Search results for: Pfaffian solutions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3914

Search results for: Pfaffian solutions

2654 Chebyshev Collocation Method for Solving Heat Transfer Analysis for Squeezing Flow of Nanofluid in Parallel Disks

Authors: Mustapha Rilwan Adewale, Salau Ayobami Muhammed

Abstract:

This study focuses on the heat transfer analysis of magneto-hydrodynamics (MHD) squeezing flow between parallel disks, considering a viscous incompressible fluid. The upper disk exhibits both upward and downward motion, while the lower disk remains stationary but permeable. By employing similarity transformations, a system of nonlinear ordinary differential equations is derived to describe the flow behavior. To solve this system, a numerical approach, namely the Chebyshev collocation method, is utilized. The study investigates the influence of flow parameters and compares the obtained results with existing literature. The significance of this research lies in understanding the heat transfer characteristics of MHD squeezing flow, which has practical implications in various engineering and industrial applications. By employing the similarity transformations, the complex governing equations are simplified into a system of nonlinear ordinary differential equations, facilitating the analysis of the flow behavior. To obtain numerical solutions for the system, the Chebyshev collocation method is implemented. This approach provides accurate approximations for the nonlinear equations, enabling efficient computations of the heat transfer properties. The obtained results are compared with existing literature, establishing the validity and consistency of the numerical approach. The study's major findings shed light on the influence of flow parameters on the heat transfer characteristics of the squeezing flow. The analysis reveals the impact of parameters such as magnetic field strength, disk motion amplitude, fluid viscosity on the heat transfer rate between the disks, the squeeze number(S), suction/injection parameter(A), Hartman number(M), Prandtl number(Pr), modified Eckert number(Ec), and the dimensionless length(δ). These findings contribute to a comprehensive understanding of the system's behavior and provide insights for optimizing heat transfer processes in similar configurations. In conclusion, this study presents a thorough heat transfer analysis of magneto-hydrodynamics squeezing flow between parallel disks. The numerical solutions obtained through the Chebyshev collocation method demonstrate the feasibility and accuracy of the approach. The investigation of flow parameters highlights their influence on heat transfer, contributing to the existing knowledge in this field. The agreement of the results with previous literature further strengthens the reliability of the findings. These outcomes have practical implications for engineering applications and pave the way for further research in related areas.

Keywords: squeezing flow, magneto-hydro-dynamics (MHD), chebyshev collocation method(CCA), parallel manifolds, finite difference method (FDM)

Procedia PDF Downloads 77
2653 Comparative Analysis between Wired and Wireless Technologies in Communications: A Review

Authors: Jafaru Ibrahim, Tonga Agadi Danladi, Haruna Sani

Abstract:

Many telecommunications industry are looking for new ways to maximize their investment in communication networks while ensuring reliable and secure information transmission. There is a variety of communications medium solutions, the two must popularly in used are wireless technology and wired options, such as copper and fiber-optic cable. Wired network has proven its potential in the olden days but nowadays wireless communication has emerged as a robust and most intellect and preferred communication technique. Each of these types of communication medium has their advantages and disadvantages according to its technological characteristics. Wired and wireless networking has different hardware requirements, ranges, mobility, reliability and benefits. The aim of the paper is to compare both the Wired and Wireless medium on the basis of various parameters such as usability, cost, efficiency, flexibility, coverage, reliability, mobility, speed, security etc.

Keywords: cost, mobility, reliability, speed, security, wired, wireless

Procedia PDF Downloads 472
2652 Structuralism of Architectural Details in the Design of Modern High-Rise Buildings

Authors: Joanna Pietrzak, Anna Stefanska, Wieslaw Rokicki

Abstract:

Contemporary high-rise buildings constructed in recent years are often tremendous examples of original and unique architectural forms, being at the same time the affirmation of technical and technological progress accomplishments. The search for more efficient, sophisticated generations of structures also concerns the shaping of high-quality details. The concept of structural detail designing is connected with the rationalization of engineering solutions as well as through the optimisation and reduction of used material. Contemporary structural detail perceived through the development of building technologies is often a very aesthetic technical and material solution, which significantly influences the visual perception of architecture. Structural details are more often seen in shaping the forms of high-rise buildings, which are erected in many culturally different countries.

