Search results for: type 2 fuzzy logic systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15751

Search results for: type 2 fuzzy logic systems

14251 Application of Single Subject Experimental Designs in Adapted Physical Activity Research: A Descriptive Analysis

Authors: Jiabei Zhang, Ying Qi

Abstract:

The purpose of this study was to develop a descriptive profile of the adapted physical activity research using single subject experimental designs. All research articles using single subject experimental designs published in the journal of Adapted Physical Activity Quarterly from 1984 to 2013 were employed as the data source. Each of the articles was coded in a subcategory of seven categories: (a) the size of sample; (b) the age of participants; (c) the type of disabilities; (d) the type of data analysis; (e) the type of designs, (f) the independent variable, and (g) the dependent variable. Frequencies, percentages, and trend inspection were used to analyze the data and develop a profile. The profile developed characterizes a small portion of research articles used single subject designs, in which most researchers used a small sample size, recruited children as subjects, emphasized learning and behavior impairments, selected visual inspection with descriptive statistics, preferred a multiple baseline design, focused on effects of therapy, inclusion, and strategy, and measured desired behaviors more often, with a decreasing trend over years.

Keywords: adapted physical activity research, single subject experimental designs, physical education, sport science

Procedia PDF Downloads 449
14250 Distributed Energy System - Microgrid Integration of Hybrid Power Systems

Authors: Pedro Esteban

Abstract:

Planning a hybrid power system (HPS) that integrates renewable generation sources, non-renewable generation sources and energy storage, involves determining the capacity and size of various components to be used in the system to be able to supply reliable electricity to the connected load as required. Nowadays it is very common to integrate solar photovoltaic (PV) power plants for renewable generation as part of HPS. The solar PV system is usually balanced via a second form of generation (renewable such as wind power or using fossil fuels such as a diesel generator) or an energy storage system (such as a battery bank). Hybrid power systems can also provide other forms of power such as heat for some applications. Modern hybrid power systems combine power generation and energy storage technologies together with real-time energy management and innovative power quality and energy efficiency improvement functionalities. These systems help customers achieve targets for clean energy generation, they add flexibility to the electrical grid, and they optimize the installation by improving its power quality and energy efficiency.

Keywords: microgrids, hybrid power systems, energy storage, grid code compliance

Procedia PDF Downloads 130
14249 Cooperation of Unmanned Vehicles for Accomplishing Missions

Authors: Ahmet Ozcan, Onder Alparslan, Anil Sezgin, Omer Cetin

Abstract:

The use of unmanned systems for different purposes has become very popular over the past decade. Expectations from these systems have also shown an incredible increase in this parallel. But meeting the demands of the tasks are often not possible with the usage of a single unmanned vehicle in a mission, so it is necessary to use multiple autonomous vehicles with different abilities together in coordination. Therefore the usage of the same type of vehicles together as a swarm is helped especially to satisfy the time constraints of the missions effectively. In other words, it allows sharing the workload by the various numbers of homogenous platforms together. Besides, it is possible to say there are many kinds of problems that require the usage of the different capabilities of the heterogeneous platforms together cooperatively to achieve successful results. In this case, cooperative working brings additional problems beyond the homogeneous clusters. In the scenario presented as an example problem, it is expected that an autonomous ground vehicle, which is lack of its position information, manage to perform point-to-point navigation without losing its way in a previously unknown labyrinth. Furthermore, the ground vehicle is equipped with very limited sensors such as ultrasonic sensors that can detect obstacles. It is very hard to plan or complete the mission for the ground vehicle by self without lost its way in the unknown labyrinth. Thus, in order to assist the ground vehicle, the autonomous air drone is also used to solve the problem cooperatively. The autonomous drone also has limited sensors like downward looking camera and IMU, and it also lacks computing its global position. In this context, it is aimed to solve the problem effectively without taking additional support or input from the outside, just benefiting capabilities of two autonomous vehicles. To manage the point-to-point navigation in a previously unknown labyrinth, the platforms have to work together coordinated. In this paper, cooperative work of heterogeneous unmanned systems is handled in an applied sample scenario, and it is mentioned that how to work together with an autonomous ground vehicle and the autonomous flying platform together in a harmony to take advantage of different platform-specific capabilities. The difficulties of using heterogeneous multiple autonomous platforms in a mission are put forward, and the successful solutions are defined and implemented against the problems like spatially distributed tasks planning, simultaneous coordinated motion, effective communication, and sensor fusion.

