Search results for: manning’s equation for open channel flow
8660 Open-Loop Vector Control of Induction Motor with Space Vector Pulse Width Modulation Technique
Authors: Karchung, S. Ruangsinchaiwanich
Abstract:
This paper presents open-loop vector control method of induction motor with space vector pulse width modulation (SVPWM) technique. Normally, the closed loop speed control is preferred and is believed to be more accurate. However, it requires a position sensor to track the rotor position which is not desirable to use it for certain workspace applications. This paper exhibits the performance of three-phase induction motor with the simplest control algorithm without the use of a position sensor nor an estimation block to estimate rotor position for sensorless control. The motor stator currents are measured and are transformed to synchronously rotating (d-q-axis) frame by use of Clarke and Park transformation. The actual control happens in this frame where the measured currents are compared with the reference currents. The error signal is fed to a conventional PI controller, and the corrected d-q voltage is generated. The controller outputs are transformed back to three phase voltages and are fed to SVPWM block which generates PWM signal for the voltage source inverter. The open loop vector control model along with SVPWM algorithm is modeled in MATLAB/Simulink software and is experimented and validated in TMS320F28335 DSP board.Keywords: electric drive, induction motor, open-loop vector control, space vector pulse width modulation technique
Procedia PDF Downloads 1498659 Allocating Channels and Flow Estimation at Flood Prone Area in Desert, Example from AlKharj City, Saudi Arabia
Authors: Farhan Aljuaidi
Abstract:
The rapid expansion of Alkarj city, Saudi Arabia, towards the outlet of Wadi AlAin is critical for the planners and decision makers. Nowadays, two major projects such as Salman bin Abdulaziz University compound and new industrial area are developed in this flood prone area where no channels are clear and identified. The main contribution of this study is to divert the flow away from these vital projects by reconstructing new channels. To do so, Lidar data were used to generate contour lines for the actual elevation of the highways and local roads. These data were analyzed and compared to the contour lines derived from the topographical maps 1:50.000. The magnitude of the expected flow was estimated using Snyder's Model based on the morphometric data acquired by DEM of the catchment area. The results indicate that maximum discharge peak reaches 2694,3 m3/sec, the mean is 303,7 m3/sec and the minimum is 74,3 m3/sec. The runoff was estimated at 252,2. 610 m3/s, the mean is 41,5. 610 m3/s and the minimum is 12,4. 610 m3/s.Keywords: Desert flood, Saudi Arabia, Snyder's Model, flow estimation
Procedia PDF Downloads 3118658 Performance Evaluation of Conical Solar Concentrator System with Different Flow Rate
Authors: Gwi Hyun Lee, Mun Soo Na
Abstract:
Solar energy has many advantages of infinite and clean source, and also it can be used for reduction of greenhouse gases and environment pollution. Concentrated solar system is a very useful to achieve reasonably high thermal efficiency. Different types of solar concentrating systems have been developed such as parabolic trough and parabolic dish. Conical solar concentrator is one of the most reliable and promising renewable energy systems for higher temperature applications. The objectives of this study were to investigate the influence of flow rate affecting the thermal efficiency of a conical solar collector, which has a double tube absorber placed at focal axis for collecting solar radiation. A conical solar concentrator consists of a conical reflector, which reflects direct solar radiation into an absorber. A double tube absorber was placed at the center of focal axis for collecting the solar radiation reflected from a conical reflector. A dual tracking system consists of a linear actuator and slew drive with driving cycle of 6 seconds. Water was used as circulating fluid, which flows from inlet to outlet of an absorber for collecting solar radiation. Three identical conical solar concentrator systems were installed side by side at the same place for the accurate performance analysis under the same environmental conditions. Performance evaluations were carried out with different volumetric flow rate of 2, 4 and 6 L/min to find the influence of flow rate affecting on thermal efficiency. The results indicated that average thermal efficiency was 73.24%, 81.96%, and 79.78% for each flow rate of 2 L/min, 4 L/min, and 6 L/min. It shows that the flow rate of circulating water has a significant effect on the thermal efficiency of the conical solar concentrator. It is concluded that an optimum flow rate of conical solar concentrator is 6 L/min.Keywords: conical solar concentrator, performance evaluation, solar energy, solar energy system
Procedia PDF Downloads 2808657 Associated Problems with the Open Dump Site and Its Possible Solutions