Keywords: aesthetic expression, high-rise buildings, structural detail, tall buildings

Procedia PDF Downloads 166
2651 End-of-Life Vehicle Framework in Bumper Development Process

Authors: Majid Davoodi Makinejad, Reza Ghaeli

Abstract:

Developing sustainable and environment-friendly products has become a major concern in the car manufacturing industry. New legislation ‘End of Life Vehicle’ increased design complexities of bumper system parameters e.g. design for disassembly, design for remanufacturing and recycling. ELV processing employs dismantling, shredding and landfill. The bumper is designed to prevent physical damage, reduce aerodynamic drag force as well as being aesthetically pleasing to the consumer. Design for dismantling is the first step in ELVs approach in the bumper system. This study focused on the analysis of ELV value in redesign solutions of the bumper system in comparison with the conventional concept. It provided a guideline to address the critical consideration in material, manufacturing and joining methods of bumper components to take advantages in easy dismounting, separation and recycling.

Keywords: sustainable development, environmental friendly, bumper system, end of life vehicle

Procedia PDF Downloads 387
2650 Ficus carica as Adsorbent for Removal of Phenol from Aqueous Solutions: Modeling and Optimization

Authors: Tizi Hayet, Berrama Tarek, Bounif Nadia

Abstract:

Phenol and its derivatives are organic compounds utilized in the chemical industry. They are introduced into the environment by accidental spills and the illegal release of industrial and municipal wastewater. Phenols are organic intermediaries that are considered potential pollutants. Adsorption is one of the purification and separation techniques used in this area. Algeria annually produces 131000 tons of fig; therefore, a large amount of fig leaves is generated, and the conversion of this waste into adsorbent allows the valorization of agricultural residue. The main purpose of this present work is to describe an application of a statistical method for modeling and to optimize the conditions of the phenol adsorption from agricultural by-products, locally available (fig leaves). The best experimental performance of phenol elimination on the adsorbent was obtained with: Adsorbent concentration (X₂) = 200 mg L⁻¹; Initial concentration (X₃) = 150 mg L⁻¹; Speed agitation (X₁) = 300 rpm.

Keywords: low-cost adsorbents, adsorption, fig leaves, phenol, factorial design

Procedia PDF Downloads 116
2649 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad

Abstract:

We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions.

Keywords: defense/attack strategies, large scale, networks, partitioning a network

Procedia PDF Downloads 285
2648 Protection and Safeguarding of Groundwater in Algeria between Law and Right to Use

Authors: Aziez Ouahiba, Remini Boualem, Habi Mohamed

Abstract:

The growth and the development of a pay are strongly related to the existence or the absence of water in this area, the sedentary lifestyle of the population makes that water demand is increasing and the different brandishing (dams, tablecloths or other) are increasingly solicited. In normal time rain and snow of the winter period reloads the slicks and the wadis that fill dams. Over these two decades, Global warming fact that temperature is increasingly high and rainfall is increasingly low, which induces a charge less and less important tablecloths, add to that the strong demand in irrigation. Our study will focus on the variation of rainfall and irrigation, Their effects on the degree of pollution of the groundwater in this area based on statistical analyses by the Xlstat (ACP, correlation...) software for a better explanation of these results and determine the hydrochemistry of different groups or polluted areas pou be able to offer adequate solutions for each area.

Keywords: water in the basement, legislation, over exploitation, pollution, water prices

Procedia PDF Downloads 382
2647 An Evaluation of English Collocation Usage Barriers Faced by College Students of Rawalpindi

Authors: Sobia Rana

Abstract:

The study intends to explain the problems of English collocational use faced by college students in Rawalpindi, Pakistan and recommends some authentic ways that will help in removing the learning barriers in light of the concerning methodological issues. It will not only help the students to improve their knowledge of the phenomena but will also enlighten the target teachers about the significance of authentic collocational use and how it naturalizes both written and spoken expressions. Data from both the students and teachers have been collected with the help of open/close-ended questionnaires to unearth the genuine cause/s and supplement them with the required solutions rooted in the actual problems. The students fail to use authentic collocations owing to multiple reasons: lack of awareness about English collocational use, improper teaching methodologies, and inexpert teachers.