Keywords: unmanned systems, heterogeneous autonomous vehicles, coordination, task planning

Procedia PDF Downloads 111
14248 Molecular Detection and Characterization of Shiga Toxogenic Escherichia coli Associated with Dairy Product

Authors: Mohamed Al-Hazmi, Abdullah Al-Arfaj, Moussa Ihab

Abstract:

Raw, unpasteurized milk can carry dangerous bacteria such as Salmonella, E. coli, and Listeria, which are responsible for causing numerous foodborne illnesses. The objective of this study was molecular characterization of shiga toxogenic E. coli in raw milk collected from different Egyptian governorates by multiplex PCR. During the period of 25th May to 25th October 2012, a total of 320 bulk-tank milk samples were collected from 10 cow farms located in different Egyptian governorates. Bacteriological examination of milk samples revealed the presence of E. coli organisms in 65 samples (20.3%), serotyping of the E. coli isolates revealed, 35 strains (10.94%) O111, 15 strains (4.69%) O157: H7, 10 strains (3.13%) O128 and 5 strains (1.56%) O119. Multiplex PCR for detection of shiga toxin type 2 and intimin genes revealed positive amplification of 255 bp fragment of shiga toxin type 2 gene and 384 bp fragment of intimin gene from all E. coli serovar O157: H7, while from serovar O111 were 25 (71.43%), 20 (57.14%) and from serovar O128 were 6 (60%), 8 (80%), respectively. The results of multiplex PCR assay are useful for identification of STEC possessing the eaeA and stx2 genes.

Keywords: raw milk, E. coli, multiplex PCR, Shiga toxin type 2, intimin gene

Procedia PDF Downloads 288
14247 Problem Solving: Process or Product? A Mathematics Approach to Problem Solving in Knowledge Management

Authors: A. Giannakopoulos, S. B. Buckley

Abstract:

Problem solving in any field is recognised as a prerequisite for any advancement in knowledge. For example in South Africa it is one of the seven critical outcomes of education together with critical thinking. As a systematic way to problem solving was initiated in mathematics by the great mathematician George Polya (the father of problem solving), more detailed and comprehensive ways in problem solving have been developed. This paper is based on the findings by the author and subsequent recommendations for further research in problem solving and critical thinking. Although the study was done in mathematics, there is no doubt by now in almost anyone’s mind that mathematics is involved to a greater or a lesser extent in all fields, from symbols, to variables, to equations, to logic, to critical thinking. Therefore it stands to reason that mathematical principles and learning cannot be divorced from any field. In management of knowledge situations, the types of problems are similar to mathematics problems varying from simple to analogical to complex; from well-structured to ill-structured problems. While simple problems could be solved by employees by adhering to prescribed sequential steps (the process), analogical and complex problems cannot be proceduralised and that diminishes the capacity of the organisation of knowledge creation and innovation. The low efficiency in some organisations and the low pass rates in mathematics prompted the author to view problem solving as a product. The authors argue that using mathematical approaches to knowledge management problem solving and treating problem solving as a product will empower the employee through further training to tackle analogical and complex problems. The question the authors asked was: If it is true that problem solving and critical thinking are indeed basic skills necessary for advancement of knowledge why is there so little literature of knowledge management (KM) about them and how they are connected and advance KM?This paper concludes with a conceptual model which is based on general accepted principles of knowledge acquisition (developing a learning organisation), knowledge creation, sharing, disseminating and storing thereof, the five pillars of knowledge management (KM). This model, also expands on Gray’s framework on KM practices and problem solving and opens the doors to a new approach to training employees in general and domain specific areas problems which can be adapted in any type of organisation.

Keywords: critical thinking, knowledge management, mathematics, problem solving

Procedia PDF Downloads 578
14246 Reviewing Privacy Preserving Distributed Data Mining

Authors: Sajjad Baghernezhad, Saeideh Baghernezhad

Abstract:

Nowadays considering human involved in increasing data development some methods such as data mining to extract science are unavoidable. One of the discussions of data mining is inherent distribution of the data usually the bases creating or receiving such data belong to corporate or non-corporate persons and do not give their information freely to others. Yet there is no guarantee to enable someone to mine special data without entering in the owner’s privacy. Sending data and then gathering them by each vertical or horizontal software depends on the type of their preserving type and also executed to improve data privacy. In this study it was attempted to compare comprehensively preserving data methods; also general methods such as random data, coding and strong and weak points of each one are examined.

