Search results for: simulation techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11019

Search results for: simulation techniques

9819 The Effect of Damper Attachment on Tennis Racket Vibration: A Simulation Study

Authors: Kuangyou B. Cheng

Abstract:

Tennis is among the most popular sports worldwide. During ball-racket impact, substantial vibration transmitted to the hand/arm may be the cause of “tennis elbow”. Although it is common for athletes to attach a “vibration damper” to the spring-bed, the effect remains unclear. To avoid subjective factors and errors in data recording, the effect of damper attachment on racket handle end vibration was investigated with computer simulation. The tennis racket was modeled as a beam with free-free ends (similar to loosely holding the racket). Finite difference method with 40 segments was used to simulate ball-racket impact response. The effect of attaching a damper was modeled as having a segment with increased mass. It was found that the damper has the largest effect when installed at the spring-bed center. However, this is not a practical location due to interference with ball-racket impact. Vibration amplitude changed very slightly when the damper was near the top or bottom of the spring-bed. The damper works only slightly better at the bottom than at the top of the spring-bed. In addition, heavier dampers work better than lighter ones. These simulation results were comparable with experimental recordings in which the selection of damper locations was restricted by ball impact locations. It was concluded that mathematical model simulations were able to objectively investigate the effect of damper attachment on racket vibration. In addition, with very slight difference in grip end vibration amplitude when the damper was attached at the top or bottom of the spring-bed, whether the effect can really be felt by athletes is questionable.

Keywords: finite difference, impact, modeling, vibration amplitude

Procedia PDF Downloads 247
9818 Methodology to Affirm Driver Engagement in Dynamic Driving Task (DDT) for a Level 2 Adas Feature

Authors: Praneeth Puvvula

Abstract:

Autonomy in has become increasingly common in modern automotive cars. There are 5 levels of autonomy as defined by SAE. This paper focuses on a SAE level 2 feature which, by definition, is able to control the vehicle longitudinally and laterally at the same time. The system keeps the vehicle centred with in the lane by detecting the lane boundaries while maintaining the vehicle speed. As with the features from SAE level 1 to level 3, the primary responsibility of dynamic driving task lies with the driver. This will need monitoring techniques to ensure the driver is always engaged even while the feature is active. This paper focuses on the these techniques, which would help the safe usage of the feature and provide appropriate warnings to the driver.

Keywords: autonomous driving, safety, adas, automotive technology

Procedia PDF Downloads 73
9817 Performance Evaluation of a Prioritized, Limited Multi-Server Processor-Sharing System that Includes Servers with Various Capacities

Authors: Yoshiaki Shikata, Nobutane Hanayama

Abstract:

We present a prioritized, limited multi-server processor sharing (PS) system where each server has various capacities, and N (≥2) priority classes are allowed in each PS server. In each prioritized, limited server, different service ratio is assigned to each class request, and the number of requests to be processed is limited to less than a certain number. Routing strategies of such prioritized, limited multi-server PS systems that take into account the capacity of each server are also presented, and a performance evaluation procedure for these strategies is discussed. Practical performance measures of these strategies, such as loss probability, mean waiting time, and mean sojourn time, are evaluated via simulation. In the PS server, at the arrival (or departure) of a request, the extension (shortening) of the remaining sojourn time of each request receiving service can be calculated by using the number of requests of each class and the priority ratio. Utilising a simulation program which executes these events and calculations, the performance of the proposed prioritized, limited multi-server PS rule can be analyzed. From the evaluation results, most suitable routing strategy for the loss or waiting system is clarified.

Keywords: processor sharing, multi-server, various capacity, N-priority classes, routing strategy, loss probability, mean sojourn time, mean waiting time, simulation

Procedia PDF Downloads 319
9816 The New Propensity Score Method and Assessment of Propensity Score: A Simulation Study

Authors: Azam Najafkouchak, David Todem, Dorothy Pathak, Pramod Pathak, Joseph Gardiner

Abstract:

Propensity score (PS) methods have recently become the standard analysis tool for causal inference in observational studies where exposure is not randomly assigned. Thus, confounding can impact the estimation of treatment effect on the outcome. Due to the dangers of discretizing continuous variables, the focus of this paper will be on how the variation in cut-points or boundaries will affect the average treatment effect utilizing the stratification of the PS method. In this study, we will develop a new methodology to improve the efficiency of the PS analysis through stratification and simulation study. We will also explore the property of empirical distribution of average treatment effect theoretically, including asymptotic distribution, variance estimation and 95% confident Intervals.

