Search results for: connected graph
670 Monitoring Synthesis of Biodiesel through Online Density Measurements
Authors: Arnaldo G. de Oliveira, Jr, Matthieu Tubino
Abstract:
The transesterification process of triglycerides with alcohols that occurs during the biodiesel synthesis causes continuous changes in several physical properties of the reaction mixture, such as refractive index, viscosity and density. Amongst them, density can be an useful parameter to monitor the reaction, in order to predict the composition of the reacting mixture and to verify the conversion of the oil into biodiesel. In this context, a system was constructed in order to continuously determine changes in the density of the reacting mixture containing soybean oil, methanol and sodium methoxide (30 % w/w solution in methanol), stirred at 620 rpm at room temperature (about 27 °C). A polyethylene pipe network connected to a peristaltic pump was used in order to collect the mixture and pump it through a coil fixed on the plate of an analytical balance. The collected mass values were used to trace a curve correlating the mass of the system to the reaction time. The density variation profile versus the time clearly shows three different steps: 1) the dispersion of methanol in oil causes a decrease in the system mass due to the lower alcohol density followed by stabilization; 2) the addition of the catalyst (sodium methoxide) causes a larger decrease in mass compared to the first step (dispersion of methanol in oil) because of the oil conversion into biodiesel; 3) the final stabilization, denoting the end of the reaction. This density variation profile provides information that was used to predict the composition of the mixture over the time and the reaction rate. The precise knowledge of the duration of the synthesis means saving time and resources on a scale production system. This kind of monitoring provides several interesting features such as continuous measurements without collecting aliquots.Keywords: biodiesel, density measurements, online continuous monitoring, synthesis
Procedia PDF Downloads 575669 The Inhibition of Sexual Pleasure and Its Associations with Cultural Messages
Authors: Fabiola Trejo Perez, Rolando Diaz Loving
Abstract:
Sexual pleasure consists of the positively valued feelings induced by sexual stimuli, but it is also weighed down by pop-psychological baggage, and subjected to cross-cultural and cross-historical variation. Social and individual interpretations of what can or can’t be considered as pleasurable are intertwined with culture’s predominant values, norms and beliefs. For each culture, sexual norms work as a guide to be followed in order to model socially accepted behaviors. Therefore, cultural messages regarding sexuality are usually directed to restrict men and women from enjoyment, sexual satisfaction and specifically orgasm. Given that sexual pleasure hasn’t been recognized as an accepted topic of open discussion, particularly for women, people have to eventually complement their knowledge using their own experience filling in the blanks from what little has been said. Thus, this research aims to identify which are the particular social messages associated with the easing or inhibition of sexual pleasure. Three hundred Mexican men and women ages 25 to 35 years old answered a self-report survey composed by the Inventory of facilitators and inhibitors of sexual pleasure and the Sexual premises questionnaire via pencil-paper and online. Results show a high endorsement to double standard messages associated with higher levels of sexual pleasure inhibitors like feeling pressured to have sexual activity, guilt and inability to reach orgasm, in contrast with people who endorse more permissive norms and beliefs, feeling connected to their sexual partners and confident with themselves. These results illustrate that the shaping of sexuality, from experience to society, is comprised of an important relationship between culture and sexual pleasure.Keywords: culture, sexual double standard, sexual norms and beliefs, sexual pleasure
Procedia PDF Downloads 222668 A Human Centered Design of an Exoskeleton Using Multibody Simulation
Authors: Sebastian Kölbl, Thomas Reitmaier, Mathias Hartmann
Abstract:
Trial and error approaches to adapt wearable support structures to human physiology are time consuming and elaborate. However, during preliminary design, the focus lies on understanding the interaction between exoskeleton and the human body in terms of forces and moments, namely body mechanics. For the study at hand, a multi-body simulation approach has been enhanced to evaluate actual forces and moments in a human dummy model with and without a digital mock-up of an active exoskeleton. Therefore, different motion data have been gathered and processed to perform a musculosceletal analysis. The motion data are ground reaction forces, electromyography data (EMG) and human motion data recorded with a marker-based motion capture system. Based on the experimental data, the response of the human dummy model has been calibrated. Subsequently, the scalable human dummy model, in conjunction with the motion data, is connected with the exoskeleton structure. The results of the human-machine interaction (HMI) simulation platform are in particular resulting contact forces and human joint forces to compare with admissible values with regard to the human physiology. Furthermore, it provides feedback for the sizing of the exoskeleton structure in terms of resulting interface forces (stress justification) and the effect of its compliance. A stepwise approach for the setup and validation of the modeling strategy is presented and the potential for a more time and cost-effective development of wearable support structures is outlined.Keywords: assistive devices, ergonomic design, inverse dynamics, inverse kinematics, multibody simulation
Procedia PDF Downloads 162667 NANCY: Combining Adversarial Networks with Cycle-Consistency for Robust Multi-Modal Image Registration
Authors: Mirjana Ruppel, Rajendra Persad, Amit Bahl, Sanja Dogramadzi, Chris Melhuish, Lyndon Smith
Abstract:
Multimodal image registration is a profoundly complex task which is why deep learning has been used widely to address it in recent years. However, two main challenges remain: Firstly, the lack of ground truth data calls for an unsupervised learning approach, which leads to the second challenge of defining a feasible loss function that can compare two images of different modalities to judge their level of alignment. To avoid this issue altogether we implement a generative adversarial network consisting of two registration networks GAB, GBA and two discrimination networks DA, DB connected by spatial transformation layers. GAB learns to generate a deformation field which registers an image of the modality B to an image of the modality A. To do that, it uses the feedback of the discriminator DB which is learning to judge the quality of alignment of the registered image B. GBA and DA learn a mapping from modality A to modality B. Additionally, a cycle-consistency loss is implemented. For this, both registration networks are employed twice, therefore resulting in images ˆA, ˆB which were registered to ˜B, ˜A which were registered to the initial image pair A, B. Thus the resulting and initial images of the same modality can be easily compared. A dataset of liver CT and MRI was used to evaluate the quality of our approach and to compare it against learning and non-learning based registration algorithms. Our approach leads to dice scores of up to 0.80 ± 0.01 and is therefore comparable to and slightly more successful than algorithms like SimpleElastix and VoxelMorph.Keywords: cycle consistency, deformable multimodal image registration, deep learning, GAN