Keywords: data mining, distributed data mining, privacy protection, privacy preserving

Procedia PDF Downloads 503
14245 Improvement of Fatigue and Fatigue Corrosion Resistances of Turbine Blades Using Laser Cladding

Authors: Sami I. Jafar, Sami A. Ajeel, Zaman A. Abdulwahab

Abstract:

The turbine blades used in electric power plants are made of low alloy steel type 52. These blades will be subjected to fatigue and also at other times to fatigue corrosion with aging time. Due to their continuous exposure to cyclic rotational stresses in corrosive steam environments, The current research aims to deal with this problem using the laser cladding method for low alloy steel type 52, which works to re-compose the metallurgical structure and improve the mechanical properties by strengthening the resulting structure, which leads to an increase in fatigue and wears resistance, therefore, an increase in the life of these blades is observed.

Keywords: fatigue, fatigue corrosion, turbine blades, laser cladding

Procedia PDF Downloads 182
14244 Modified Montgomery for RSA Cryptosystem

Authors: Rupali Verma, Maitreyee Dutta, Renu Vig

Abstract:

Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence, efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a Modified Montgomery Modular multiplication in which addition of operands is computed by 4:2 compressor. The basic logic operations in addition are partitioned over two iterations such that parallel computations are performed. This reduces the critical path delay of proposed Montgomery design. The proposed design and RSA are implemented on Virtex 2 and Virtex 5 FPGAs. The two factors partitioning and parallelism have improved the frequency and throughput of proposed design.

Keywords: RSA, montgomery modular multiplication, 4:2 compressor, FPGA

Procedia PDF Downloads 403
14243 Percolation Transition in an Agglomeration of Spherical Particles

Authors: Johannes J. Schneider, Mathias S. Weyland, Peter Eggenberger Hotz, William D. Jamieson, Oliver Castell, Alessia Faggian, Rudolf M. Füchslin

Abstract:

Agglomerations of polydisperse systems of spherical particles are created in computer simulations using a simplified stochastic-hydrodynamic model: Particles sink to the bottom of the cylinder, taking into account gravity reduced by the buoyant force, the Stokes friction force, the added mass effect, and random velocity changes. Two types of particles are considered, with one of them being able to create connections to neighboring particles of the same type, thus forming a network within the agglomeration at the bottom of a cylinder. Decreasing the fraction of these particles, a percolation transition occurs. The critical regime is determined by investigating the maximum cluster size and the percolation susceptibility.

Keywords: binary system, maximum cluster size, percolation, polydisperse

Procedia PDF Downloads 41
14242 One Pot Synthesis of Ultrasmall NiMo Catalysts Supported on Amorphous Alumina with Enhanced type 2 Sites for Hydrodesulfurization Reaction: A Combined Experimental and Theoretical Study

Authors: Shalini Arora, Sri Sivakumar

Abstract:

The deep removal of high molecular weight sulphur compounds (e.g., 4,6, dimethyl dibenzothiophene) is challenging due to their steric hindrance. Hydrogenation desulfurization (HYD) pathway is the main pathway to remove these sulfur compounds, and it is mainly governed by the number of type 2 sites. The formation of type 2 sites can be enhanced by modulating the pore structure and the interaction between the active metal and support. To this end, we report the enhanced HDS catalytic activity of ultrasmall NiMo supported on amorphous alumina (A-Al₂O₃) catalysts by one pot colloidal synthesis method followed by calcination and sulfidation. The amorphous alumina (A-Al₂O₃) was chosen as the support due to its lower surface energy, better physicochemical properties, and enhanced acidic sites (due to the dominance of tetra and penta coordinated [Al] sites) than crystalline alumina phase. At 20% metal oxide composition, NiMo supported on A-Al₂O₃ catalyst showed 1.4 and 1.2 times more reaction rate constant and turn over frequency (TOF) respectively than the conventional catalyst (wet impregnated NiMo catalysts) for HDS reaction of dibenzothiophene reactant molecule. A-Al₂O₃ supported catalysts represented enhanced type 2 sites formation (because this catalystpossesses higher sulfidation degree (80%) and NiMoS sites (19.3 x 10¹⁷ sites/mg) with desired optimum stacking degree (2.5) than wet impregnated catalyst at same metal oxide composition 20%) along with higher active metal dispersion, Mo edge site fraction. The experimental observations were also supported by DFT simulations. Lower heat of adsorption (< 4.2 ev for MoS2 interaction and < 3.15 ev for Ni doped MoS2 interaction) values for A-Al₂O₃ confirmed the presence of weaker metal-support interaction in A-Al₂O₃ in contrast to crystalline ℽ-Al₂O3. The weak metal-support interaction for prepared catalysts clearly suggests the higher formation of type 2 sites which leads to higher catalytic activity for HDS reaction.