Authors: Pangkaj Kumar Mahanta, Md. Rafizul Islam
Abstract:
The rapid growth of the population causes a substantial amount of increase in household waste all over the world. Waste management is becoming one of the most challenging phenomena in the present day. The most environmentally friendly final disposal process of waste is sanitary landfilling, which is practiced in most developing countries. However, in Southeast Asia, most of the final disposal point is an open dump site. Due to the ignominy of proper management of waste and monitoring, the surrounding environment gets polluted more by the open dump site in comparison with a sanitary landfill. Khulna is 3rd largest metropolitan city in Bangladesh, having a population of around 1.5 million and producing approximately 450 tons per day of Municipal Solid Waste. The Municipal solid waste of Khulna city is disposed of in Rajbandh open dump site. The surrounding air is being polluted by the gas produced in the open dump site. Also, the open dump site produces leachate, which contains various heavy metals like Cadmium (Cd), Chromium (Cr), Lead (Pb), Manganese (Mn), Mercury (Hg), Strontium (Sr), etc. Leachate pollutes the soil as well as the groundwater of the open dump site and also the surrounding area through seepage. Moreover, during the rainy season, the surface water is polluted by leachate runoff. Also, the plastic waste flowing out from the open dump site through various drivers pollutes the nearby environment. The health risk assessment associated with heavy metals was carried out by computing the chronic daily intake (CDI), hazard quotient (HQ), and hazard index (HI) via different exposure pathways following the USEPA guidelines. For ecological risk, potential contamination index (Cp), Contamination factor (CF), contamination load index (PLI), numerical integrated contamination factor (NICF), enrichment factor (EF), ecological risk index (ER), and potential ecological risk index (PERI) were computed. The health risk and ecological risk assessment results reveal that some heavy metals possess strong health and ecological risk. In addition, the child faces higher harmful health risks from several heavy metals than the adult for all the exposure pathways and media. The conversion of an open dump site into a sanitary landfill and a proper management system can reduce the problems associated with an open dump site. In the sanitary landfill, the produced gas will be managed properly to save the surrounding atmosphere from being polluted. The seepage of leachate can be minimized by installing a compacted clay layer (CCL) as a baseline and leachate collection in a sanitary landfill to save the underlying soil layer and surrounding water bodies from leachate. Another important component of a sanitary landfill is the conversion of plastic waste to energy will minimize the plastic pollution in the landfill area and also the surrounding soil and water bodies. Also, in the sanitary landfill, the bio-waste can be used to make compost to reduce the volume of bio-waste and proper utilization of the landfill area.Keywords: ecological risk, health risk, open dump site, sanitary landfill
Procedia PDF Downloads 1968656 Approximation of a Wanted Flow via Topological Sensitivity Analysis
Authors: Mohamed Abdelwahed
Abstract:
We propose an optimization algorithm for the geometric control of fluid flow. The used approach is based on the topological sensitivity analysis method. It consists in studying the variation of a cost function with respect to the insertion of a small obstacle in the domain. Some theoretical and numerical results are presented in 2D and 3D.Keywords: sensitivity analysis, topological gradient, shape optimization, stokes equations
Procedia PDF Downloads 5408655 Surface Motion of Anisotropic Half Space Containing an Anisotropic Inclusion under SH Wave
Authors: Yuanda Ma, Zhiyong Zhang, Zailin Yang, Guanxixi Jiang
Abstract:
Anisotropy is very common in underground media, such as rock, sand, and soil. Hence, the dynamic response of anisotropy medium under elastic waves is significantly different from the isotropic one. Moreover, underground heterogeneities and structures, such as pipelines, cylinders, or tunnels, are usually made by composite materials, leading to the anisotropy of these heterogeneities and structures. Both the anisotropy of the underground medium and the heterogeneities have an effect on the surface motion of the ground. Aiming at providing theoretical references for earthquake engineering and seismology, the surface motion of anisotropic half-space with a cylindrical anisotropic inclusion embedded under the SH wave is investigated in this work. Considering the anisotropy of the underground medium, the governing equation with three elastic parameters of SH wave propagation is introduced. Then, based on the complex function method and multipolar coordinates system, the governing equation in the complex plane is obtained. With the help of a pair of transformation, the