Keywords: English collocational use, teaching methodologies, English learning barriers, vocabulary acquisition, college students of Rawalpindi

Procedia PDF Downloads 83
2646 Framework for Assessment of Non-financial Concentration Risk

Authors: Anchal Gupta

Abstract:

Amid the escalating digitalization and deployment of cross-border technological solutions, a significant portion of the industry and regulatory bodies have begun to pose queries concerning the formulation, computation, and contemplation of concentration risk. In the financial sector, well-established parameters exist for gauging the concentration of a portfolio and similar elements. However, a unified framework appears to be absent, which could guide industry and regulators pertaining to non-financial concentration risk. This paper introduces a framework, constructed on the foundation of multiple regulations where regulators are advocating for licensed corporations to evaluate their concentration risk. The lacuna lies in the fact that, while regulators delineate what constitutes concentration risk, unlike other domains, no guidelines are provided that could assist firms. This frequently results in ambiguity and individual corporate interpretation, which, from a risk management standpoint, is less than ideal.

Keywords: concentration risk, non-financial risk, government regulation, financial regulation, non-market risk, MAS, DORA, EDSP, SFC

Procedia PDF Downloads 42
2645 The Effects of Globalization on the Foreign Policy of the Islamic Republic of Iran in the 21st Century

Authors: Pouriya Angosht Baft, Farzan Safari Sabet

Abstract:

Globalization should be considered as a process that has affected all areas of human activity, including the foreign policy of countries. The phenomenon of globalization has created tremendous changes in the economic, political and cultural fields. Obviously, no country can keep itself away from the new global consequences and globalization process. Dealing with the world requires formulating a realistic and intelligent foreign policy. By examining the phenomenon of globalization and its impact on foreign policy, this article aims to provide solutions for formulating a more active and effective foreign policy. The conclusion of this research is that Iran's foreign policy has gradually moved towards more realism and maintaining and strengthening national interests in the changing world has been the focus of foreign policy makers and decision makers. Strengthening the course of more realism in the future should be at the center of formulating Iran's foreign policy.

Keywords: globalization, foreign policy, international relations, realism, iran

Procedia PDF Downloads 54
2644 Two-Stage Approach for Solving the Multi-Objective Optimization Problem on Combinatorial Configurations

Authors: Liudmyla Koliechkina, Olena Dvirna

Abstract:

The statement of the multi-objective optimization problem on combinatorial configurations is formulated, and the approach to its solution is proposed. The problem is of interest as a combinatorial optimization one with many criteria, which is a model of many applied tasks. The approach to solving the multi-objective optimization problem on combinatorial configurations consists of two stages; the first is the reduction of the multi-objective problem to the single criterion based on existing multi-objective optimization methods, the second stage solves the directly replaced single criterion combinatorial optimization problem by the horizontal combinatorial method. This approach provides the optimal solution to the multi-objective optimization problem on combinatorial configurations, taking into account additional restrictions for a finite number of steps.

Keywords: discrete set, linear combinatorial optimization, multi-objective optimization, Pareto solutions, partial permutation set, structural graph

Procedia PDF Downloads 168
2643 Supervised Learning for Cyber Threat Intelligence

Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk

Abstract:

The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.