Keywords: amorphous alumina, colloidal, desulfurization, metal-support interaction

Procedia PDF Downloads 250
14241 The Structural Pattern: An Event-Related Potential Study on Tang Poetry

Authors: ShuHui Yang, ChingChing Lu

Abstract:

Measuring event-related potentials (ERPs) has been fundamental to our understanding of how people process language. One specific ERP component, a P600, has been hypothesized to be associated with syntactic reanalysis processes. We, however, propose that the P600 is not restricted to reanalysis processes, but is the index of the structural pattern processing. To investigate the structural pattern processing, we utilized the effects of stimulus degradation in structural priming. To put it another way, there was no P600 effect if the structure of the prime was the same with the structure of the target. Otherwise, there would be a P600 effect if the structure were different between the prime and the target. In the experiment, twenty-two participants were presented with four sentences of Tang poetry. All of the first two sentences, being prime, were conducted with SVO+VP. The last two sentences, being the target, were divided into three types. Type one of the targets was SVO+VP. Type two of the targets was SVO+VPVP. Type three of the targets was VP+VP. The result showed that both of the targets, SVO+VPVP and VP+VP, elicited positive-going brainwave, a P600 effect, at 600~900ms time window. Furthermore, the P600 component was lager for the target’ VP+VP’ than the target’ SVO+VPVP’. That meant the more dissimilar the structure was, the lager the P600 effect we got. These results indicate that P600 was the index of the structure processing, and it would affect the P600 effect intensity with the degrees of structural heterogeneity.

Keywords: ERPs, P600, structural pattern, structural priming, Tang poetry

Procedia PDF Downloads 119
14240 Normalized Enterprises Architectures: Portugal's Public Procurement System Application

Authors: Tiago Sampaio, André Vasconcelos, Bruno Fragoso

Abstract:

The Normalized Systems Theory, which is designed to be applied to software architectures, provides a set of theorems, elements and rules, with the purpose of enabling evolution in Information Systems, as well as ensuring that they are ready for change. In order to make that possible, this work’s solution is to apply the Normalized Systems Theory to the domain of enterprise architectures, using Archimate. This application is achieved through the adaptation of the elements of this theory, making them artifacts of the modeling language. The theorems are applied through the identification of the viewpoints to be used in the architectures, as well as the transformation of the theory’s encapsulation rules into architectural rules. This way, it is possible to create normalized enterprise architectures, thus fulfilling the needs and requirements of the business. This solution was demonstrated using the Portuguese Public Procurement System. The Portuguese government aims to make this system as fair as possible, allowing every organization to have the same business opportunities. The aim is for every economic operator to have access to all public tenders, which are published in any of the 6 existing platforms, independently of where they are registered. In order to make this possible, we applied our solution to the construction of two different architectures, which are able of fulfilling the requirements of the Portuguese government. One of those architectures, TO-BE A, has a Message Broker that performs the communication between the platforms. The other, TO-BE B, represents the scenario in which the platforms communicate with each other directly. Apart from these 2 architectures, we also represent the AS-IS architecture that demonstrates the current behavior of the Public Procurement Systems. Our evaluation is based on a comparison between the AS-IS and the TO-BE architectures, regarding the fulfillment of the rules and theorems of the Normalized Systems Theory and some quality metrics.