governing equation is transformed into a standard form. By means of the same methods, the governing equation of SH wave propagation in the cylindrical inclusion with another three elastic parameters is normalized as well. Subsequently, the scattering wave in the half-space and the standing wave in the inclusion is deduced. Different incident wave angle and anisotropy are considered to obtain the reflected wave. Then the unknown coefficients in scattering wave and standing wave are solved by utilizing the continuous condition at the boundary of the inclusion. Through truncating finite terms of the scattering wave and standing wave, the equation of boundary conditions can be calculated by programs. After verifying the convergence and the precision of the calculation, the validity of the calculation is verified by degrading the model of the problem as well. Some parameters which influence the surface displacement of the half-space is considered: dimensionless wave number, dimensionless depth of the inclusion, anisotropic parameters, wave number ratio, shear modulus ratio. Finally, surface displacement amplitude of the half space with different parameters is calculated and discussed.Keywords: anisotropy, complex function method, sh wave, surface displacement amplitude
Procedia PDF Downloads 1238654 Hydrodynamics of Shear Layers at River Confluences by Formation of Secondary Circulation
Authors: Ali Aghazadegan, Ali Shokri, Julia Mullarney
Abstract:
River confluences are areas where there is a lot of mixing, which is often caused by the formation of shear layers and helical motions. The hydrodynamics of secondary circulation at river confluences with low flow discharge ratios and a 90° junction angle are investigated in this study. The analysis is based on Delft 3D modelling, which includes a three-dimensional time-averaged velocity field, turbulence, and water surface levels that have been validated using laboratory data. Confluence structure was characterized by shear layer, secondary circulation, and mixing at the junction and post confluence channel. This study analysis formation of the shear layer by generation of secondary circulations in variation discharge ratios. The values of streamwise, cross-wise, and vertical components are used to estimate the secondary circulation observed within and downstream of the tributary mouth. These variables are estimated for three horizontal planes at Z = [0.14; 0.07; 0.02] and for eight cross-sections at X = [-0.1; 0.00; 0.10; 0.2; 0.30; 0.4; 0.5; 0.6] within a range of 0.05 Y 0.30.Keywords: river confluence, shear layer, secondary circulation, hydrodynamics
Procedia PDF Downloads 978653 Einstein’s General Equation of the Gravitational Field
Authors: A. Benzian
Abstract:
The generalization of relativistic theory of gravity based essentially on the principle of equivalence stipulates that for all bodies, the grave mass is equal to the inert mass which leads us to believe that gravitation is not a property of the bodies themselves, but of space, and the conclusion that the gravitational field must curved space-time what allows the abandonment of Minkowski space (because Minkowski space-time being nonetheless null curvature) to adopt Riemannian geometry as a mathematical framework in order to determine the curvature. Therefore the work presented in this paper begins with the evolution of the concept of gravity then tensor field which manifests by Riemannian geometry to formulate the general equation of the gravitational field.Keywords: inertia, principle of equivalence, tensors, Riemannian geometry
Procedia PDF Downloads 1538652 Secure Transmission Scheme in Device-to-Device Multicast Communications
Authors: Bangwon Seo
Abstract:
In this paper, we consider multicast device-to-device (D2D) direct communication systems in cellular networks. In multicast D2D communications, nearby mobile devices exchanges, their data directly without going through a base station and a D2D transmitter send its data to multiple D2D receivers that compose of D2D multicast group. We consider wiretap channel where there is an eavesdropper that attempts to overhear the transmitted data of the D2D transmitter. In this paper, we propose a secure transmission scheme in D2D multicast communications in cellular networks. In order to prevent the eavesdropper from overhearing the transmitted data of the D2D transmitter, a precoding vector is employed at the D2D transmitter in the proposed scheme. We perform computer simulations to evaluate the performance of the proposed scheme. Through the simulation, we show that the secrecy rate performance can be improved by selecting an appropriate precoding vector.Keywords: device-to-device communications, wiretap channel, secure transmission, precoding
Procedia PDF Downloads 2948651 Virtual Science Hub: An Open Source Platform to Enrich Science Teaching
Authors: Enrique Barra, Aldo Gordillo, Juan Quemada
Abstract:
This paper presents the Virtual Science Hub platform. It is an open source platform that combines a social network, an e-learning authoring tool, a video conference service and a learning object repository for science teaching enrichment. These four main functionalities fit very well together. The platform was released in April 2012 and since then it has not stopped growing. Finally we present the results of the surveys conducted and the statistics gathered to validate this approach.Keywords: e-learning, platform, authoring tool, science teaching, educational sciences
Procedia PDF Downloads 3988650 Reliable Method for Estimating Rating Curves in the Natural Rivers
Authors: Arash Ahmadi, Amirreza Kavousizadeh, Sanaz Heidarzadeh
Abstract:
Stage-discharge curve is one of the conventional methods for continuous river flow measurement. In this paper, an innovative approach is proposed for predicting the stage-discharge relationship using the application of isovel contours. Using the proposed method, it is possible to estimate the stage-discharge curve in the whole section with only using discharge information from just one arbitrary water level. For this purpose, multivariate relationships are used to determine the mean velocity in a cross-section. The unknown exponents of the proposed relationship have been obtained by using the second version of the Strength Pareto Evolutionary Algorithm (SPEA2), and the appropriate equation was selected by applying the TOPSIS (Technique for Order Preferences by Similarity to an Ideal Solution) approach. Results showed a close agreement between the estimated and observed data in the different cross-sections.Keywords: rating curves, SPEA2, natural rivers, bed roughness distribution
Procedia PDF Downloads 1618649 Characteristics of Ozone Generated from Dielectric Barrier Discharge Plasma Actuators
Authors: R. Osada, S. Ogata, T. Segawa
Abstract:
Dielectric barrier discharge plasma actuators (DBD-PAs) have been developed for active flow control devices. However, it is necessary to reduce ozone produced by DBD toward practical applications using DBD-PAs. In this study, variations of ozone concentration, flow velocity, power consumption were investigated by changing exposed electrodes of DBD-PAs. Two exposed electrode prototypes were prepared: span-type with exposed electrode width of 0.1 mm, and normal-type with width of 5 mm. It was found that span-type shows lower power consumption and higher flow velocity than that of normal-type at Vp-p = 4.0-6.0 kV. Ozone concentration of span-type higher than normal-type at Vp-p = 4.0-8.0 kV. In addition, it was confirmed that catalyst located in downstream from the exposed electrode can reduce ozone concentration between 18 and 42% without affecting the induced flow.Keywords: dielectric barrier discharge plasma actuators, ozone diffusion, PIV measurement, power consumption
Procedia PDF Downloads 2428648 Open Source Software in Higher Education: Oman SQU Case Study
Authors: Amal S. Al-Badi, Ali H. Al-Badi
Abstract:
Many organizations are opting to adopt Open Source Software (OSS) as it is the current trend to rely on each other rather than on companies (Software vendors). It is a clear shift from organizations to individuals, the concept being to rely on collective participation rather than companies/vendors. The main objectives of this research are 1) to identify the current level of OSS usage in Sultan Qaboos University; 2) to identify the potential benefits of using OSS in educational institutes; 3) to identify the OSS applications that are most likely to be used within an educational institute; 4) to identify the existing and potential barriers to the successful adoption of OSS in education. To achieve these objectives a two-stage research method was conducted. First a rigorous literature review of previously published material was performed (interpretive/descriptive approach), and then a set of interviews were conducted with the IT professionals at Sultan Qaboos University in Oman in order to explore the extent and nature of their usage of OSS.Keywords: open source software, social software, e-learning 2.0, Web 2.0, connectivism, personal learning environment (PLE), OpenCourseWare
Procedia PDF Downloads 3078647 Large Eddy Simulation Approach for Unsteady Analysis of the Flow Behavior inside a Dual Counter Rotating Axial Swirler
Authors: Foad Vashahi, Shahnaz Rezaei, Jeekeun Lee
Abstract:
Large Eddy Simulation (LES) was performed on a dual counter rotating axial swirler in a confined rectangular configuration. Grids were constructed based on a primary Reynolds Averaged Navier-Stokes (RANS) simulation and then were refined based on the Kolmogorov length scale. Water as cold flow condition was applied and results were compared via Particle Image Velocimetry (PIV) experimental results. The focus was to investigate the flow behavior within the region before the flare and very close to the exit of the swirler. This region contributes to a highly unsteady flow behavior and requires great attention to enhancing the flame stability in gas turbine combustor and swirl burners. The PVC formation within the central core flow is strongly related to the peaks of pressure or axial velocity spectrum and up to two distinct peaks at the swirler mouth could be observed. Here, spectra analysis in iso-thermal condition inside the swirler where the inner swirler dominates the flow, showed a higher potential of instabilities with three to four distinct peaks where moving forward to the exit of swirler the number of peaks is decreased. In addition to this, the central axis corresponds to no peaks of instabilities while further away in the radial direction, several peaks exist.Keywords: axial counter rotating swirler, large eddy simulation (LES), precessing vortex core (PVC), power spectral density (PSD)