Keywords: threat information sharing, supervised learning, data classification, performance evaluation

Procedia PDF Downloads 150
2642 Ficus Carica as Adsorbent for Removal of Phenol from Aqueous Solutions: Modelling and Optimization

Authors: Tizi Hayet, Berrama Tarek, Bounif Nadia

Abstract:

Phenol and its derivatives are organic compounds utilized in the chemical industry. They are introduced into the environment by accidental spills and illegal release of industrial and municipal wastewater. Phenols are organic intermediaries that considered as potential pollutants. Adsorption is one of the purification and separation techniques used in this area. Algeria produces annually 131000 tones of fig; therefore, a large amount of fig leaves is generated, and the conversion of this waste into adsorbent allows the valorization of agricultural residue. The main purpose of this present work is to describe an application of the statistical method for modeling and optimization of the conditions of the phenol (Ph) adsorption from agricultural by-product locally available (fig leaves). The best experimental performance of Ph elimination on the adsorbent was obtained with: Adsorbent concentration (X2) = 0.2 g L-1; Initial concentration (X3) = 150 mg L-1; Speed agitation (X1) = 300 rpm.

Keywords: low-cost adsorbents, fig leaves, full factorial design, phenol, biosorption

Procedia PDF Downloads 99
2641 Modeling and Simulations of Surface Plasmon Waveguide Structures

Authors: Moussa Hamdan, Abdulati Abdullah

Abstract:

This paper presents an investigation of the fabrication of the optical devices in terms of their characteristics based on the use of the electromagnetic waves. Planar waveguides are used to examine the field modes (bound modes) and the parameters required for this structure. The modifications are conducted on surface plasmons based waveguides. Simple symmetric dielectric slab structure is used and analyzed in terms of transverse electric mode (TE-Mode) and transverse magnetic mode (TM-Mode. The paper presents mathematical and numerical solutions for solving simple symmetric plasmons and provides simulations of surface plasmons for field confinement. Asymmetric TM-mode calculations for dielectric surface plasmons are also provided.

Keywords: surface plasmons, optical waveguides, semiconductor lasers, refractive index, slab dialectical

Procedia PDF Downloads 306
2640 Quartz Crystal Microbalance Holder Design for On-Line Sensing in Liquid Applications

Authors: M. A. Amer, J. A. Chávez, M. J. García-Hernández, J. Salazar, A. Turó

Abstract:

In this paper, the design of a QCM sensor for liquid media measurements in vertical position is described. A rugged and low-cost proof holder has been designed, the cost of which is significantly lower than those of traditional commercial holders. The crystal is not replaceable but it can be easily cleaned. Its small volume permits to be used by dipping it in the liquid with the desired location and orientation. The developed design has been experimentally validated by measuring changes in the resonance frequency and resistance of the QCM sensor immersed vertically in different calibrated aqueous glycerol solutions. The obtained results show a great agreement with the Kanazawa theoretical expression. Consequently, the designed QCM sensor would be appropriate for sensing applications in liquids, and might take part of a future on-line multichannel low-cost QCM-based measurement system.

Keywords: holder design, liquid-media measurements, multi-channel measurements, QCM

Procedia PDF Downloads 382
2639 Evaluation of a Hybrid System for Renewable Energy in a Small Island in Greece

Authors: M. Bertsiou, E. Feloni, E. Baltas

Abstract:

The proper management of the water supply and electricity is the key issue, especially in small islands, where sustainability has been combined with the autonomy and covering of water needs and the fast development in potential sectors of economy. In this research work a hybrid system in Fournoi island (Icaria), a small island of Aegean, has been evaluated in order to produce hydropower and cover water demands, as it can provide solutions to acute problems, such as the water scarcity or the instability of local power grids. The meaning and the utility of hybrid system and the cooperation with a desalination plant has also been considered. This kind of project has not yet been widely applied, so the consideration will give us valuable information about the storage of water and the controlled distribution of the generated clean energy. This process leads to the conclusions about the functioning of the system and the profitability of this project, covering the demand for water and electricity.

Keywords: hybrid system, water, electricity, island

Procedia PDF Downloads 322
2638 Evaluation of Introductory Programming Course for Non-Computer Science Majored Students

Authors: H. Varol

Abstract:

Although students’ interest level in pursuing Computer Science and related degrees are lower than previous decade, fundamentals of computers, specifically introductory level programming courses are either listed as core or elective courses for a number of non-computer science majors. Universities accommodate these non-computer science majored students either via creating separate sections of a class for them or simply offering mixed-body classroom solutions, in which both computer science and non-computer science students take the courses together. In this work, we demonstrated how we handle introductory level programming course at Sam Houston State University and also provide facts about our observations on students’ success during the coursework. Moreover, we provide suggestions and methodologies that are based on students’ major and skills to overcome the deficiencies of mix-body type of classes.