Keywords: archimate, architecture, broker, enterprise, evolvable systems, interoperability, normalized architectures, normalized systems, normalized systems theory, platforms

Procedia PDF Downloads 339
14239 Diverse Sensitivity to Ultraviolet Radiation of DNA and RNA Viruses

Authors: Nickolay Nosik, Dmitry Nosik, Marina Bochkova, Nina Kondrashina, Olga Lobach

Abstract:

The bactericidal effect of UV radiation is known for long time and widely used for inactivation of pathogens but for viruses it is not so uniform. Due to a wide variety of viruses their sensitivity to UV radiation is quite different and not quite predictable. The goal of the study was to determine the inactivation kinetics of UV radiation ( 254 nm) of the viruses of social importance (HIV), as well as test-viruses (poliovirus, adenovirus) used for the evaluation of the viral inactivation efficacy of germicides. Methods: DNA viruses- adenovirus, type 5; Herpes simplex virus (HSV), type 1, and RNA viruses–human immunodeficiency virus (HIV), type 1 and poliovirus, type 1 (Sabin strain) were obtained from State collection of viruses ( The D.I. Ivanovsky Institute of Virology). The source of UV radiation was a 15-watt low-pressure mercury vapor lamp (over 60% 254nm). The samples of 5cm2 were placed direct under the UV lamp flow (h-0.3m). Log reduction value was used as a marker for the rate of virus inactivation. Results: The data obtained indicate that poliovirus (one of the viruses most resistant to chemical germicides) and HSV are rather sensitive to UV radiation ( D90 =250-311 J/m2). Adenovirus is much more resistant to UV radiation (750 J/m2 ). The kinetics of adenovirus inactivation : 0 min- 5.0 lg TCID50, 10 min - 5,0, 15 min -4,0, 30 min – 3.5, 60 min – 1,0, 75 min -0,5 lg TCID50, 90 min –virus not detectable. HIV is most resistant to UV radiation among the studied viruses. It takes more than 4 hrs to inactivate the virus on the surface. D90 = 2000 J/m2 Conclusion: The results of the study show that there is no direct dependence between sensitivity to UV light and the size of the virion or presence\absence of the envelope of the virus. Poliovirus and adenovirus are small viruses (20-30nm poliovirus and 70-90nm adenovirus) and both are non-enveloped viruses but adenovirus 3-fold more resistant to UV radiation than poliovirus. It can be expected that viruses with more complicate structure, like Herpes virus (200nm) or HIV (80-100 nm), would be more sensitive to UV light. However, the very high resistance of HIV to UV radiation needs further investigation. The diverse resistance of the different viruses to UV radiation should be taken into the account when UV light is used to inactivate infectious viruses in hospitals and other public environments.

Keywords: HIV, HSV, inhibition of viruses, UV radiation

Procedia PDF Downloads 430
14238 Multi-Criteria Evaluation of Integrated Renewable Energy Systems for Community-Scale Applications

Authors: Kuanrong Qiu, Sebnem Madrali, Evgueniy Entchev

Abstract:

To achieve the satisfactory objectives in deploying integrated renewable energy systems, it is crucial to consider all the related parameters affecting the design and decision-making. The multi-criteria evaluation method is a reliable and efficient tool for achieving the most appropriate solution. The approach considers the influential factors and their relative importance in prioritizing the alternatives. In this paper, a multi-criteria decision framework, based on the criteria including technical, economic, environmental and reliability, is developed to evaluate and prioritize renewable energy technologies and configurations of their integrated systems for community applications, identify their viability, and thus support the adoption of the clean energy technologies and the decision-making regarding energy transitions and transition patterns. Case studies for communities in Canada show that resource availability and the configurations of the integrated systems significantly impact the economic performance and environmental performance.

Keywords: multi-criteria, renewables, integrated energy systems, decision-making, model

Procedia PDF Downloads 71
14237 Ab-Initio Study of Native Defects in SnO Under Strain

Authors: A. Albar, D. B. Granato, U. Schwingenschlogl

Abstract:

Tin monoxide (SnO) has promising properties to be applied as a p-type semiconductor in transparent electronics. To this end, it is necessary to understand the behavior of defects in order to control them. We use density functional theory to study native defects of SnO under tensile and compressive strain. We show that Sn vacancies are more stable under tension and less stable under compression, irrespectively of the charge state. In contrast, O vacancies behave differently for different charge. It turns out that the most stable defect under compression is the +1 charged O vacancy in a Sn-rich environment and the charge neutral O interstitial in an O-rich environment. Therefore, compression can be used to transform SnO from an n-type into un-doped semiconductor.