Procedia PDF Downloads 2828646 Characterization of Emissions from the open burning of Municipal Solid Waste (MSW) under Tropical Environment
Authors: Anju Elizbath Peter, S. M. Shiva Nagendra, Indumathi M.Nambi
Abstract:
The deliberate fires initiated by dump managers and human scavengers to reduce the volume of waste and recovery of valuable metals/materials are common at municipal solid waste (MSW) disposal sites in developed country. A large amount of toxic gases released due to this act is responsible for the deterioration of regional and local air quality, which causes visibility impairment and acute respiratory diseases. The present study was aimed at the characterization of MSW and emission characteristics of burning of MSW in the laboratory. MSW samples were collected directly from the one of the open dumpsite located in Chennai city. Solid waste sampling and laboratory analysis were carried out according to American Society of Testing and Materials (ASTM) standards. Results indicated the values of moisture content, volatile solids (VS) and calorific values of solid waste samples were 16.67%,8%,9.17MJ/kg, respectively. The elemental composition showed that the municipal solid waste contains 25.84% of carbon, 3.69% of hydrogen, 1.57% of nitrogen and 0.26% of sulphur. The calorific value of MSW was found to be 9.17 MJ/Kg which is sufficient to facilitate self-combustion of waste. The characterization of emissions from the burning of 1 kg of MSW in the test chamber showed a total of 90 mg/kg of PM10 and 243 mg/kg of PM2.5. The current research study results will be useful for municipal authorities to formulate guideline and policy structure regarding the MSW management to reduce the impact of air emissions at an open dump site.Keywords: characterization, MSW, open burning, PM10, PM2.5
Procedia PDF Downloads 3418645 Algorithm for Predicting Cognitive Exertion and Cognitive Fatigue Using a Portable EEG Headset for Concussion Rehabilitation
Authors: Lou J. Pino, Mark Campbell, Matthew J. Kennedy, Ashleigh C. Kennedy
Abstract:
A concussion is complex and nuanced, with cognitive rest being a key component of recovery. Cognitive overexertion during rehabilitation from a concussion is associated with delayed recovery. However, daily living imposes cognitive demands that may be unavoidable and difficult to quantify. Therefore, a portable tool capable of alerting patients before cognitive overexertion occurs could allow patients to maintain their quality of life while preventing symptoms and recovery setbacks. EEG allows for a sensitive measure of cognitive exertion. Clinical 32-lead EEG headsets are not practical for day-to-day concussion rehabilitation management. However, there are now commercially available and affordable portable EEG headsets. Thus, these headsets can potentially be used to continuously monitor cognitive exertion during mental tasks to alert the wearer of overexertion, with the aim of preventing the occurrence of symptoms to speed recovery times. The objective of this study was to test an algorithm for predicting cognitive exertion from EEG data collected from a portable headset. EEG data were acquired from 10 participants (5 males, 5 females). Each participant wore a portable 4 channel EEG headband while completing 10 tasks: rest (eyes closed), rest (eyes open), three levels of the increasing difficulty of logic puzzles, three levels of increasing difficulty in multiplication questions, rest (eyes open), and rest (eyes closed). After each task, the participant was asked to report their perceived level of cognitive exertion using the NASA Task Load Index (TLX). Each participant then completed a second session on a different day. A customized machine learning model was created using data from the first session. The performance of each model was then tested using data from the second session. The mean correlation coefficient between TLX scores and predicted cognitive exertion was 0.75 ± 0.16. The results support the efficacy of the algorithm for predicting cognitive exertion. This demonstrates that the algorithms developed in this study used with portable EEG devices have the potential to aid in the concussion recovery process by monitoring and warning patients of cognitive overexertion. Preventing cognitive overexertion during recovery may reduce the number of symptoms a patient experiences and may help speed the recovery process.Keywords: cognitive activity, EEG, machine learning, personalized recovery
