keywords: pedestrian, renovation, schedule, simulation
Procedia PDF Downloads 4121721 A Community Solution to Address Extensive Nitrate Contamination in the Lower Yakima Valley Aquifer
Authors: Melanie Redding
Abstract:
Historic widespread nitrate contamination of the Lower Yakima Valley aquifer in Washington State initiated a community-based effort to reduce nitrate concentrations to below-drinking water standards. This group commissioned studies on characterizing local nitrogen sources, deep soil assessments, drinking water, and assessing nitrate concentrations at the water table. Nitrate is the most prevalent groundwater contaminant with common sources from animal and human waste, fertilizers, plants and precipitation. It is challenging to address groundwater contamination when common sources, such as agriculture, on-site sewage systems, and animal production, are widespread. Remediation is not possible, so mitigation is essential. The Lower Yakima Valley is located over 175,000 acres, with a population of 56,000 residents. Approximately 25% of the population do not have access to safe, clean drinking water, and 20% of the population is at or below the poverty level. Agriculture is the primary economic land-use activity. Irrigated agriculture and livestock production make up the largest percentage of acreage and nitrogen load. Commodities include apples, grapes, hops, dairy, silage corn, triticale, alfalfa and cherries. These commodities are important to the economic viability of the residents of the Lower Yakima Valley, as well as Washington State. Mitigation of nitrate in groundwater is challenging. The goal is to ensure everyone has safe drinking water. There are no easy remedies due to the extensive and pervasiveness of the contamination. Monitoring at the water table indicates that 45% of the 30 spatially distributed monitoring wells exceeded the drinking water standard. This indicates that there are multiple sources that are impacting water quality. Washington State has several areas which have extensive groundwater nitrate contamination. The groundwater in these areas continues to degrade over time. However, the Lower Yakima Valley is being successful in addressing this health issue because of the following reasons: the community is engaged and committed; there is one common goal; there has been extensive public education and outreach to citizens; and generating credible data using sound scientific methods. Work in this area is continuing as an ambient groundwater monitoring network is established to assess the condition of the aquifer over time. Nitrate samples are being collected from 170 wells, spatially distributed across the aquifer. This research entails quarterly sampling for two years to characterize seasonal variability and then continue annually afterward. This assessment will provide the data to statistically determine trends in nitrate concentrations across the aquifer, over time. Thirty-three of these wells are monitoring wells that are screened across the aquifer. The water quality from these wells are indicative of activities at the land surface. Additional work is being conducted to identify land use management practices that are effective in limiting nitrate migration through the soil column. Tracking nitrate in the soil column every season is an important component of bridging land-use practices with the fate and transport of nitrate through the subsurface. Patience, tenacity, and the ability to think outside the box are essential for dealing with widespread nitrate contamination of groundwater.Keywords: community, groundwater, monitoring, nitrate
Procedia PDF Downloads 1771720 Characterization of the Physical Properties of Sheep Wool Fiber in Amhara National Regional State
Authors: Erkihun Zelalem
Abstract:
Ethiopian’s sheep population, estimated to be 25.5 million heads, is found widely distributed across the diverse agro-ecological zones of the country. In the past, there were many projects that done to improve production of meat, milk and productivity of sheep breed. However, no significance research has been done so far on production of wool fiber in Ethiopia which could be taken as a potential fiber next to cotton. The measurement of the sheep wool fiber physical properties is critically important, technical, commercial and certification point of view. A total of 24 sheep from different breeds (Menz, Tikur, Farta and Washera) were used in this study. Samples of fiber were analyzed using standard measurements for wool fiber length (WFL), mean fiber diameter (MFD), coefficient of variation of wool fiber diameter (FDCV), breaking strength, elongation, crimp, cleanness and moisture content. Based on the result all parameters shows that there is a great potential of getting of wool fiber from the skin of sheep and according to the standards of its property and grading system based on wool fiber fineness is medium to course. These types of fibers can be making carpets, blankets, rugs, coverings and other products.Keywords: Fiber, Fineness, Carpet, Fleece, Raw Wool
Procedia PDF Downloads 1641719 PVDF-HFP Based Nanocomposite Gel Polymer Electrolytes Dispersed with Zro2 for Li-Ion Batteries
Authors: R. Sharma, A. Sil, S. Ray
Abstract:
Nanocomposites gel polymer electrolytes are gaining more and more attention among the researchers worldwide due to their possible applications in various electrochemical devices particularly in solid-state Li-ion batteries. In this work we have investigated the effect of nanofibers on the electrical properties of PVDF-HFP based gel electrolytes. The nanocomposites polymer electrolytes have been synthesized by solution casting technique with 10wt% of ZrO2. By analysis of impedance spectroscopy it has been demonstrated that the incorporation of ZrO2 into PVDF-HFP–(PC+DEC)–LiClO4 gel polymer electrolyte system significantly enhances the ionic conductivity of the electrolyte. The enhancement of ionic conductivity seems to be correlated with the fact that the dispersion of ZrO2 to PVDF-HFP prevents polymer chain reorganization due to the high aspect ratio of ZrO2, resulting in reduction in polymer crystallinity, which gives rise to an increase in ionic conductivity. The decrease of crystallinity of PVDF-HFP due the addition of ZrO2 has been confirmed by XRD. The interaction of ZrO2 with various constituents of polymer electrolytes has been studied by FTIR spectroscopy. TEM results show that the fillers (ZrO2) has distributed uniformly in the polymer electrolytes. Moreover, ZrO2 added gel polymer electrolytes offer better thermal stability as compared to that of ZrO2 free electrolytes as confirmed by TGA analysis.Keywords: polymer electrolytes, ZrO2, ionic conductivity, FTIR
Procedia PDF Downloads 4711718 Sliding Mode Control and Its Application in Custom Power Device: A Comprehensive Overview
Authors: Pankaj Negi
Abstract:
Nowadays the demand for receiving the high quality electrical energy is being increasing as consumer wants not only reliable but also quality power. Custom power instruments are of the most well-known compensators of power quality in distributed network. This paper present a comprehensive review of compensating custom power devices mainly DSTATCOM (distribution static compensator),DVR (dynamic voltage restorer), and UPQC (unified power quality compensator) and also deals with sliding mode control and its applications to custom power devices. The sliding mode control strategy provides robustness to custom power device and enhances the dynamic response for compensating voltage sag, swell, voltage flicker, and voltage harmonics. The aim of this paper is to provide a broad perspective on the status of compensating devices in electric power distribution system and sliding mode control strategies to researchers and application engineers who are dealing with power quality and stability issues.Keywords: active power filters(APF), custom power device(CPD), DSTATCOM, DVR, UPQC, sliding mode control (SMC), power quality
Procedia PDF Downloads 4371717 Perception of Aerospace Engineering Students in Saudi Arabia on Aviation Sustainability
Authors: Badr A. Al-Harbi, Fahd T. Abdullah, Mazen T. Wali, Mohammed W. Al-Obaidi, Reda M. Bakhdlg
Abstract:
Over the past few years, the aviation society had demonstrated a huge concern for securing the sustainability of commercial aviation. Future aerospace engineers in Saudi Arabia are expected to play a major role in dealing with these aspects, taking into consideration the expected growth in both traffic, passenger mileage, and fleet expansions in the region. In the present work, the authors investigate the perception of engineering students in the two undergraduate aerospace engineering programs in the Kingdom. A questionnaire was distributed using google forms and targeted approximately 300 students in both programs on several WhatsApp groups. Data collection was stopped after one week when a response rate above 35% was reached. The questionnaire aimed at assessing the students’ awareness of sustainable aviation and associated obstacles. The results obtained from the study indicate the necessity of introducing curricular modifications to address the subject with more targeted extracurricular activities and better use of social media, which is becoming a main source of students’ awareness.Keywords: aviation, engineering education, students’ perception, sustainable aviation
Procedia PDF Downloads 1551716 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level
Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil
Abstract:
This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing
Procedia PDF Downloads 3691715 RFID Laptop Monitoring and Management System
Authors: Francis E. Idachaba, Sarah Uyimeh Tommy
Abstract:
This paper describes the design of an RFID laptop monitoring and management system. Laptops embedded with RFID chips are monitored and tracked to provide a monitoring system for the purpose of tracking as well as monitoring movement of the laptops in and out of a building. The proposed system is implemented with both hardware and software components. The hardware architecture consists of RFID passive tag, RFID module (reader), and a server hosting the application and database. The RFID readers are distributed at major exits of a building or premises. The tags are programmed with owner laptop details are concealed in the laptops. The software architecture consists of application software that has the APIs (Applications Programming Interface) necessary to interface the RFID system with the PC, to achieve automated laptop monitoring system. A friendly graphic user interface (GUI) and a database that saves all readings and owners details. The system is capable of reducing laptop theft especially in students’ hostels as laptops can be monitored as they are taken either in or out of the building.Keywords: asset tracking, GUI, laptop monitoring, radio frequency identification, passive tags