Keywords: computer science, non-computer science major, programming, programming education

Procedia PDF Downloads 333
2637 Characterization of Group Dynamics for Fostering Mathematical Modeling Competencies

Authors: Ayse Ozturk

Abstract:

The study extends the prior research on modeling competencies by positioning students’ cognitive and language resources as the fundamentals for pursuing their own inquiry and expression lines through mathematical modeling. This strategy aims to answer the question that guides this study, “How do students’ group approaches to modeling tasks affect their modeling competencies over a unit of instruction?” Six bilingual tenth-grade students worked on open-ended modeling problems along with the content focused on quantities over six weeks. Each group was found to have a unique cognitive approach for solving these problems. Three different problem-solving strategies affected how the groups’ modeling competencies changed. The results provide evidence that the discussion around groups’ solutions, coupled with their reflections, advances group interpreting and validating competencies in the mathematical modeling process

Keywords: cognition, collective learning, mathematical modeling competencies, problem-solving

Procedia PDF Downloads 160
2636 21st Century Islam: Global Challenges of Islamic Representation and Knowledge Acquisition

Authors: M. M. Muhammed, O. Khuzaima

Abstract:

This research examined and outlined some of the challenges facing Islam and Muslims in the 21st century, considering global Islamic representation and knowledge acquisition as key objectives. It was observed that the Western media misrepresentation of Islam and the Western ethos embodied by the acquisition of western civilisation are major challenges faced by Islam and Muslims today. The problem of sectarianism, decline in the socio-economic power of Muslim communities and the archaic nature of the Islamic creed were recorded as major actors to the evolving global Islamic issues. It was therefore concluded that Islam is not the reason for these challenges, rather the action of some Muslims and non-Muslims were the contributing factors to the pandemics faced by Islam and Muslims. Some relevant recommendations were made to the Islamic world that could serve as effectual solutions to these lingering problems.

Keywords: Islam, challenges, representation, knowledge, century, global, twenty-first

Procedia PDF Downloads 233
2635 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 734
2634 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 398
2633 A Survey on Ambient Intelligence in Agricultural Technology

Authors: C. Angel, S. Asha

Abstract:

Despite the advances made in various new technologies, application of these technologies for agriculture still remains a formidable task, as it involves integration of diverse domains for monitoring the different process involved in agricultural management. Advances in ambient intelligence technology represents one of the most powerful technology for increasing the yield of agricultural crops and to mitigate the impact of water scarcity, climatic change and methods for managing pests, weeds, and diseases. This paper proposes a GPS-assisted, machine to machine solutions that combine information collected by multiple sensors for the automated management of paddy crops. To maintain the economic viability of paddy cultivation, the various techniques used in agriculture are discussed and a novel system which uses ambient intelligence technique is proposed in this paper. The ambient intelligence based agricultural system gives a great scope.

Keywords: ambient intelligence, agricultural technology, smart agriculture, precise farming

Procedia PDF Downloads 607
2632 Role of Discrete Event Simulation in the Assessment and Selection of the Potential Reconfigurable Manufacturing Solutions

Authors: Mohsin Raza, Arne Bilberg, Thomas Ditlev Brunø, Ann-Louise Andersen, Filip SKärin

Abstract:

Shifting from a dedicated or flexible manufacturing system to a reconfigurable manufacturing system (RMS) requires a significant amount of time, money, and effort. Therefore, it is vital to verify beforehand that the potential reconfigurable solution will be able to achieve the organizational objectives. Discrete event simulation offers the opportunity of assessing several reconfigurable alternatives against the set objectives. This study signifies the importance of using discrete-event simulation as a tool to verify several reconfiguration options. Two different industrial cases have been presented in the study to elaborate on the role of discrete event simulation in the implementation methodology of RMSs. The study concluded that discrete event simulation is one of the important tools to consider in the RMS implementation methodology.