Procedia PDF Downloads 2218644 Mobile Agent Security Using Reference Monitor Based Security Framework
Authors: Sandhya Armoogum
Abstract:
In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.Keywords: security, mobile agents, reference monitor, trust
Procedia PDF Downloads 4438643 Temporal Conundrums: Navigating the Gravitational Time of Flow
Authors: Ogaeze Onyedikachukwu Francis
Abstract:
Let’s embark on a microcosmic exploration of the universe to delve into the gravitational time flow and its profound implications for manipulating temporal distances, ushering in the possibilities of time travel and inter-universe leaps with instantaneous teleportation. Envision the universe reduced to a minimalist scenario—two perfectly identical mass spheres intricately entwined in a manner where any alteration affecting one sphere instantaneously impacts the other. However, the complexity deepens: despite their indistinguishable nature, the gravitational pull between these spheres—coined the “gravitational Time of flow” in essence dynamics research—remains constant, ensuring universal stability. Consider now tampering with one of these spheres to test the veracity of their entanglement and sameness. Introducing a third body disrupts the equilibrium, complicating gravitational laws while maintaining their essence. This interference alters the gravitational time flow between the spheres, unraveling their initial entanglement as they diverge into distinct entities owing to the influence of the additional body. Yet, a reaffirmation of their initial entwined state becomes feasible by recalibrating the spatial arrangement and gravitational dynamics among the three bodies and beyond. This contemplation underscores the gravitational law as the linchpin connecting and anchoring the universe’s fabric, cocooning all within its omnipresent grasp. Our focal point—the gravitational time of flow—emerges as a gateway to unraveling the mysteries behind temporal distance manipulation, offering tantalizing prospects for traversing realms of time and space with unprecedented fluidity and expanding horizons in the realms of scientific inquiry and exploration.Keywords: time, space, gravity, gravitational time flow, temporal leap, temporal-distance manipulation, multi-verse, teleportation, gravitational time flow device, time travel, distance
Procedia PDF Downloads 08642 On Virtual Coordination Protocol towards 5G Interference Mitigation: Modelling and Performance Analysis
Authors: Bohli Afef
Abstract:
The fifth-generation (5G) wireless systems is featured by extreme densities of cell stations to overcome the higher future demand. Hence, interference management is a crucial challenge in 5G ultra-dense cellular networks. In contrast to the classical inter-cell interference coordination approach, which is no longer fit for the high density of cell-tiers, this paper proposes a novel virtual coordination based on the dynamic common cognitive monitor channel protocol to deal with the inter-cell interference issue. A tractable and flexible model for the coverage probability of a typical user is developed through the use of the stochastic geometry model. The analyses of the performance of the suggested protocol are illustrated both analytically and numerically in terms of coverage probability.Keywords: ultra dense heterogeneous networks, dynamic common channel protocol, cognitive radio, stochastic geometry, coverage probability
Procedia PDF Downloads 3278641 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 3838640 Desktop High-Speed Aerodynamics by Shallow Water Analogy in a Tin Box for Engineering Students
Authors: Etsuo Morishita
Abstract:
In this paper, we show shallow water in a tin box as an analogous simulation tool for high-speed aerodynamics education and research. It is customary that we use a water tank to create shallow water flow. While a flow in a water tank is not necessarily uniform and is sometimes wavy, we can visualize a clear supercritical flow even when we move a body manually in stationary water in a simple shallow tin box. We can visualize a blunt shock wave around a moving circular cylinder together with a shock pattern around a diamond airfoil. Another interesting analogous experiment is a hydrodynamic shock tube with water and tea. We observe the contact surface clearly due to color difference of the two liquids those are invisible in the real gas dynamics experiment. We first revisit the similarities between high-speed aerodynamics and shallow water hydraulics. Several educational and research experiments are then introduced for engineering students. Shallow water experiments in a tin box simulate properly the high-speed flows.Keywords: aerodynamics compressible flow, gas dynamics, hydraulics, shock wave
Procedia PDF Downloads 3028639 A New Car-Following Model with Consideration of the Brake Light
Authors: Zhiyuan Tang, Ju Zhang, Wenyuan Wu