Procedia PDF Downloads 131666 Deep Well-Grounded Magnetite Anode Chains Retrieval and Installation for Raslanuf Complex Impressed Current Cathodic Protection System Rectification
Authors: Mohamed Ahmed Khalil
Abstract:
The number of deep well anode ground beds (GBs) have been retrieved due to unoperated anode chains. New identical magnetite anode chains (MAC) have been installed at Raslanuf complex impressed current Cathodic protection (ICCP) system, distributed at different plants (Utility, ethylene and polyethylene). All problems associated with retrieving and installation of MACs have been discussed, rectified and presented. All GB-associated severely corroded wellhead casings were well maintained and/or replaced by new fabricated and modified ones. The main cause of the wellhead casing's severe internal corrosion was discussed and the conducted remedy action to overcome future corrosion problems is presented. All GB-connected anode junction boxes (AJBs) and shunts were closely inspected, maintained and necessary replacement and/or modifications were carried out on shunts. All damaged GB concrete foundations (CF) have been inspected and completely replaced. All GB-associated Transformer-Rectifiers Units (TRU) were subjected to thorough inspection and necessary maintenance was performed on each individual TRU. After completion of all MACs and TRU maintenance activities, each cathodic protection station (CPS) has been re-operated, alternative current (AC), direct current (DC), voltage and structure to soil potential (S/P) measurements have been conducted, recorded and all obtained test results are presented. DC current outputs have been adjusted and DC current outputs of each MAC have been recorded for each GB AJB.Keywords: magnetite anodes, deep well, ground beds, cathodic protection, transformer rectifier, impressed current, junction boxes
Procedia PDF Downloads 119665 Speech Detection Model Based on Deep Neural Networks Classifier for Speech Emotions Recognition
Authors: Aisultan Shoiynbek, Darkhan Kuanyshbay, Paulo Menezes, Akbayan Bekarystankyzy, Assylbek Mukhametzhanov, Temirlan Shoiynbek
Abstract:
Speech emotion recognition (SER) has received increasing research interest in recent years. It is a common practice to utilize emotional speech collected under controlled conditions recorded by actors imitating and artificially producing emotions in front of a microphone. There are four issues related to that approach: emotions are not natural, meaning that machines are learning to recognize fake emotions; emotions are very limited in quantity and poor in variety of speaking; there is some language dependency in SER; consequently, each time researchers want to start work with SER, they need to find a good emotional database in their language. This paper proposes an approach to create an automatic tool for speech emotion extraction based on facial emotion recognition and describes the sequence of actions involved in the proposed approach. One of the first objectives in the sequence of actions is the speech detection issue. The paper provides a detailed description of the speech detection model based on a fully connected deep neural network for Kazakh and Russian. Despite the high results in speech detection for Kazakh and Russian, the described process is suitable for any language. To investigate the working capacity of the developed model, an analysis of speech detection and extraction from real tasks has been performed.Keywords: deep neural networks, speech detection, speech emotion recognition, Mel-frequency cepstrum coefficients, collecting speech emotion corpus, collecting speech emotion dataset, Kazakh speech dataset
Procedia PDF Downloads 26664 Long-Term Sitting Posture Identifier Connected with Cloud Service
Authors: Manikandan S. P., Sharmila N.
Abstract:
Pain in the neck, intermediate and anterior, and even low back may occur in one or more locations. Numerous factors can lead to back discomfort, which can manifest into sensations in the other parts of your body. Up to 80% of people will have low back problems at a certain stage of their lives, making spine-related pain a highly prevalent ailment. Roughly twice as commonly as neck pain, low back discomfort also happens about as often as knee pain. According to current studies, using digital devices for extended periods of time and poor sitting posture are the main causes of neck and low back pain. There are numerous monitoring techniques provided to enhance the sitting posture for the aforementioned problems. A sophisticated technique to monitor the extended sitting position is suggested in this research based on this problem. The system is made up of an inertial measurement unit, a T-shirt, an Arduino board, a buzzer, and a mobile app with cloud services. Based on the anatomical position of the spinal cord, the inertial measurement unit was positioned on the inner back side of the T-shirt. The IMU (inertial measurement unit) sensor will evaluate the hip position, imbalanced shoulder, and bending angle. Based on the output provided by the IMU, the data will be analyzed by Arduino, supplied through the cloud, and shared with a mobile app for continuous monitoring. The buzzer will sound if the measured data is mismatched with the human body's natural position. The implementation and data prediction with design to identify balanced and unbalanced posture using a posture monitoring t-shirt will be further discussed in this research article.Keywords: IMU, posture, IOT, textile
Procedia PDF Downloads 89663 Analyzing the Commentator Network Within the French YouTube Environment
Authors: Kurt Maxwell Kusterer, Sylvain Mignot, Annick Vignes
Abstract:
To our best knowledge YouTube is the largest video hosting platform in the world. A high number of creators, viewers, subscribers and commentators act in this specific eco-system which generates huge sums of money. Views, subscribers, and comments help to increase the popularity of content creators. The most popular creators are sponsored by brands and participate in marketing campaigns. For a few of them, this becomes a financially rewarding profession. This is made possible through the YouTube Partner Program, which shares revenue among creators based on their popularity. We believe that the role of comments in increasing the popularity is to be emphasized. In what follows, YouTube is considered as a bilateral network between the videos and the commentators. Analyzing a detailed data set focused on French YouTubers, we consider each comment as a link between a commentator and a video. Our research question asks what are the predominant features of a video which give it the highest probability to be commented on. Following on from this question, how can we use these features to predict the action of the agent in commenting one video instead of another, considering the characteristics of the commentators, videos, topics, channels, and recommendations. We expect to see that the videos of more popular channels generate higher viewer engagement and thus are more frequently commented. The interest lies in discovering features which have not classically been considered as markers for popularity on the platform. A quick view of our data set shows that 96% of the commentators comment only once on a certain video. Thus, we study a non-weighted bipartite network between commentators and videos built on the sub-sample of 96% of unique comments. A link exists between two nodes when a commentator makes a comment on a video. We run an Exponential Random Graph Model (ERGM) approach to evaluate which characteristics influence the probability of commenting a video. The creation of a link will be explained in terms of common video features, such as duration, quality, number of likes, number of views, etc. Our data is relevant for the period of 2020-2021 and focuses on the French YouTube environment. From this set of 391 588 videos, we extract the channels which can be monetized according to YouTube regulations (channels with at least 1000 subscribers and more than 4000 hours of viewing time during the last twelve months).In the end, we have a data set of 128 462 videos which consist of 4093 channels. Based on these videos, we have a data set of 1 032 771 unique commentators, with a mean of 2 comments per a commentator, a minimum of 1 comment each, and a maximum of 584 comments.Keywords: YouTube, social networks, economics, consumer behaviour
Procedia PDF Downloads 68662 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 80661 The Integration of ICT in EFL Classroom and Its Impact on Teacher Development
Authors: Tayaa Karima, Bouaziz Amina
Abstract:
Today's world is knowledge-based; everything we do is somehow connected with technology which it has a remarkable influence on socio-cultural and economic developments, including educational settings. This type of technology is supported in many teaching/learning setting where the medium of instruction is through computer technology, and particularly involving digital technologies. There has been much debate over the use of computers and the internet in foreign language teaching for more than two decades. Various studies highlights that the integration of Information Communications Technology (ICT) in foreign language teaching will have positive effects on both the teachers and students to help them be aware of the modernized world and meet the current demands of the globalised world. Information and communication technology has been gradually integrated in foreign learning environment as a platform for providing learners with learning opportunities. Thus, the impact of ICT on language teaching and learning has been acknowledged globally, this is because of the fundamental role that it plays in the enhancement of teaching and learning quality, modify the pedagogical practice, and motivate learners. Due to ICT related developments, many Maghreb countries regard ICT as a tool for changes and innovations in education. Therefore, the ministry of education attempted to set up computer laboratories and provide internet connection in the schools. Investment in ICT for educational innovations and improvement purposes has been continuing the need of teacher who will employ it in the classroom as vital role of the curriculum. ICT does not have an educational value in itself, but it becomes precious when teachers use it in learning and teaching process. This paper examines the impacts of ICT on teacher development rather than on teaching quality and highlights some challenges facing using ICT in the language learning/teaching.Keywords: information communications technology (ICT), integration, foreign language teaching, teacher development, learning opportunity
Procedia PDF Downloads 388660 Evolutionary Swarm Robotics: Dynamic Subgoal-Based Path Formation and Task Allocation for Exploration and Navigation in Unknown Environments
Authors: Lavanya Ratnabala, Robinroy Peter, E. Y. A. Charles
Abstract:
This research paper addresses the challenges of exploration and navigation in unknown environments from an evolutionary swarm robotics perspective. Path formation plays a crucial role in enabling cooperative swarm robots to accomplish these tasks. The paper presents a method called the sub-goal-based path formation, which establishes a path between two different locations by exploiting visually connected sub-goals. Simulation experiments conducted in the Argos simulator demonstrate the successful formation of paths in the majority of trials. Furthermore, the paper tackles the problem of inter-collision (traffic) among a large number of robots engaged in path formation, which negatively impacts the performance of the sub-goal-based method. To mitigate this issue, a task allocation strategy is proposed, leveraging local communication protocols and light signal-based communication. The strategy evaluates the distance between points and determines the required number of robots for the path formation task, reducing unwanted exploration and traffic congestion. The performance of the sub-goal-based path formation and task allocation strategy is evaluated by comparing path length, time, and resource reduction against the A* algorithm. The simulation experiments demonstrate promising results, showcasing the scalability, robustness, and fault tolerance characteristics of the proposed approach.Keywords: swarm, path formation, task allocation, Argos, exploration, navigation, sub-goal
Procedia PDF Downloads 42659 Social Distancing as a Population Game in Networked Social Environments
Authors: Zhijun Wu
Abstract:
While social living is considered to be an indispensable part of human life in today's ever-connected world, social distancing has recently received much public attention on its importance since the outbreak of the coronavirus pandemic. In fact, social distancing has long been practiced in nature among solitary species and has been taken by humans as an effective way of stopping or slowing down the spread of infectious diseases. A social distancing problem is considered for how a population, when in the world with a network of social sites, decides to visit or stay at some sites while avoiding or closing down some others so that the social contacts across the network can be minimized. The problem is modeled as a population game, where every individual tries to find some network sites to visit or stay so that he/she can minimize all his/her social contacts. In the end, an optimal strategy can be found for everyone when the game reaches an equilibrium. The paper shows that a large class of equilibrium strategies can be obtained by selecting a set of social sites that forms a so-called maximal r-regular subnetwork. The latter includes many well-studied network types, which are easy to identify or construct and can be completely disconnected (with r = 0) for the most-strict isolation or allow certain degrees of connectivity (with r > 0) for more flexible distancing. The equilibrium conditions of these strategies are derived. Their rigidity and flexibility are analyzed on different types of r-regular subnetworks. It is proved that the strategies supported by maximal 0-regular subnetworks are strictly rigid, while those by general maximal r-regular subnetworks with r > 0 are flexible, though some can be weakly rigid. The proposed model can also be extended to weighted networks when different contact values are assigned to different network sites.Keywords: social distancing, mitigation of spread of epidemics, populations games, networked social environments