Procedia PDF Downloads 3881714 Approximate-Based Estimation of Single Event Upset Effect on Statistic Random-Access Memory-Based Field-Programmable Gate Arrays
Authors: Mahsa Mousavi, Hamid Reza Pourshaghaghi, Mohammad Tahghighi, Henk Corporaal
Abstract:
Recently, Statistic Random-Access Memory-based (SRAM-based) Field-Programmable Gate Arrays (FPGAs) are widely used in aeronautics and space systems where high dependability is demanded and considered as a mandatory requirement. Since design’s circuit is stored in configuration memory in SRAM-based FPGAs; they are very sensitive to Single Event Upsets (SEUs). In addition, the adverse effects of SEUs on the electronics used in space are much higher than in the Earth. Thus, developing fault tolerant techniques play crucial roles for the use of SRAM-based FPGAs in space. However, fault tolerance techniques introduce additional penalties in system parameters, e.g., area, power, performance and design time. In this paper, an accurate estimation of configuration memory vulnerability to SEUs is proposed for approximate-tolerant applications. This vulnerability estimation is highly required for compromising between the overhead introduced by fault tolerance techniques and system robustness. In this paper, we study applications in which the exact final output value is not necessarily always a concern meaning that some of the SEU-induced changes in output values are negligible. We therefore define and propose Approximate-based Configuration Memory Vulnerability Factor (ACMVF) estimation to avoid overestimating configuration memory vulnerability to SEUs. In this paper, we assess the vulnerability of configuration memory by injecting SEUs in configuration memory bits and comparing the output values of a given circuit in presence of SEUs with expected correct output. In spite of conventional vulnerability factor calculation methods, which accounts any deviations from the expected value as failures, in our proposed method a threshold margin is considered depending on user-case applications. Given the proposed threshold margin in our model, a failure occurs only when the difference between the erroneous output value and the expected output value is more than this margin. The ACMVF is subsequently calculated by acquiring the ratio of failures with respect to the total number of SEU injections. In our paper, a test-bench for emulating SEUs and calculating ACMVF is implemented on Zynq-7000 FPGA platform. This system makes use of the Single Event Mitigation (SEM) IP core to inject SEUs into configuration memory bits of the target design implemented in Zynq-7000 FPGA. Experimental results for 32-bit adder show that, when 1% to 10% deviation from correct output is considered, the counted failures number is reduced 41% to 59% compared with the failures number counted by conventional vulnerability factor calculation. It means that estimation accuracy of the configuration memory vulnerability to SEUs is improved up to 58% in the case that 10% deviation is acceptable in output results. Note that less than 10% deviation in addition result is reasonably tolerable for many applications in approximate computing domain such as Convolutional Neural Network (CNN).Keywords: fault tolerance, FPGA, single event upset, approximate computing
Procedia PDF Downloads 1981713 Advanced Digital Manufacturing: Case Study
Authors: Abdelrahman Abdelazim
Abstract:
Most industries are looking for technologies that are easy to use, efficient and fast to accomplish. To implement these, factories tend to use advanced systems that could alter complicity to simplicity and rudimentary to advancement. Cloud Manufacturing is a new movement that aims to mirror and integrate cloud computing into manufacturing. Amongst cloud manufacturing various advantages are decreasing the human involvements and increasing the dependency on automated machines, which in turns decreases human errors and increases efficiency. A reliable and extraordinary performance processes with minimum errors are highly desired factors of today’s manufacturers. At the glance it seems to be the best alternative, however, the implementation of a cloud system can be very challenging. This work investigates cloud manufacturing in details, it outlines its advantages and disadvantages by converting a local factory in Kuwait to a cloud-ready system. Initially the flow of the factory’s manufacturing process has been analyzed identifying the bottlenecks and illustrating how cloud manufacturing can eliminate them. Following this an automation process has been analyzed and implemented. A comparison between the process before and after the adaptation has been carried out showing the effects on the cost, the output and the efficiency of the process.Keywords: cloud manufacturing, automation, Kuwait industrial sector, advanced digital manufacturing
Procedia PDF Downloads 770