Abstract:
In this research, a car-following model with consideration of the status of the brake light is proposed. The numerical results show that the stability of the traffic flow is improved. The ability of the brake light to reduce car accident is also showed.Keywords: brake light, car-following model, traffic flow, regional planning, transportation
Procedia PDF Downloads 5798638 Geometrical Based Unequal Droplet Splitting Using Microfluidic Y-Junction
Authors: Bahram Talebjedi, Amirmohammad Sattari, Ahmed Zoher Sihorwala, Mina Hoorfar
Abstract:
Among different droplet manipulations, controlled droplet-splitting is of great significance due to its ability to increase throughput and operational capability. Furthermore, unequal droplet-splitting can provide greater flexibility and a wider range of dilution factors. In this study, we developed two-dimensional, time-dependent complex fluid dynamics simulations to model droplet formation in a flow focusing device, followed by splitting in a Y-shaped junction with sub-channels of unequal widths. From the results obtained from the numerical study, we correlated the diameters of the droplets in the sub-channels to the Weber number, thereby demarcating the droplet splitting and non-splitting regimes.Keywords: microfluidics, unequal droplet splitting, two phase flow, flow focusing device
Procedia PDF Downloads 1708637 Numerical Investigation of Two Turbulence Models for Predicting the Temperature Separation in Conical Vortex Tube
Authors: M. Guen
Abstract:
A three-dimensional numerical study is used to analyze the behavior of the flow inside a vortex tube. The vortex tube or Ranque-Hilsch vortex tube is a simple device which is capable of dividing compressed air from the inlet nozzle tangentially into two flow with different temperatures warm and cold. This phenomenon is known from literature by temperature separation. The K ω-SST and K-ε turbulence models are used to predict the turbulent flow behaviour inside the tube. The vortex tube is an Exair 708 slpm (25 scfm) commercial tube. The cold and hot exits areas are 30.2 and 95 mm2 respectively. The vortex nozzle consists of 6 straight slots; the height and the width of each slot are 0.97 mm and 1.41 mm. The total area normal to the flow associated with six nozzles is therefore 8.15 mm 2. The present study focuses on a comparison between two turbulence models K ω-SST, K-ε by using a new configuration of vortex tube (Conical Vortex Tube). The performance curves of the temperature separation versus cold outlet mass fraction were calculated and compared with experimental and numerical study of other researchers.Keywords: conical vortex tube, temperature separation, cold mass fraction, turbulence
Procedia PDF Downloads 2538636 A Single-Channel BSS-Based Method for Structural Health Monitoring of Civil Infrastructure under Environmental Variations
Authors: Yanjie Zhu, André Jesus, Irwanda Laory
Abstract:
Structural Health Monitoring (SHM), involving data acquisition, data interpretation and decision-making system aim to continuously monitor the structural performance of civil infrastructures under various in-service circumstances. The main value and purpose of SHM is identifying damages through data interpretation system. Research on SHM has been expanded in the last decades and a large volume of data is recorded every day owing to the dramatic development in sensor techniques and certain progress in signal processing techniques. However, efficient and reliable data interpretation for damage detection under environmental variations is still a big challenge. Structural damages might be masked because variations in measured data can be the result of environmental variations. This research reports a novel method based on single-channel Blind Signal Separation (BSS), which extracts environmental effects from measured data directly without any prior knowledge of the structure loading and environmental conditions. Despite the successful application in audio processing and bio-medical research fields, BSS has never been used to detect damage under varying environmental conditions. This proposed method optimizes and combines Ensemble Empirical Mode Decomposition (EEMD), Principal Component Analysis (PCA) and Independent Component Analysis (ICA) together to separate structural responses due to different loading conditions respectively from a single channel input signal. The ICA is applying on dimension-reduced output of EEMD. Numerical simulation of a truss bridge, inspired from New Joban Line Arakawa Railway Bridge, is used to validate this method. All results demonstrate that the single-channel BSS-based method can recover temperature effects from mixed structural response recorded by a single sensor with a convincing accuracy. This will be the foundation of further research on direct damage detection under varying environment.Keywords: damage detection, ensemble empirical mode decomposition (EEMD), environmental variations, independent component analysis (ICA), principal component analysis (PCA), structural health monitoring (SHM)