Keywords: native defects, ab-initio, point defect, tension, compression, semiconductor

Procedia PDF Downloads 380
14236 Electric Propulsion Systems in Aerospace Applications - Energy Balance Analysis

Authors: T. Tulwin, M. Gęca, R. Sochaczewski

Abstract:

Recent improvements in electric propulsion systems and energy storage systems allow for the electrification of many sectors where it was previously not feasible. This analysis proves the feasibility of electric propulsion in aviation applications reviewing recent energy storage developments. It can be more quiet, energy efficient and more environmentally friendly. Numerical simulations were done to prove that energy efficiency can be improved for rotorcrafts especially in hover conditions. New types of aircraft configurations are reviewed and future trends are presented.

Keywords: aircraft, propulsion , efficiency, storage

Procedia PDF Downloads 153
14235 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 91
14234 Design, Numerical Simulation, Fabrication and Physical Experimentation of the Tesla’s Cohesion Type Bladeless Turbine

Authors: M.Sivaramakrishnaiah, D. S .Nasan, P. V. Subhanjeneyulu, J. A. Sandeep Kumar, N. Sreenivasulu, B. V. Amarnath Reddy, B. Veeralingam

Abstract:

Design, numerical simulation, fabrication, and physical experimentation of the Tesla’s Bladeless centripetal turbine for generating electrical power are presented in this research paper. 29 Pressurized air combined with water via a nozzle system is made to pass tangentially through a set of parallel smooth discs surfaces, which impart rotational motion to the discs fastened common shaft for the power generation. The power generated depends upon the fluid speed parameter leaving the nozzle inlet. Physically due to laminar boundary layer phenomena at smooth disc surface, the high speed fluid layers away from the plate moving against the low speed fluid layers nearer to the plate develop a tangential drag from the viscous shear forces. This compels the nearer layers to drag along with the high layers causing the disc to spin. Solid Works design software and fluid mechanics and machine elements design theories was used to compute mechanical design specifications of turbine parts like 48 mm diameter discs, common shaft, central exhaust, plenum chamber, swappable nozzle inlets, etc. Also, ANSYS CFX 2018 was used for the numerical 2 simulation of the physical phenomena encountered in the turbine working. When various numerical simulation and physical experimental results were verified, there is good agreement between them 6, both quantitatively and qualitatively. The sources of input and size of the blades may affect the power generated and turbine efficiency, respectively. The results may change if there is a change in the fluid flowing between the discs. The inlet fluid pressure versus turbine efficiency and the number of discs versus turbine power studies based on both results were carried out to develop the 8 relationships between the inlet and outlet parameters of the turbine. The present research work obtained the turbine efficiency in the range of 7-10%, and for this range; the electrical power output generated was 50-60 W.

Keywords: tesla turbine, cohesion type bladeless turbine, boundary layer theory, cohesion type bladeless turbine, tangential fluid flow, viscous and adhesive forces, plenum chamber, pico hydro systems

Procedia PDF Downloads 68
14233 A Proof of the N. Davydov Theorem for Douglis Algebra Valued Functions

Authors: Jean-Marie Vilaire, Ricardo Abreu-Blaya, Juan Bory-Reyes

Abstract:

The classical Beltrami system of elliptic equations generalizes the Cauchy Riemann equation in the complex plane and offers the possibility to consider homogeneous system with no terms of zero order. The theory of Douglis-valued functions, called Hyper-analytic functions, is special case of the above situation. In this note, we prove an analogue of the N. Davydov theorem in the framework of the theory of hyperanalytic functions. The used methodology contemplates characteristic methods of the hypercomplex analysis as well as the singular integral operators and elliptic systems of the partial differential equations theories.

Keywords: Beltrami equation, Douglis algebra-valued function, Hypercomplex Cauchy type integral, Sokhotski-Plemelj formulae

Procedia PDF Downloads 237
14232 An Interoperability Concept for Detect and Avoid and Collision Avoidance Systems: Results from a Human-In-The-Loop Simulation

Authors: Robert Rorie, Lisa Fern

Abstract:

The integration of Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS) poses a variety of technical challenges to UAS developers and aviation regulators. In response to growing demand for access to civil airspace in the United States, the Federal Aviation Administration (FAA) has produced a roadmap identifying key areas requiring further research and development. One such technical challenge is the development of a ‘detect and avoid’ system (DAA; previously referred to as ‘sense and avoid’) to replace the ‘see and avoid’ requirement in manned aviation. The purpose of the DAA system is to support the pilot, situated at a ground control station (GCS) rather than in the cockpit of the aircraft, in maintaining ‘well clear’ of nearby aircraft through the use of GCS displays and alerts. In addition to its primary function of aiding the pilot in maintaining well clear, the DAA system must also safely interoperate with existing NAS systems and operations, such as the airspace management procedures of air traffic controllers (ATC) and collision avoidance (CA) systems currently in use by manned aircraft, namely the Traffic alert and Collision Avoidance System (TCAS) II. It is anticipated that many UAS architectures will integrate both a DAA system and a TCAS II. It is therefore necessary to explicitly study the integration of DAA and TCAS II alerting structures and maneuver guidance formats to ensure that pilots understand the appropriate type and urgency of their response to the various alerts. This paper presents a concept of interoperability for the two systems. The concept was developed with the goal of avoiding any negative impact on the performance level of TCAS II (understanding that TCAS II must largely be left as-is) while retaining a DAA system that still effectively enables pilots to maintain well clear, and, as a result, successfully reduces the frequency of collision hazards. The interoperability concept described in the paper focuses primarily on facilitating the transition from a late-stage DAA encounter (where a loss of well clear is imminent) to a TCAS II corrective Resolution Advisory (RA), which requires pilot compliance with the directive RA guidance (e.g., climb, descend) within five seconds of its issuance. The interoperability concept was presented to 10 participants (6 active UAS pilots and 4 active commercial pilots) in a medium-fidelity, human-in-the-loop simulation designed to stress different aspects of the DAA and TCAS II systems. Pilot response times, compliance rates and subjective assessments were recorded. Results indicated that pilots exhibited comprehension of, and appropriate prioritization within, the DAA-TCAS II combined alert structure. Pilots demonstrated a high rate of compliance with TCAS II RAs and were also seen to respond to corrective RAs within the five second requirement established for manned aircraft. The DAA system presented under test was also shown to be effective in supporting pilots’ ability to maintain well clear in the overwhelming majority of cases in which pilots had sufficient time to respond. The paper ends with a discussion of next steps for research on integrating UAS into civil airspace.

Keywords: detect and avoid, interoperability, traffic alert and collision avoidance system (TCAS II), unmanned aircraft systems

Procedia PDF Downloads 257
14231 Maximizing the Efficiency of Knowledge Management Systems

Authors: Tori Reddy Dodla, Laura Ann Jones

Abstract:

The objective of this study was to propose strategies to improve the efficiency of Knowledge Management Systems (KMS). This study highlights best practices from various industries to create an overall summary of Knowledge Management (KM) and efficiency in organizational performance. Results indicated eleven best practices for maximizing the efficiency of organizational KMS that can be divided into four categories: Designing the KMS, Identifying Case Studies, Implementing the KMS, and Promoting adoption and usage. Our findings can be used as a foundation for scholars to conduct further research on KMS efficiency.

Keywords: artificial intelligence, knowledge management efficiency, knowledge management systems, organizational performance

Procedia PDF Downloads 94
14230 Solar Photovoltaic Pumping and Water Treatment Tools: A Case Study in Ethiopian Village

Authors: Corinna Barraco, Ornella Salimbene

Abstract:

This research involves the Ethiopian locality of Jeldi (North Africa), an area particularly affected by water shortage and in which the pumping and treatment of drinking water are extremely sensitive issues. The study aims to develop and apply low-cost tools for the design of solar water pumping and water purification systems in a not developed country. Consequently, two technical tools have been implemented in Excel i) Solar photovoltaic Pumping (Spv-P) ii) Water treatment (Wt). The Spv-P tool was applied to the existing well (depth 110 [m], dynamic water level 90 [m], static water level 53 [m], well yield 0.1728 [m³h⁻¹]) in the Jeldi area, where estimated water demand is about 50 [m3d-1]. Through the application of the tool, it was designed the water extraction system of the well, obtaining the number of pumps and solar panels necessary for water pumping from the well of Jeldi. Instead, the second tool Wt has been applied in the subsequent phase of extracted water treatment. According to the chemical-physical parameters of the water, Wt returns as output the type of purification treatment(s) necessary to potable the extracted water. In the case of the well of Jeldi, the tool identified a high criticality regarding the turbidity parameter (12 [NTU] vs 5 [NTU]), and a medium criticality regarding the exceeding limits of sodium concentration (234 [mg/L Na⁺] vs 200 [mg/L Na⁺]) and ammonia (0.64 [mg/L NH³-N] vs 0.5 [mg/L NH³-N]). To complete these tools, two specific manuals are provided for the users. The joint use of the two tools would help reduce problems related to access to water resources compared to the current situation and represents a simplified solution for the design of pumping systems and analysis of purification treatments to be performed in undeveloped countries.