Keywords: reconfigurable manufacturing system, discrete event simulation, Tecnomatix plant simulation, RMS

Procedia PDF Downloads 124
2631 Analysis of Conflict and Acceptance Factors on Water and Land Photovoltaic Facility

Authors: Taehyun Kim, Taehyun Kim, Hyunjoo Park

Abstract:

Photovoltaic facility occurs conflicts and disputes over environmental issues such as soil runoff, landscapes damage, and ecosystems damage. Because of these problems, huge social and economic cost occurred. The purpose of this study is to analyze resident‘s acceptability and conflict factors on the location of PV facilities, and suggest ways to promote resident’s acceptability and solutions for conflicts. Literature review, cases analysis, and expert interview on the acceptance and conflict factors related to the location of PV facilities are used to derive results. The results of this study are expected to contribute to the minimization of environmental impact and social conflict due to the development of renewable energy in the future.

Keywords: acceptance factor, conflict factor, factor analysis, photovoltaic facility

Procedia PDF Downloads 176
2630 Solution of S3 Problem of Deformation Mechanics for a Definite Condition and Resulting Modifications of Important Failure Theories

Authors: Ranajay Bhowmick

Abstract:

Analysis of stresses for an infinitesimal tetrahedron leads to a situation where we obtain a cubic equation consisting of three stress invariants. This cubic equation, when solved for a definite condition, gives the principal stresses directly without requiring any cumbersome and time-consuming trial and error methods or iterative numerical procedures. Since the failure criterion of different materials are generally expressed as functions of principal stresses, an attempt has been made in this study to incorporate the solutions of the cubic equation in the form of principal stresses, obtained for a definite condition, into some of the established failure theories to determine their modified descriptions. It has been observed that the failure theories can be represented using the quadratic stress invariant and the orientation of the principal plane.

Keywords: cubic equation, stress invariant, trigonometric, explicit solution, principal stress, failure criterion

Procedia PDF Downloads 137
2629 Modification of Newton Method in Two Point Block Backward Differentiation Formulas

Authors: Khairil I. Othman, Nur N. Kamal, Zarina B. Ibrahim

Abstract:

In this paper, we present modified Newton method as a new strategy for improving the efficiency of Two Point Block Backward Differentiation Formulas (BBDF) when solving stiff systems of ordinary differential equations (ODEs). These methods are constructed to produce two approximate solutions simultaneously at each iteration The detailed implementation of the predictor corrector BBDF with PE(CE)2 with modified Newton are discussed. The proposed modification of BBDF is validated through numerical results on some standard problems found in the literature and comparisons are made with the existing Block Backward Differentiation Formula. Numerical results show the advantage of using the new strategy for solving stiff ODEs in improving the accuracy of the solution.

Keywords: newton method, two point, block, accuracy

Procedia PDF Downloads 357
2628 Annular Hyperbolic Profile Fins with Variable Thermal Conductivity Using Laplace Adomian Transform and Double Decomposition Methods

Authors: Yinwei Lin, Cha'o-Kuang Chen

Abstract:

In this article, the Laplace Adomian transform method (LADM) and double decomposition method (DDM) are used to solve the annular hyperbolic profile fins with variable thermal conductivity. As the thermal conductivity parameter ε is relatively large, the numerical solution using DDM become incorrect. Moreover, when the terms of DDM are more than seven, the numerical solution using DDM is very complicated. However, the present method can be easily calculated as terms are over seven and has more precisely numerical solutions. As the thermal conductivity parameter ε is relatively large, LADM also has better accuracy than DDM.