Keywords: propensity score, stratification, emprical distribution, average treatment effect

Procedia PDF Downloads 85
9815 A Comparison between Underwater Image Enhancement Techniques

Authors: Ouafa Benaida, Abdelhamid Loukil, Adda Ali Pacha

Abstract:

In recent years, the growing interest of scientists in the field of image processing and analysis of underwater images and videos has been strengthened following the emergence of new underwater exploration techniques, such as the emergence of autonomous underwater vehicles and the use of underwater image sensors facilitating the exploration of underwater mineral resources as well as the search for new species of aquatic life by biologists. Indeed, underwater images and videos have several defects and must be preprocessed before their analysis. Underwater landscapes are usually darkened due to the interaction of light with the marine environment: light is absorbed as it travels through deep waters depending on its wavelength. Additionally, light does not follow a linear direction but is scattered due to its interaction with microparticles in water, resulting in low contrast, low brightness, color distortion, and restricted visibility. The improvement of the underwater image is, therefore, more than necessary in order to facilitate its analysis. The research presented in this paper aims to implement and evaluate a set of classical techniques used in the field of improving the quality of underwater images in several color representation spaces. These methods have the particularity of being simple to implement and do not require prior knowledge of the physical model at the origin of the degradation.

Keywords: underwater image enhancement, histogram normalization, histogram equalization, contrast limited adaptive histogram equalization, single-scale retinex

Procedia PDF Downloads 73
9814 Prediction of Unsaturated Permeability Functions for Clayey Soil

Authors: F. Louati, H. Trabelsi, M. Jamei

Abstract:

Desiccation cracks following drainage-humidification cycles. With water loss, mainly due to evaporation, suction in the soil increases, producing volumetric shrinkage and tensile stress. When the tensile stress reaches tensile strength, the soil cracks. Desiccation cracks networks can directly control soil hydraulic properties. The aim of this study was for quantifying the hydraulic properties for examples the water retention curve, the saturated hydraulic conductivity, the unsaturated hydraulic conductivity function, the shrinkage dynamics in Tibar soil- clay soil in the Northern of Tunisia. Then a numerical simulation of unsaturated hydraulic properties for a crack network has been attempted. The finite elements code ‘CODE_BRIGHT’ can be used to follow the hydraulic distribution in cracked porous media.

Keywords: desiccation, cracks, permeability, unsaturated hydraulic flow, simulation

Procedia PDF Downloads 279
9813 Development of Restricted Formula SAE Intake Manifold Using 1D and Flow Simulations Based on Track Analysis

Authors: Sahil Kapahi

Abstract:

A Formula SAE competition is characterized by typical track layouts having slaloms, tight corners and short straights, which favor a particular range of engine speed for a given set of gear ratios. Therefore, it is imperative that the power-train is optimized for the corresponding engine rpm band. This paper describes the process of designing, simulating and validating an air intake manifold for an inline four cylinder four-stroke internal combustion gasoline engine based on analysis of required vehicle performance. The requirements for the design of subject intake were set considering the rules of FSAE competitions and analysis of engine performance patterns for typical competition scenarios, carried out using OPTIMUMLAP software. Manifold geometry was optimized using results of air flow simulations performed on ANSYS CFX, and subsequent effect of this geometry on the engine was modeled using 1D simulation on Ricardo WAVE. A design was developed to meet the targeted performance standards in terms of engine torque output and volumetric efficiency. Finally, the intake manifold was manufactured and assembled onto the vehicle, and the engine output of the vehicle with the designed intake was studied using a dynamometer. The results of the dynamometer testing were then validated against predicted values derived from the Ricardo WAVE modeling and benefits to performance of the vehicle were established.