Procedia PDF Downloads 133658 Optimizing Groundwater Pumping for a Complex Groundwater/Surface Water System
Authors: Emery A. Coppola Jr., Suna Cinar, Ferenc Szidarovszky
Abstract:
Over-pumping of groundwater resources is a serious problem world-wide. In addition to depleting this valuable resource, hydraulically connected sensitive ecological resources like wetlands and surface water bodies are often impacted and even destroyed by over-pumping. Effectively managing groundwater in a way that satisfy human demand while preserving natural resources is a daunting challenge that will only worsen with growing human populations and climate change. As presented in this paper, a numerical flow model developed for a hypothetical but realistic groundwater/surface water system was combined with formal optimization. Response coefficients were used in an optimization management model to maximize groundwater pumping in a complex, multi-layered aquifer system while protecting against groundwater over-draft, streamflow depletion, and wetland impacts. Pumping optimization was performed for different constraint sets that reflect different resource protection preferences, yielding significantly different optimal pumping solutions. A sensitivity analysis on the optimal solutions was performed on select response coefficients to identify differences between wet and dry periods. Stochastic optimization was also performed, where uncertainty associated with changing irrigation demand due to changing weather conditions are accounted for. One of the strengths of this optimization approach is that it can efficiently and accurately identify superior management strategies that minimize risk and adverse environmental impacts associated with groundwater pumping under different hydrologic conditions.Keywords: numerical groundwater flow modeling, water management optimization, groundwater overdraft, streamflow depletion
Procedia PDF Downloads 233657 Development of a Matlab® Program for the Bi-Dimensional Truss Analysis Using the Stiffness Matrix Method
Authors: Angel G. De Leon Hernandez
Abstract:
A structure is defined as a physical system or, in certain cases, an arrangement of connected elements, capable of bearing certain loads. The structures are presented in every part of the daily life, e.g., in the designing of buildings, vehicles and mechanisms. The main goal of a structure designer is to develop a secure, aesthetic and maintainable system, considering the constraint imposed to every case. With the advances in the technology during the last decades, the capabilities of solving engineering problems have increased enormously. Nowadays the computers, play a critical roll in the structural analysis, pitifully, for university students the vast majority of these software are inaccessible due to the high complexity and cost they represent, even when the software manufacturers offer student versions. This is exactly the reason why the idea of developing a more reachable and easy-to-use computing tool. This program is designed as a tool for the university students enrolled in courser related to the structures analysis and designs, as a complementary instrument to achieve a better understanding of this area and to avoid all the tedious calculations. Also, the program can be useful for graduated engineers in the field of structural design and analysis. A graphical user interphase is included in the program to make it even simpler to operate it and understand the information requested and the obtained results. In the present document are included the theoretical basics in which the program is based to solve the structural analysis, the logical path followed in order to develop the program, the theoretical results, a discussion about the results and the validation of those results.Keywords: stiffness matrix method, structural analysis, Matlab® applications, programming
Procedia PDF Downloads 122656 Islamisation and Actor Networking in Halal Tourism: A Case Study in Central Java, Indonesia
Authors: Hariyadi, Rili Windiasih
Abstract:
Halal tourism is a recent global phenomenon that emerged out of the needs of Muslim tourists. However, works on halal tourism rarely discuss the connection of it to the rising religiosity in Indonesia since halal tourism has been mostly studied in the sphere of tourism, business, and management studies. A few works on the increase of Islamic expressions in Indonesia do mention the recent booming of non-mandatory pilgrimage to Mecca and the emergence of sharia compliant accommodation, yet they do not go into details on the issue. To our best knowledge, there is a lack of more critical, cultural political studies on halal tourism in which the paper attempts to fill in. The paper is a result of fieldwork research in Central Java, Indonesia. The study focuses on sacred sites for pilgrimage and sharia-compliant hotels. It combines in-depth interviews and participatory observation methods to gather the data. It is important for us to take a look at the network of halal tourism actors (businessperson, local government, clerics, etc.) in Central Java, how they conceive halal tourism, and how their networking shape halal tourism discourses, policies, and practices. Despite having numerous Islamic pilgrimage places and being designated by the Ministry of Tourism as one of 12 Muslim friendly tourist destinations, the province is not yet widely recognised as the main destination for halal tourism as it is known as the place for more secular, nationalist groups rather than for more Islamic oriented ones. However, in some of its municipalities, there is increasingly more attention to develop halal tourism. In this study, we found out that the development of halal tourism in Central Java connected to dynamics of Islamisation and ideological competition as well as the influence of the more pragmatist businesspersons in a 'nationalist province' in Indonesia.Keywords: actor networking, halal tourism, Islamisation, Indonesia
Procedia PDF Downloads 169655 Numerical Study on the Flow around a Steadily Rotating Spring: Understanding the Propulsion of a Bacterial Flagellum
Authors: Won Yeol Choi, Sangmo Kang
Abstract:
The propulsion of a bacterial flagellum in a viscous fluid has attracted many interests in the field of biological hydrodynamics, but remains yet fully understood and thus still a challenging problem. In this study, therefore, we have numerically investigated the flow around a steadily rotating micro-sized spring to further understand such bacterial flagellum propulsion. Note that a bacterium gains thrust (propulsive force) by rotating the flagellum connected to the body through a bio motor to move forward. For the investigation, we convert the spring model from the micro scale to the macro scale using a similitude law (scale law) and perform simulations on the converted macro-scale model using a commercial software package, CFX v13 (ANSYS). To scrutinize the propulsion characteristics of the flagellum through the simulations, we make parameter studies by changing some flow parameters, such as the pitch, helical radius and rotational speed of the spring and the Reynolds number (or fluid viscosity), expected to affect the thrust force experienced by the rotating spring. Results show that the propulsion characteristics depend strongly on the parameters mentioned above. It is observed that the forward thrust increases in a linear fashion with either of the rotational speed or the fluid viscosity. In addition, the thrust is directly proportional to square of the helical radius and but the thrust force is increased and then decreased based on the peak value to the pitch. Finally, we also present the appropriate flow and pressure fields visualized to support the observations.Keywords: fluid viscosity, hydrodynamics, similitude, propulsive force
Procedia PDF Downloads 350654 Artificial Neural Networks Application on Nusselt Number and Pressure Drop Prediction in Triangular Corrugated Plate Heat Exchanger
Authors: Hany Elsaid Fawaz Abdallah
Abstract:
This study presents a new artificial neural network(ANN) model to predict the Nusselt Number and pressure drop for the turbulent flow in a triangular corrugated plate heat exchanger for forced air and turbulent water flow. An experimental investigation was performed to create a new dataset for the Nusselt Number and pressure drop values in the following range of dimensionless parameters: The plate corrugation angles (from 0° to 60°), the Reynolds number (from 10000 to 40000), pitch to height ratio (from 1 to 4), and Prandtl number (from 0.7 to 200). Based on the ANN performance graph, the three-layer structure with {12-8-6} hidden neurons has been chosen. The training procedure includes back-propagation with the biases and weight adjustment, the evaluation of the loss function for the training and validation dataset and feed-forward propagation of the input parameters. The linear function was used at the output layer as the activation function, while for the hidden layers, the rectified linear unit activation function was utilized. In order to accelerate the ANN training, the loss function minimization may be achieved by the adaptive moment estimation algorithm (ADAM). The ‘‘MinMax’’ normalization approach was utilized to avoid the increase in the training time due to drastic differences in the loss function gradients with respect to the values of weights. Since the test dataset is not being used for the ANN training, a cross-validation technique is applied to the ANN network using the new data. Such procedure was repeated until loss function convergence was achieved or for 4000 epochs with a batch size of 200 points. The program code was written in Python 3.0 using open-source ANN libraries such as Scikit learn, TensorFlow and Keras libraries. The mean average percent error values of 9.4% for the Nusselt number and 8.2% for pressure drop for the ANN model have been achieved. Therefore, higher accuracy compared to the generalized correlations was achieved. The performance validation of the obtained model was based on a comparison of predicted data with the experimental results yielding excellent accuracy.Keywords: artificial neural networks, corrugated channel, heat transfer enhancement, Nusselt number, pressure drop, generalized correlations
Procedia PDF Downloads 87653 Egalitarianism and Social Stratification: An Overview of the Caste System among the Southern Muslims of Sri Lanka
Authors: Mohamed Faslan
Abstract:
This paper describes how caste-based differentiation functions among the Southern Muslims of Sri Lanka despite Islamic egalitarian principles. Such differences are not promoted by religious teachings, mosques, or the various Islamic religious denominations. Instead, it underpins a hereditary, hierarchical stratification in social structure. Since Islam is against social stratification and promotes egalitarianism, what are the persuasive social structures that organize the existing caste system among Southern Muslims? To answer this puzzle, this paper discusses and analyses the caste system under these five subsections: ancestry; marriage; geography; mosque ownership or trustees; and occupation. The study of caste in Sri Lanka is generally compartmentalized into separate Sinhala and Tamil systems. Most caste studies have focused on the characteristics, upward mobility, or discrimination of specific castes in relation to other castes within ethnic systems. As an operational definition, in this paper, by “southern” or the south of Sri Lanka, I refer to the Kalutara, Galle and Matara Districts. This research was conducted in these three districts, and the respondents were selected purposively. Community history interviews were used as a tool for collecting information, and grounded theory used for analysis. Caste stratification among the Southern Muslims of Sri Lanka is directly connected to whether they are descended from Arab or South Indian ancestors. Arab ancestors are considered upper caste and South Indian ancestors are considered lower caste. Endogamy is the most serious driving factor keeping caste system functioning among Muslims while the other factors—geography, mosques, and occupations—work as supporting factors.Keywords: caste, social stratification, Sri Lanka Muslims, endogamy
Procedia PDF Downloads 173652 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security
Authors: Stanislaw Kosmynka
Abstract:
Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat
Procedia PDF Downloads 525651 ‘Undressed Star’, Sexual Scenes and Discourses in Mass Media: Exploring 1980s Taiwan Female Film Stars’ Onscreen Erotic Acting
Authors: Xinchen Zhu
Abstract:
In the history of Chinese-language film, female stars’ acting is connected with issues of national ideology, consumerism, and sexual politics. In the 1980s, Taiwan entered a period of ‘soft authoritarianism’ in which the economy prospered politics became more democratic, and mass culture became more diverse. Film censorship was more flexible and sexual scenes were increasingly shown on screen. Female stars’ bodies were eroticized and commercialized through sexual and nude scenes and, by challenging conservative film censorship and social taboos, became the focus of mass media. This article will explore how discourses in mass media constructed the erotic images of female stars and, conversely, impacted film censorship, filmmakers and film actresses in 1980s’ Taiwan. This article will regard the eroticized female film stars’ acting as a ‘field’ of internal interaction and continuous reproduction, where the ideology of male dominance and voices of female film stars conflict with each other. Based on textual analysis of female stars’ sexual acting and the debate in mass media, the argument is that the eroticized female bodies were gazed upon on and off the screen. In the discourses of mass media, the artistry of actresses’ erotic acting was not only ignored, devalued and delegitimized, these stars were also labelled as ‘undressed star’ or ‘nude star’ and construed as victims of the film industry. However, the female stars were able to speak through mass media platforms, emphasizing their efforts in erotic acting and highlighting modern female subjectivity.Keywords: sexual scenes, Taiwan female stars, erotic acting, discourses in mass media, female subjectivity
Procedia PDF Downloads 202650 Identification of Factors and Impacts on the Success of Implementing Extended Enterprise Resource Planning: Case Study of Manufacturing Industries in East Java, Indonesia
Authors: Zeplin Jiwa Husada Tarigan, Sautma Ronni Basana, Widjojo Suprapto
Abstract:
The ERP is integrating all data from various departments within the company into one data base. One department inputs the data and many other departments can access and use the data through the connected information system. As many manufacturing companies in Indonesia implement the ERP technology, many adjustments are to be made to align with the business process in the companies, especially the management policy and the competitive advantages. For companies that are successful in the initial implementation, they still have to maintain the process so that the initial success can develop along with the changing of business processes of the company. For companies which have already implemented the ERP successfully, they are still in need to maintain the system so that it can match up with the business development and changes. The continued success of the extended ERP implementation aims to achieve efficient and effective performance for the company. This research is distributing 100 questionnaires to manufacturing companies in East Java, Indonesia, which have implemented and have going live ERP for over five years. There are 90 returned questionnaires with ten disqualified questionnaires because they are from companies that implement ERP less than five years. There are only 80 questionnaires used as the data, with the response rate of 80%. Based on the data results and analysis with PLS (Partial Least Square), it is obtained that the organization commitment brings impacts to the user’s effectiveness and provides the adequate IT infrastructure. The user’s effectiveness brings impacts to the adequate IT infrastructure. The information quality of the company increases the implementation of the extended ERP in manufacturing companies in East Java, Indonesia.Keywords: organization commitment, adequate IT infrastructure, information quality, extended ERP implementation
Procedia PDF Downloads 167649 On the Added Value of Probabilistic Forecasts Applied to the Optimal Scheduling of a PV Power Plant with Batteries in French Guiana
Authors: Rafael Alvarenga, Hubert Herbaux, Laurent Linguet
Abstract:
The uncertainty concerning the power production of intermittent renewable energy is one of the main barriers to the integration of such assets into the power grid. Efforts have thus been made to develop methods to quantify this uncertainty, allowing producers to ensure more reliable and profitable engagements related to their future power delivery. Even though a diversity of probabilistic approaches was proposed in the literature giving promising results, the added value of adopting such methods for scheduling intermittent power plants is still unclear. In this study, the profits obtained by a decision-making model used to optimally schedule an existing PV power plant connected to batteries are compared when the model is fed with deterministic and probabilistic forecasts generated with two of the most recent methods proposed in the literature. Moreover, deterministic forecasts with different accuracy levels were used in the experiments, testing the utility and the capability of probabilistic methods of modeling the progressively increasing uncertainty. Even though probabilistic approaches are unquestionably developed in the recent literature, the results obtained through a study case show that deterministic forecasts still provide the best performance if accurate, ensuring a gain of 14% on final profits compared to the average performance of probabilistic models conditioned to the same forecasts. When the accuracy of deterministic forecasts progressively decreases, probabilistic approaches start to become competitive options until they completely outperform deterministic forecasts when these are very inaccurate, generating 73% more profits in the case considered compared to the deterministic approach.Keywords: PV power forecasting, uncertainty quantification, optimal scheduling, power systems
Procedia PDF Downloads 87648 Quantification of Hydrogen Sulfide and Methyl Mercaptan in Air Samples from a Waste Management Facilities
Authors: R. F. Vieira, S. A. Figueiredo, O. M. Freitas, V. F. Domingues, C. Delerue-Matos
Abstract:
The presence of sulphur compounds like hydrogen sulphide and mercaptans is one of the reasons for waste-water treatment and waste management being associated with odour emissions. In this context having a quantifying method for these compounds helps in the optimization of treatment with the goal of their elimination, namely biofiltration processes. The aim of this study was the development of a method for quantification of odorous gases in waste treatment plants air samples. A method based on head space solid phase microextraction (HS-SPME) coupled with gas chromatography - flame photometric detector (GC-FPD) was used to analyse H2S and Metil Mercaptan (MM). The extraction was carried out with a 75-μm Carboxen-polydimethylsiloxane fiber coating at 22 ºC for 20 min, and analysed by a GC 2010 Plus A from Shimadzu with a sulphur filter detector: splitless mode (0.3 min), the column temperature program was from 60 ºC, increased by 15 ºC/min to 100 ºC (2 min). The injector temperature was held at 250 ºC, and the detector at 260 ºC. For calibration curve a gas diluter equipment (digital Hovagas G2 - Multi Component Gas Mixer) was used to do the standards. This unit had two input connections, one for a stream of the dilute gas and another for a stream of nitrogen and an output connected to a glass bulb. A 40 ppm H2S and a 50 ppm MM cylinders were used. The equipment was programmed to the selected concentration, and it automatically carried out the dilution to the glass bulb. The mixture was left flowing through the glass bulb for 5 min and then the extremities were closed. This method allowed the calibration between 1-20 ppm for H2S and 0.02-0.1 ppm and 1-3.5 ppm for MM. Several quantifications of air samples from inlet and outlet of a biofilter operating in a waste management facility in the north of Portugal allowed the evaluation the biofilters performance.Keywords: biofiltration, hydrogen sulphide, mercaptans, quantification