Procedia PDF Downloads 3078635 Cell Elevator: A Novel Technique for Cell Sorting and Circulating Tumor Cell Detection and Discrimination
Authors: Kevin Zhao, Norman J. Horing
Abstract:
A methodology for cells sorting and circulating tumor cell detection and discrimination is presented in this paper. The technique is based on Dielectrophoresis and microfluidic device theory. Specifically, the sorting of the cells is realized by adjusting the relation among the sedimentation forces, the drag force provided by the fluid, and the Dielectrophortic force that is relevant to the bias voltage applied on the device. The relation leads to manipulation of the elevation of the cells of the same kind to a height by controlling the bias voltage. Once the cells have been lifted to a position next to the bottom of the cell collection channel, the buffer fluid flashes them into the cell collection channel. Repeated elevation of the cells leads to a complete sorting of the cells in the sample chamber. A proof-of-principle example is presented which verifies the feasibility of the methodology.Keywords: cell sorter, CTC cell, detection and discrimination, dielectrophoresisords, simulation
Procedia PDF Downloads 4338634 Flow Characterization in Complex Terrain for Aviation Safety
Authors: Adil Rasheed, Mandar Tabib
Abstract:
The paper describes the ability of a high-resolution Computational Fluid Dynamics model to predict terrain-induced turbulence and wind shear close to the ground. Various sensitivity studies to choose the optimal simulation setup for modeling the flow characteristics in a complex terrain are presented. The capabilities of the model are demonstrated by applying it to the Sandnessjøen Airport, Stokka in Norway, an airport that is located in a mountainous area. The model is able to forecast turbulence in real time and trigger an alert when atmospheric conditions might result in high wind shear and turbulence.Keywords: aviation safety, terrain-induced turbulence, atmospheric flow, alert system
Procedia PDF Downloads 4178633 Analysis of Syngas Combustion Characteristics in Can-Type Combustor using CFD
Authors: Norhaslina Mat Zian, Hasril Hasini, Nur Irmawati Om
Abstract:
This study focuses on the flow and combustion behavior inside gas turbine combustor used in thermal power plant. The combustion process takes place using synthetic gas and the baseline solution was made on gas turbine combustor firing natural gas (100% Methane) as the main source of fuel. Attention is given to the effect of the H2/CO ratio on the variation of the flame profile, temperature distribution, and emissions. The H2/CO ratio varies in the range of 10-80 % and the CH4 values are fixed 10% for each case. While keeping constant the mass flow rate and operating pressure, the preliminary result shows that the flow inside the can-combustor is highly swirling which indicates good mixing of fuel and air prior to the entrance of the mixture to the main combustion zone.Keywords: cfd, combustion, flame, syngas
Procedia PDF Downloads 2868632 Control the Flow of Big Data
Authors: Shizra Waris, Saleem Akhtar
Abstract:
Big data is a research area receiving attention from academia and IT communities. In the digital world, the amounts of data produced and stored have within a short period of time. Consequently this fast increasing rate of data has created many challenges. In this paper, we use functionalism and structuralism paradigms to analyze the genesis of big data applications and its current trends. This paper presents a complete discussion on state-of-the-art big data technologies based on group and stream data processing. Moreover, strengths and weaknesses of these technologies are analyzed. This study also covers big data analytics techniques, processing methods, some reported case studies from different vendor, several open research challenges and the chances brought about by big data. The similarities and differences of these techniques and technologies based on important limitations are also investigated. Emerging technologies are suggested as a solution for big data problems.Keywords: computer, it community, industry, big data
Procedia PDF Downloads 1958631 A Hyperexponential Approximation to Finite-Time and Infinite-Time Ruin Probabilities of Compound Poisson Processes
Authors: Amir T. Payandeh Najafabadi
Abstract:
This article considers the problem of evaluating infinite-time (or finite-time) ruin probability under a given compound Poisson surplus process by approximating the claim size distribution by a finite mixture exponential, say Hyperexponential, distribution. It restates the infinite-time (or finite-time) ruin probability as a solvable ordinary differential equation (or a partial differential equation). Application of our findings has been given through a simulation study.Keywords: ruin probability, compound poisson processes, mixture exponential (hyperexponential) distribution, heavy-tailed distributions
Procedia PDF Downloads 344