Keywords: 1 D Simulation, air flow simulation, ANSYS CFX, four-stroke engine, OPTIMUM LAP, Ricardo WAVE

Procedia PDF Downloads 231
9812 Optimize Data Evaluation Metrics for Fraud Detection Using Machine Learning

Authors: Jennifer Leach, Umashanger Thayasivam

Abstract:

The use of technology has benefited society in more ways than one ever thought possible. Unfortunately, though, as society’s knowledge of technology has advanced, so has its knowledge of ways to use technology to manipulate people. This has led to a simultaneous advancement in the world of fraud. Machine learning techniques can offer a possible solution to help decrease this advancement. This research explores how the use of various machine learning techniques can aid in detecting fraudulent activity across two different types of fraudulent data, and the accuracy, precision, recall, and F1 were recorded for each method. Each machine learning model was also tested across five different training and testing splits in order to discover which testing split and technique would lead to the most optimal results.

Keywords: data science, fraud detection, machine learning, supervised learning

Procedia PDF Downloads 174
9811 A Hybrid Traffic Model for Smoothing Traffic Near Merges

Authors: Shiri Elisheva Decktor, Sharon Hornstein

Abstract:

Highway merges and unmarked junctions are key components in any urban road network, which can act as bottlenecks and create traffic disruption. Inefficient highway merges may trigger traffic instabilities such as stop-and-go waves, pose safety conditions and lead to longer journey times. These phenomena occur spontaneously if the average vehicle density exceeds a certain critical value. This study focuses on modeling the traffic using a microscopic traffic flow model. A hybrid traffic model, which combines human-driven and controlled vehicles is assumed. The controlled vehicles obey different driving policies when approaching the merge, or in the vicinity of other vehicles. We developed a co-simulation model in SUMO (Simulation of Urban Mobility), in which the human-driven cars are modeled using the IDM model, and the controlled cars are modeled using a dedicated controller. The scenario chosen for this study is a closed track with one merge and one exit, which could be later implemented using a scaled infrastructure on our lab setup. This will enable us to benchmark the results of this study obtained in simulation, to comparable results in similar conditions in the lab. The metrics chosen for the comparison of the performance of our algorithm on the overall traffic conditions include the average speed, wait time near the merge, and throughput after the merge, measured under different travel demand conditions (low, medium, and heavy traffic).

Keywords: highway merges, traffic modeling, SUMO, driving policy

Procedia PDF Downloads 95
9810 Dynamic Fault Diagnosis for Semi-Batch Reactor Under Closed-Loop Control via Independent RBFNN

Authors: Abdelkarim M. Ertiame, D. W. Yu, D. L. Yu, J. B. Gomm

Abstract:

In this paper, a new robust fault detection and isolation (FDI) scheme is developed to monitor a multivariable nonlinear chemical process called the Chylla-Haase polymerization reactor when it is under the cascade PI control. The scheme employs a radial basis function neural network (RBFNN) in an independent mode to model the process dynamics and using the weighted sum-squared prediction error as the residual. The recursive orthogonal Least Squares algorithm (ROLS) is employed to train the model to overcome the training difficulty of the independent mode of the network. Then, another RBFNN is used as a fault classifier to isolate faults from different features involved in the residual vector. The several actuator and sensor faults are simulated in a nonlinear simulation of the reactor in Simulink. The scheme is used to detect and isolate the faults on-line. The simulation results show the effectiveness of the scheme even the process is subjected to disturbances and uncertainties including significant changes in the monomer feed rate, fouling factor, impurity factor, ambient temperature and measurement noise. The simulation results are presented to illustrate the effectiveness and robustness of the proposed method.

Keywords: Robust fault detection, cascade control, independent RBF model, RBF neural networks, Chylla-Haase reactor, FDI under closed-loop control

Procedia PDF Downloads 486
9809 Exploratory Study of the Influencing Factors for Hotels' Competitors

Authors: Asma Ameur, Dhafer Malouche

Abstract:

Hotel competitiveness research is an essential phase of the marketing strategy for any hotel. Certainly, knowing the hotels' competitors helps the hotelier to grasp its position in the market and the citizen to make the right choice in picking a hotel. Thus, competitiveness is an important indicator that can be influenced by various factors. In fact, the issue of competitiveness, this ability to cope with competition, remains a difficult and complex concept to define and to exploit. Therefore, the purpose of this article is to make an exploratory study to calculate a competitiveness indicator for hotels. Further on, this paper makes it possible to determine the criteria of direct or indirect effect on the image and the perception of a hotel. The actual research is used to look into the right model for hotel ‘competitiveness. For this reason, we exploit different theoretical contributions in the field of machine learning. Thus, we use some statistical techniques such as the Principal Component Analysis (PCA) to reduce the dimensions, as well as other techniques of statistical modeling. This paper presents a survey covering of the techniques and methods in hotel competitiveness research. Furthermore, this study allows us to deduct the significant variables that influence the determination of hotel’s competitors. Lastly, the discussed experiences in this article found that the hotel competitors are influenced by several factors with different rates.

Keywords: competitiveness, e-reputation, hotels' competitors, online hotel’ review, principal component analysis, statistical modeling

Procedia PDF Downloads 105
9808 A Study on the Effectiveness of Translanguaging in EFL Classrooms: The Case of First-year Japanese University Students

Authors: Malainine Ebnou

Abstract:

This study investigates the effectiveness of using translanguaging techniques in EFL classrooms. The interest in this topic stems from the lack of research on the effectiveness of translanguaging techniques in foreign language learning, both domestically in Japan and globally, as research has focused on translanguaging from a teaching perspective but not much on it from a learning perspective. The main question that the study departs from is whether students’ use of translanguaging techniques can produce better learning outcomes when used at the university level. The sample population of the study is first-year Japanese university students. The study takes an experimental approach where translanguaging is introduced to one group, the experimental group, and withheld from another group, the control group. Both groups will then be assessed and compared to see if the use of translanguaging has had a positive impact on learning. The impact of the research could be in three ways: challenging the prevailing argument that using learners' mother tongue in the classroom is detrimental to the learning process, challenging native speaker-centered approaches in the EFL field, and arguing that translanguaging in EFL classrooms can produce more meaningful learning outcomes. If the effectiveness of translanguaging is confirmed, it will be possible to promote the use of translanguaging in English learning at Japanese universities and contribute to the improvement of students' English, and even lay the foundations for extending the use of translanguaging to people of other ages/nationalities and other languages in the future.

Keywords: translanguaging, EFL, language learning and teaching, applied linguistics

Procedia PDF Downloads 44
9807 Modeling and Simulation for 3D Eddy Current Testing in Conducting Materials

Authors: S. Bennoud, M. Zergoug

Abstract:

The numerical simulation of electromagnetic interactions is still a challenging problem, especially in problems that result in fully three dimensional mathematical models. The goal of this work is to use mathematical modeling to characterize the reliability and capacity of eddy current technique to detect and characterize defects embedded in aeronautical in-service pieces. The finite element method is used for describing the eddy current technique in a mathematical model by the prediction of the eddy current interaction with defects. However, this model is an approximation of the full Maxwell equations. In this study, the analysis of the problem is based on a three dimensional finite element model that computes directly the electromagnetic field distortions due to defects.

Keywords: eddy current, finite element method, non destructive testing, numerical simulations

Procedia PDF Downloads 430
9806 The Evaluation of Signal Timing Optimization and Implement of Transit Signal Priority in Intersections and Their Effect on Delay Reduction

Authors: Mohammad Reza Ramezani, Shahriyar Afandizadeh

Abstract:

Since the intersections play a crucial role in traffic delay, it is significant to evaluate them precisely. In this paper, three critical intersections in Tehran (Capital of Iran) had been simulated. The main purpose of this paper was to optimize the public transit delay. The simulation had three different phase in three intersections of Tehran. The first phase was about the current condition of intersection; the second phase was about optimized signal timing and the last phase was about prioritized public transit access. The Aimsun software was used to simulate all phases, and the Synchro software was used to optimization of signals as well. The result showed that the implement of optimization and prioritizing system would reduce about 50% of delay for public transit.

Keywords: transit signal priority, intersection optimization, public transit, simulation

Procedia PDF Downloads 459
9805 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM

Authors: Rajpal Kaur, Pooja Choudhary

Abstract:

Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.

Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM

Procedia PDF Downloads 369
9804 Semi-Analytic Method in Fast Evaluation of Thermal Management Solution in Energy Storage System

Authors: Ya Lv

Abstract:

This article presents the application of the semi-analytic method (SAM) in the thermal management solution (TMS) of the energy storage system (ESS). The TMS studied in this work is fluid cooling. In fluid cooling, both effective heat conduction and heat convection are indispensable due to the heat transfer from solid to fluid. Correspondingly, an efficient TMS requires a design investigation of the following parameters: fluid inlet temperature, ESS initial temperature, fluid flow rate, working c rate, continuous working time, and materials properties. Their variation induces a change of thermal performance in the battery module, which is usually evaluated by numerical simulation. Compared to complicated computation resources and long computation time in simulation, the SAM is developed in this article to predict the thermal influence within a few seconds. In SAM, a fast prediction model is reckoned by combining numerical simulation with theoretical/empirical equations. The SAM can explore the thermal effect of boundary parameters in both steady-state and transient heat transfer scenarios within a short time. Therefore, the SAM developed in this work can simplify the design cycle of TMS and inspire more possibilities in TMS design.

Keywords: semi-analytic method, fast prediction model, thermal influence of boundary parameters, energy storage system

Procedia PDF Downloads 137
9803 Out-of-Plane Bending Properties of Out-of-Autoclave Thermosetting Prepregs during Forming Processes

Authors: Hassan A. Alshahrani, Mehdi H. Hojjati

Abstract:

In order to predict and model wrinkling which is caused by out of plane deformation due to compressive loading in the plane of the material during composite prepregs forming, it is necessary to quantitatively understand the relative magnitude of the bending stiffness. This study aims to examine the bending properties of out-of-autoclave (OOA) thermosetting prepreg under vertical cantilever test condition. A direct method for characterizing the bending behavior of composite prepregs was developed. The results from direct measurement were compared with results derived from an image-processing procedure that analyses the captured image during the vertical bending test. A numerical simulation was performed using ABAQUS to confirm the bending stiffness value.

Keywords: Bending stiffness, out-of-autoclave prepreg, forming process, numerical simulation.

Procedia PDF Downloads 287
9802 Estimation of Missing Values in Aggregate Level Spatial Data

Authors: Amitha Puranik, V. S. Binu, Seena Biju

Abstract:

Missing data is a common problem in spatial analysis especially at the aggregate level. Missing can either occur in covariate or in response variable or in both in a given location. Many missing data techniques are available to estimate the missing data values but not all of these methods can be applied on spatial data since the data are autocorrelated. Hence there is a need to develop a method that estimates the missing values in both response variable and covariates in spatial data by taking account of the spatial autocorrelation. The present study aims to develop a model to estimate the missing data points at the aggregate level in spatial data by accounting for (a) Spatial autocorrelation of the response variable (b) Spatial autocorrelation of covariates and (c) Correlation between covariates and the response variable. Estimating the missing values of spatial data requires a model that explicitly account for the spatial autocorrelation. The proposed model not only accounts for spatial autocorrelation but also utilizes the correlation that exists between covariates, within covariates and between a response variable and covariates. The precise estimation of the missing data points in spatial data will result in an increased precision of the estimated effects of independent variables on the response variable in spatial regression analysis.

Keywords: spatial regression, missing data estimation, spatial autocorrelation, simulation analysis

Procedia PDF Downloads 364
9801 The Use of Methods and Techniques of Drama Education with Kindergarten Teachers

Authors: Vladimira Hornackova, Jana Kottasova, Zuzana Vanova, Anna Jungrova

Abstract:

Present study deals with drama education in preschool education. The research made in this field brings a qualitative comparative survey with the aim to find out the use of methods and techniques of drama education in preschool education at university or secondary school graduate preschool teachers. The research uses a content analysis and an unstandardized questionnaire for preschool teachers and obtained data are processed with the help of descriptive methods and correlations. The results allow a comparison of aspects applied through drama in preschool education. The research brings impulses for education improvement in kindergartens and inspiration for university study programs of drama education in the professional training of preschool teachers.