Procedia PDF Downloads 476647 Power Angle Control Strategy of Virtual Synchronous Machine: A Novel Approach to Control Virtual Synchronous Machine
Authors: Shishir Lamichhane, Saurav Dulal, Bibek Gautam, Madan Thapa Magar, Indraman Tamrakar
Abstract:
Renewable energies such as wind turbines and solar photovoltaic have gained significance as a result of global environmental pollution and energy crises. These sources of energy are converted into electrical energy and delivered to end-users through the utility system. As a result of the widespread use of power electronics-based grid-interfacing technologies to accommodate renewable sources of energy, the prevalence of converters has expanded as well. As a result, the power system's rotating inertia is decreasing, endangering the utility grid's stability. The use of Virtual Synchronous Machine (VSM) technology has been proposed to overcome the grid stability problem due to low rotating inertia. The grid-connected inverter used in VSM can be controlled to emulate inertia, which replicates the external features of a synchronous generator. As a result, the rotating inertia is increased to support the power system's stability. A power angle control strategy is proposed in this paper and its model is simulated in MATLAB/Simulink to study the effects of parameter disturbances on the active power and frequency for a VSM. The system consists of a synchronous generator, which is modeled in such a way that the frequency drops to an unacceptable region during transient conditions due to a lack of inertia when VSM is not used. Then, the suggested model incorporating VSM emulates rotating inertia, injecting a controllable amount of energy into the grid during frequency transients to enhance transient stability.Keywords: damping constant, inertia–constant, ROCOF, transient stability, distributed sources
Procedia PDF Downloads 207646 Design and Simulation of a Radiation Spectrometer Using Scintillation Detectors
Authors: Waleed K. Saib, Abdulsalam M. Alhawsawi, Essam Banoqitah
Abstract:
The idea of this research is to design a radiation spectrometer using LSO scintillation detector coupled to a C series of SiPM (silicon photomultiplier). The device can be used to detects gamma and X-ray radiation. This device is also designed to estimates the activity of the source contamination. The SiPM will detect light in the visible range above the threshold and read them as counts. Three gamma sources were used for these experiments Cs-137, Am-241 and Co-60 with various activities. These sources are applied for four experiments operating the SiPM as a spectrometer, energy resolution, pile-up set and efficiency. The SiPM is connected to a MCA to perform as a spectrometer. Cerium doped Lutetium Silicate (Lu₂SiO₅) with light yield 26000 photons/Mev coupled with the SiPM. As a result, all the main features of the Cs-137, Am-241 and Co-60 are identified in MCA. The experiment shows how photon energy and probability of interaction are inversely related. Total attenuation reduces as photon energy increases. An analytical calculation was made to obtain the FWHM resolution for each gamma source. The FWHM resolution for Am-241 (59 keV) is 28.75 %, for Cs-137 (662 keV) is 7.85 %, for Co-60 (1173 keV) is 4.46 % and for Co-60 (1332 keV) is 3.70%. Moreover, the experiment shows that the dead time and counts number decreased when the pile-up rejection was disabled and the FWHM decreased when the pile-up was enabled. The efficiencies were calculated at four different distances from the detector 2, 4, 8 and 16 cm. The detection efficiency was observed to declined exponentially with increasing distance from the detector face. Conclusively, the SiPM board operated with an LSO scintillator crystal as a spectrometer. The SiPM energy resolution for the three gamma sources used was a decent comparison to other PMTs.Keywords: PMT, radiation, radiation detection, scintillation detectors, silicon photomultiplier, spectrometer
Procedia PDF Downloads 154645 Smart Campus Digital Twin: Basic Framework - Current State, Trends and Challenges
Authors: Enido Fabiano de Ramos, Ieda Kanashiro Makiya, Francisco I. Giocondo Cesar
Abstract:
This study presents an analysis of the Digital Twin concept applied to the academic environment, focusing on the development of a Digital Twin Smart Campus Framework. Using bibliometric analysis methodologies and literature review, the research investigates the evolution and applications of the Digital Twin in educational contexts, comparing these findings with the advances of Industry 4.0. It was identified gaps in the existing literature and highlighted the need to adapt Digital Twin principles to meet the specific demands of a smart campus. By integrating Industry 4.0 concepts such as automation, Internet of Things, and real-time data analytics, we propose an innovative framework for the successful implementation of the Digital Twin in academic settings. The results of this study provide valuable insights for university campus managers, allowing for a better understanding of the potential applications of the Digital Twin for operations, security, and user experience optimization. In addition, our framework offers practical guidance for transitioning from a digital campus to a digital twin smart campus, promoting innovation and efficiency in the educational environment. This work contributes to the growing literature on Digital Twins and Industry 4.0, while offering a specific and tailored approach to transforming university campuses into smart and connected spaces, high demanded by Society 5.0 trends. It is hoped that this framework will serve as a basis for future research and practical implementations in the field of higher education and educational technology.Keywords: smart campus, digital twin, industry 4.0, education trends, society 5.0
Procedia PDF Downloads 57644 Effects of Paternity: A Comparative Study to Analyze the Organization's Support in the Psychological Development of Children in India and USA
Authors: Aayushi Dalal
Abstract:
It is the mother who bears the child in her womb for 9 months. It is typically rooted in the Indian culture that it is solely the responsibility of women to take care of the children and as a result the gender roles are stereotyped. Instead of a 50-50 partnership in parenting the child, it is hackneyed that men take the responsibility of the bread earner while women nurture the children by staying at home. Thus, mothers are considered to be more psychologically connected to the children than fathers. But the current society is observing role dilution of parents which can create a gap in understanding from the organization’s perspective. This is the basis of the study. The emergence of women into the job market has forever changed how society views the traditional roles of fathers and mothers. Feminism and financial power has reformed the classic parenting model. This has given rise to a more open and flexible society consequently emphasizing the father's importance in the emotional well being of the child while also being capable caretakers and disciplinarians. This study focuses on analyzing the comparative differences of the father's role in the psychological development of the child in India and USA while taking into consideration the organization’s support towards them. A sample size of 150 fathers- 75 from India and 75 from USA was selected and a structured survey was carried out which had several open ended as well as closed ended questions probing to the issue. It was made sure that the environmental factors had as minimal effect as possible on the subjects. The findings of this research would materialize a framework for fathers to understand the magnitude of their role in their child's upbringing. This would not only ameliorate the "father-child" relationship but also make organization more sympathetic towards their employees.Keywords: paternity, child development, psychology, gender role, organization policy