Keywords: fins, thermal conductivity, Laplace transform, Adomian, nonlinear

Procedia PDF Downloads 336
2627 Reactors with Effective Mixing as a Solutions for Micro-Biogas Plant

Authors: M. Zielinski, M. Debowski, P. Rusanowska, A. Glowacka-Gil, M. Zielinska, A. Cydzik-Kwiatkowska, J. Kazimierowicz

Abstract:

Technologies for the micro-biogas plant with heating and mixing systems are presented as a part of the Research Coordination for a Low-Cost Biomethane Production at Small and Medium Scale Applications (Record Biomap). The main objective of the Record Biomap project is to build a network of operators and scientific institutions interested in cooperation and the development of promising technologies in the sector of small and medium-sized biogas plants. The activities carried out in the project will bridge the gap between research and market and reduce the time of implementation of new, efficient technological and technical solutions. Reactor with simultaneously mixing and heating system is a concrete tank with a rectangular cross-section. In the reactor, heating is integrated with the mixing of substrate and anaerobic sludge. This reactor is solution dedicated for substrates with high solids content, which cannot be introduced to the reactor with pumps, even with positive displacement pumps. Substrates are poured to the reactor and then with a screw pump, they are mixed with anaerobic sludge. The pumped sludge, flowing through the screw pump, is simultaneously heated by a heat exchanger. The level of the fermentation sludge inside the reactor chamber is above the bottom edge of the cover. Cover of the reactor is equipped with the screw pump driver. Inside the reactor, an electric motor is installed that is driving a screw pump. The heated sludge circulates in the digester. The post-fermented sludge is collected using a drain well. The inlet to the drain well is below the level of the sludge in the digester. The biogas is discharged from the reactor by the biogas intake valve located on the cover. The technology is very useful for fermentation of lignocellulosic biomass and substrates with high content of dry mass (organic wastes). The other technology is a reactor for micro-biogas plant with a pressure mixing system. The reactor has a form of plastic or concrete tank with a circular cross-section. The effective mixing of sludge is ensured by profiled at 90° bottom of the tank. Substrates for fermentation are supplied by an inlet well. The inlet well is equipped with a cover that eliminates odour release. The introduction of a new portion of substrates is preceded by pumping of digestate to the disposal well. Optionally, digestate can gravitationally flow to digestate storage tank. The obtained biogas is discharged into the separator. The valve supplies biogas to the blower. The blower presses the biogas from the fermentation chamber in such a way as to facilitate the introduction of a new portion of substrates. Biogas is discharged from the reactor by valve that enables biogas removal but prevents suction from outside the reactor.

Keywords: biogas, digestion, heating system, mixing system

Procedia PDF Downloads 154
2626 On a Continuous Formulation of Block Method for Solving First Order Ordinary Differential Equations (ODEs)

Authors: A. M. Sagir

Abstract:

The aim of this paper is to investigate the performance of the developed linear multistep block method for solving first order initial value problem of Ordinary Differential Equations (ODEs). The method calculates the numerical solution at three points simultaneously and produces three new equally spaced solution values within a block. The continuous formulations enable us to differentiate and evaluate at some selected points to obtain three discrete schemes, which were used in block form for parallel or sequential solutions of the problems. A stability analysis and efficiency of the block method are tested on ordinary differential equations involving practical applications, and the results obtained compared favorably with the exact solution. Furthermore, comparison of error analysis has been developed with the help of computer software.

Keywords: block method, first order ordinary differential equations, linear multistep, self-starting

Procedia PDF Downloads 306
2625 The Sociological and Legal Study of Sexual Assault in Nigeria

Authors: Adeshina Francis Akindutre, Adebolarin Adekanle

Abstract:

Sexual assault is often considered as the most extreme form of violence that degrades and humiliates women in society. It is a widespread public health and psychological problem in Nigeria. Criminologically, sexual assaults have been considered as one of the several violent crimes targeted specifically at women and perpetrated by men. This paper attempts to examine the types of sexual assaults in Nigeria, the strategies used by the offenders, the causes, the psychological effects on the victims and the possible solutions of sexual assaults. This work also, examines the law prohibiting sexual assault in Nigeria. The authors made use of three theories: the victim precipitation approach, the feminist approach, and the psychological approach which explain why sexual assault takes place in society. Finally, it takes the Stockholm Syndrome into consideration (the treatment of victims).

Keywords: feminist, victims, offenders, psychological, sexual assault, Stockholm Syndrome

Procedia PDF Downloads 561