Keywords: drama education, preschool education, preschool teacher, research

Procedia PDF Downloads 352
9800 Efficacy of a Wiener Filter Based Technique for Speech Enhancement in Hearing Aids

Authors: Ajish K. Abraham

Abstract:

Hearing aid is the most fundamental technology employed towards rehabilitation of persons with sensory neural hearing impairment. Hearing in noise is still a matter of major concern for many hearing aid users and thus continues to be a challenging issue for the hearing aid designers. Several techniques are being currently used to enhance the speech at the hearing aid output. Most of these techniques, when implemented, result in reduction of intelligibility of the speech signal. Thus the dissatisfaction of the hearing aid user towards comprehending the desired speech amidst noise is prevailing. Multichannel Wiener Filter is widely implemented in binaural hearing aid technology for noise reduction. In this study, Wiener filter based noise reduction approach is experimented for a single microphone based hearing aid set up. This method checks the status of the input speech signal in each frequency band and then selects the relevant noise reduction procedure. Results showed that the Wiener filter based algorithm is capable of enhancing speech even when the input acoustic signal has a very low Signal to Noise Ratio (SNR). Performance of the algorithm was compared with other similar algorithms on the basis of improvement in intelligibility and SNR of the output, at different SNR levels of the input speech. Wiener filter based algorithm provided significant improvement in SNR and intelligibility compared to other techniques.

Keywords: hearing aid output speech, noise reduction, SNR improvement, Wiener filter, speech enhancement

Procedia PDF Downloads 236
9799 Observing Sustainability: Case Studies of Chandigarh Boutiques and Their Textile Waste Reuse

Authors: Prabhdip Brar

Abstract:

Since the ancient times recycling, reusing and upcycling has been strongly practiced in India. However, previously reprocess was common due to lack of resources and availability of free time, especially with women who were homemakers. The upward strategy of design philosophy and drift of sustainability is sustainable fashion which is also termed eco fashion, the aspiration of which is to craft a classification which can be supported ad infinitum in terms of environmentalism and social responsibility. The viable approach of sustaining fashion is part of the larger trend of justifiable design where a product is generated and produced while considering its social impact to the environment. The purpose of this qualitative research paper is to find out if the apparel design boutiques in Chandigarh, (an educated fashion-conscious city) are contributing towards making conscious efforts with the re-use of environmentally responsive materials to rethink about eco-conscious traditional techniques and socially responsible approaches of the invention. Observation method and case studies of ten renowned boutiques of Chandigarh were conducted to find out about the creativity of their waste management and social contribution. Owners were interviewed with open-ended questions to find out their understanding of sustainability. This paper concludes that there are many sustainable ideas existing within India from olden times that can be incorporated into modern manufacturing techniques. The results showed all the designers are aware of sustainability as a concept. In all practical purposes, a patch of fabric is being used for bindings or one over the other as surface ornamentation techniques. Plain Fabrics and traditional prints and fabrics are valued more by the owners for using on other garments. Few of them sort their leftover pieces according to basic colors. Few boutique owners preferred donating it to Non-Government organizations. Still, they have enough waste which is not utilized because of lack of time and labor. This paper discusses how the Indian traditional techniques still derive influences though design and techniques, making India one of the contributing countries to the sustainability of fashion and textiles.

Keywords: eco-fashion textile, sustainable textiles, sustainability in india, waste management

Procedia PDF Downloads 96
9798 Renewable Integration Algorithm to Compensate Photovoltaic Power Using Battery Energy Storage System

Authors: Hyung Joo Lee, Jin Young Choi, Gun Soo Park, Kyo Sun Oh, Dong Jun Won

Abstract:

The fluctuation of the output of the renewable generator caused by weather conditions must be mitigated because it imposes strain on the system and adversely affects power quality. In this paper, we focus on mitigating the output fluctuation of the photovoltaic (PV) using battery energy storage system (BESS). To satisfy tight conditions of system, proposed algorithm is developed. This algorithm focuses on adjusting the integrated output curve considering state of capacity (SOC) of the battery. In this paper, the simulation model is PSCAD / EMTDC software. SOC of the battery and the overall output curve are shown using the simulation results. We also considered losses and battery efficiency.