Procedia PDF Downloads 218643 Mudlogging, a Key Tool in Effective Well Delivery: A Case Study of Bisas Field Niger Delta, Nigeria
Authors: Segun Steven Bodunde
Abstract:
Mudlogging is the continuous analysis of rock cuttings and drilling fluids to ascertain the presence or absence of oil and gas from the formation penetrated by the drilling bit. This research highlighted a case study of Well BSS-99ST from ‘Bisas Field’, Niger Delta, with depth extending from 1950m to 3640m (Measured Depth). It was focused on identifying the lithologies encountered at specified depth intervals and to accurately delineate the targeted potential reservoir on the field and prepare the lithology and Master log. Equipment such as the Microscope, Fluoroscope, spin drier, oven, and chemicals, which includes: hydrochloric acid, chloroethene, and phenolphthalein, were used to check the cuttings for their calcareous nature, for oil show and for the presence of Cement respectively. Gas analysis was done using the gas chromatograph and the Flame Ionization Detector, which was connected to the Total Hydrocarbon Analyzer (THA). Drilling Parameters and Gas concentration logs were used alongside the lithology log to predict and accurately delineate the targeted reservoir on the field. The result showed continuous intercalation of sand and shale, with the presence of small quantities of siltstone at a depth of 2300m. The lithology log was generated using Log Plot software. The targeted reservoir was identified between 3478m to 3510m after inspection of the gas analysis, lithology log, electric logs, and the drilling parameters. Total gas of about 345 units and five Alkane Gas components were identified in the specific depth range. A comparative check with the Gamma ray log from the well further confirmed the lithologic sequence and the accurate delineation of the targeted potential reservoir using mudlogging.Keywords: mudlogging, chromatograph, drilling fluids, calcareous
Procedia PDF Downloads 150642 Leveraging Positive Psychology Practices to Elevate the Impact of Check-In, Check-Out (CICO) in Schools
Authors: Kimberli Breen
Abstract:
Background Check-In, Check-Out is noted as the most widely implemented evidence-based intervention for youth at-promise within schools. Over twenty years of peer-reviewed research demonstrates the powerful effects of this Positive Behavioral Interventions and Supports (PBIS) practice when implemented with fidelity. However, literature to date has not explicitly connected this intervention with Positive Psychology. Aims This session will illustrate the powerful role Positive Psychology and core elements of PERMA play in the worldwide success of this intervention and how more explicitly aligning Positive Behavioral Interventions and Supports (PBIS) practices with Positive Psychology might remove common barriers to current implementation. Method Students receiving the Check-In, Check-Out intervention experience a warm, positive greeting from a caring adult (CICO Coach) before entering their first class of the day. Teachers then provide high frequency positive feedback to the students at the end of each time block, or segment, of the day. An “optimistic close” to the day is then provided by the same CICO Coach at the end of the school day via the “check-out” process, where students assess the day’s accomplishments and goal-set for the next day. Results CICO clearly aligns with the Positive Psychology core elements of PERMA (Positive Emotion, Engagement, Relationships, Meaning and Accomplishments) and could be further strengthened through explicit integration. Conclusion The already powerful impact and reach of the Check-In, Check-Out intervention can be further enhanced and expanded through greater alignment with Positive Psychology elements and practices. Initiating this important alignment with CICO also offers promise for further integration of Positive Psychology and Positive Behavioral Interventions and Supports.Keywords: positive pscyhology, check-In check-out, schools, alignment
Procedia PDF Downloads 66641 “Fake It Till You Make It”: A Qualitative Study into the Well-being of Autistic Women
Authors: Kathleen Seers, Rachel Hogg
Abstract:
Diagnosis of Autism Spectrum Disorder (ASD) in women is increasing, prompting research into the presentation of female ASD and exploring why females are failing to meet the diagnostic threshold. One explanation is the use of masking behaviors, where traits of ASD are suppressed and gender-appropriate behaviors are mimicked to reduce the visibility and victimization of ASD girls. Current research explores ASD presentation and the lived experiences of ASD girls and adolescents; however, there is a paucity of literature in relation to the intra- and inter- psychic experiences of ASD women. Through a social constructionist framework, this qualitative study sought to understand how the construction of gender and the medicalisation of ASD influences women’s experiences of ASD. This study also explored the use and consequence of masking strategies and the impact this has on well-being. Eight women were interviewed, and three major themes were identified. The themes outline the influence of gender expectations and social norms on the women’s experiences, the significance of diagnosis to their identity, and the influence of the medicalization of ASD. Participants shared experiences of feeling different and internalizing blame for this difference. The feeling of difference was a major contributor to the women’s positive or negative mental well-being. The process of diagnosis allowed participants to create and confirm their identity. Diagnosis also led to improvements in well-being, however, the findings also explore the complexity of labeling individuals with a disorder and the difficulties that arise from the construct of ‘functionality’ for those with Autism. The study also explores the temporal nature of ASD and the changing experiences of women as they mature. It is hoped this study promotes discussion and provides clinicians and those connected to ASD women with insights into the support ASD women require to live authentic lives.Keywords: female autism, gender, masking, social constructionism
Procedia PDF Downloads 121