Keywords: photovoltaic generation, battery energy storage system, renewable integration, power smoothing

Procedia PDF Downloads 268
9797 Micromechanical Modelling of Ductile Damage with a Cohesive-Volumetric Approach

Authors: Noe Brice Nkoumbou Kaptchouang, Pierre-Guy Vincent, Yann Monerie

Abstract:

The present work addresses the modelling and the simulation of crack initiation and propagation in ductile materials which failed by void nucleation, growth, and coalescence. One of the current research frameworks on crack propagation is the use of cohesive-volumetric approach where the crack growth is modelled as a decohesion of two surfaces in a continuum material. In this framework, the material behavior is characterized by two constitutive relations, the volumetric constitutive law relating stress and strain, and a traction-separation law across a two-dimensional surface embedded in the three-dimensional continuum. Several cohesive models have been proposed for the simulation of crack growth in brittle materials. On the other hand, the application of cohesive models in modelling crack growth in ductile material is still a relatively open field. One idea developed in the literature is to identify the traction separation for ductile material based on the behavior of a continuously-deforming unit cell failing by void growth and coalescence. Following this method, the present study proposed a semi-analytical cohesive model for ductile material based on a micromechanical approach. The strain localization band prior to ductile failure is modelled as a cohesive band, and the Gurson-Tvergaard-Needleman plasticity model (GTN) is used to model the behavior of the cohesive band and derived a corresponding traction separation law. The numerical implementation of the model is realized using the non-smooth contact method (NSCD) where cohesive models are introduced as mixed boundary conditions between each volumetric finite element. The present approach is applied to the simulation of crack growth in nuclear ferritic steel. The model provides an alternative way to simulate crack propagation using the numerical efficiency of cohesive model with a traction separation law directly derived from porous continuous model.

Keywords: ductile failure, cohesive model, GTN model, numerical simulation

Procedia PDF Downloads 134
9796 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 75
9795 Schematic Study of Groundwater Potential Zones in Granitic Terrain Using Remotesensing and GIS Techniques, in Miyapur and Bollaram Areas of Hyderabad, India

Authors: Ishrath, Tapas Kumar Chatterjee

Abstract:

The present study aims developing interpretation and evaluation to integrate various data types for management of existing water resources for sustainable use. Proper study should be followed based on the geomorphology of the area. Thematic maps such as lithology, base map, land use/land cover, geomorphology, drainage and lineaments maps are prepared to study the area by using area toposheet, IRS P6 and LISIII Satellite imagery. These thematic layers are finally integrated by using Arc GIS, Arc View, and software to prepare a ground water potential zones map of the study area. In this study, an integrated approach involving remote sensing and GIS techniques has successfully been used in identifying groundwater potential zones in the study area to classify them as good, moderate and poor. It has been observed that Pediplain shallow (PPS) has good recharge, Pediplain moderate (PPM) has moderately good recharge, Pediment Inselberg complex (PIC) has poor recharge and Inselberg (I) has no recharge. The study has concluded that remote sensing and GIS techniques are very efficient and useful for identifying ground water potential zones.

Keywords: satellite remote sensing, GIS, ground water potential zones, Miyapur

Procedia PDF Downloads 428
9794 Inversion of Electrical Resistivity Data: A Review

Authors: Shrey Sharma, Gunjan Kumar Verma

Abstract:

High density electrical prospecting has been widely used in groundwater investigation, civil engineering and environmental survey. For efficient inversion, the forward modeling routine, sensitivity calculation, and inversion algorithm must be efficient. This paper attempts to provide a brief summary of the past and ongoing developments of the method. It includes reviews of the procedures used for data acquisition, processing and inversion of electrical resistivity data based on compilation of academic literature. In recent times there had been a significant evolution in field survey designs and data inversion techniques for the resistivity method. In general 2-D inversion for resistivity data is carried out using the linearized least-square method with the local optimization technique .Multi-electrode and multi-channel systems have made it possible to conduct large 2-D, 3-D and even 4-D surveys efficiently to resolve complex geological structures that were not possible with traditional 1-D surveys. 3-D surveys play an increasingly important role in very complex areas where 2-D models suffer from artifacts due to off-line structures. Continued developments in computation technology, as well as fast data inversion techniques and software, have made it possible to use optimization techniques to obtain model parameters to a higher accuracy. A brief discussion on the limitations of the electrical resistivity method has also been presented.

Keywords: inversion, limitations, optimization, resistivity

Procedia PDF Downloads 351
9793 System for the Detecting of Fake Profiles on Online Social Networks Using Machine Learning and the Bio-Inspired Algorithms

Authors: Sekkal Nawel, Mahammed Nadir

Abstract:

The proliferation of online activities on Online Social Networks (OSNs) has captured significant user attention. However, this growth has been hindered by the emergence of fraudulent accounts that do not represent real individuals and violate privacy regulations within social network communities. Consequently, it is imperative to identify and remove these profiles to enhance the security of OSN users. In recent years, researchers have turned to machine learning (ML) to develop strategies and methods to tackle this issue. Numerous studies have been conducted in this field to compare various ML-based techniques. However, the existing literature still lacks a comprehensive examination, especially considering different OSN platforms. Additionally, the utilization of bio-inspired algorithms has been largely overlooked. Our study conducts an extensive comparison analysis of various fake profile detection techniques in online social networks. The results of our study indicate that supervised models, along with other machine learning techniques, as well as unsupervised models, are effective for detecting false profiles in social media. To achieve optimal results, we have incorporated six bio-inspired algorithms to enhance the performance of fake profile identification results.

Keywords: machine learning, bio-inspired algorithm, detection, fake profile, system, social network

Procedia PDF Downloads 54
9792 Numerical Simulation and Experimental Validation of the Hydraulic L-Shaped Check Ball Behavior

Authors: Shinji Kajiwara

Abstract:

The spring-driven ball-type check valve is one of the most important components of hydraulic systems: it controls the position of the ball and prevents backward flow. To simplify the structure, the spring must be eliminated, and to accomplish this, the flow pattern and the behavior of the check ball in L-shaped pipe must be determined. In this paper, we present a full-scale model of a check ball made of acrylic resin, and we determine the relationship between the initial position of the ball, the position and diameter of the inflow port. The check flow rate increases in a standard center inflow model, and it is possible to greatly decrease the check-flow rate by shifting the inflow from the center.

Keywords: hydraulics, pipe flow, numerical simulation, flow visualization, check ball, L-shaped pipe

Procedia PDF Downloads 288
9791 An Elegant Technique to Achieve ZCS in a Boost Converter Incorporating Complete Energy Transfer

Authors: Nagesh Vangala, Rayudu Mannam

Abstract:

Soft switching has attracted the interest of various researchers constantly. Many techniques are in vogue to achieve soft switching (ZVS and/or ZCS) in Boost converters. These techniques utilize an auxiliary switch to incorporate the ZCS/ZVS. Such schemes require additional control circuit and induce complexity in design. This paper proposes an elegant fly back approach which guarantees zero current switching of the main Switch without the need for any additional active device. A simple flyback transformer scheme is implemented which absorbs the initial turn ON energy (or the Reverse recovery energy of Boost diode) and delivers to the output.

Keywords: boost converter, complete energy transfer, flyback, zero current switching

Procedia PDF Downloads 377
9790 BIM Application and Construction Schedule Simulation for the Horizontal Work Area

Authors: Hyeon-Seong Kim, Sang-Mi Park, Seul-Gi Kim, Seon-Ju Han, Leen-Seok Kang

Abstract:

The use of BIM, including 4D CAD system, in a construction project is gradually increasing. Since the building construction works repeatedly in the vertical space, it is relatively easy to confirm the interference effect when applying the BIM, but the interference effect for the civil engineering project is relatively small because the civil works perform non-repetitive processes in the horizontal space. For this reason, it is desirable to apply BIM to the construction phase when applying BIM to the civil engineering project, and the most active BIM tool applied to the construction phase is the 4D CAD function for the schedule management. This paper proposes the application procedure of BIM by the construction phase of civil engineering project and a linear 4D CAD construction methodology suitable for the civil engineering project in which linear work is performed.

Keywords: BIM, 4D CAD, linear 4D simulation, VR

Procedia PDF Downloads 386