Keywords: drinking water, Ethiopia, treatments, water pumping

Procedia PDF Downloads 138
14229 Microwave Dielectric Properties and Microstructures of Nd(Ti₀.₅W₀.₅)O₄ Ceramics for Application in Wireless Gas Sensors

Authors: Yih-Chien Chen, Yue-Xuan Du, Min-Zhe Weng

Abstract:

Carbon monoxide is a substance produced by the incomplete combustion. It is toxic even at concentrations of less than 100ppm. Since it is colorless and odorless, it is difficult to detect. CO sensors have been developed using a variety of physical mechanisms, including semiconductor oxides, solid electrolytes, and organic semiconductors. Many works have focused on using semiconducting sensors composed of sensitive layers such as ZnO, TiO₂, and NiO with high sensitivity for gases. However, these sensors working at high temperatures increased their power consumption. On the other hand, the dielectric resonator (DR) is attractive for gas detection due to its large surface area and sensitivity for external environments. Materials that are to be employed in sensing devices must have a high-quality factor. Numerous researches into the fergusonite-type structure and related ceramic systems have explored. Extensive research into RENbO₄ ceramics has explored their potential application in resonators, filters, and antennas in modern communication systems, which are operated at microwave frequencies. Nd(Ti₀.₅W₀.₅)O₄ ceramics were synthesized herein using the conventional mixed-oxide method. The Nd(Ti₀.₅W₀.₅)O₄ ceramics were prepared using the conventional solid-state method. Dielectric constants (εᵣ) of 15.4-19.4 and quality factor (Q×f) of 3,600-11,100 GHz were obtained at sintering temperatures in the range 1425-1525°C for 4 h. The dielectric properties of the Nd(Ti₀.₅W₀.₅)O₄ ceramics at microwave frequencies were found to vary with the sintering temperature. For a further understanding of these microwave dielectric properties, they were analyzed by densification, X-ray diffraction (XRD), and by making microstructural observations.

Keywords: dielectric constant, dielectric resonators, sensors, quality factor

Procedia PDF Downloads 240
14228 A New Type Safety-Door for Earthquake Disaster Prevention: Part I

Authors: Daniel Y. Abebe, Jaehyouk Choi

Abstract:

From the past earthquake events, many people get hurt at the exit while they are trying to go out of the buildings because of the exit doors are unable to be opened. The door is not opened because it deviates from its the original position. The aim of this research is to develop and evaluate a new type safety door that keeps the door frame in its original position or keeps its edge angles perpendicular during and post-earthquake. The proposed door is composed of three components: outer frame joined to the wall, inner frame (door frame) and circular hollow section connected to the inner and outer frame which is used as seismic energy dissipating device.

Keywords: safety-door, earthquake disaster, low yield point steel, passive energy dissipating device, FE analysis

Procedia PDF Downloads 507
14227 Energy Saving Techniques for MIMO Decoders

Authors: Zhuofan Cheng, Qiongda Hu, Mohammed El-Hajjar, Basel Halak

Abstract:

Multiple-input multiple-output (MIMO) systems can allow significantly higher data rates compared to single-antenna-aided systems. They are expected to be a prominent part of the 5G communication standard. However, these decoders suffer from high power consumption. This work presents a design technique in order to improve the energy efficiency of MIMO systems; this facilitates their use in the next generation of battery-operated communication devices such as mobile phones and tablets. The proposed optimization approach consists of the use of low complexity lattice reduction algorithm in combination with an adaptive VLSI implementation. The proposed design has been realized and verified in 65nm technology. The results show that the proposed design is significantly more energy-efficient than conventional K-best MIMO systems.

Keywords: energy, lattice reduction, MIMO, VLSI

Procedia PDF Downloads 312
14226 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications

Procedia PDF Downloads 198
14225 Application of Compressed Sensing Method for Compression of Quantum Data

Authors: M. Kowalski, M. Życzkowski, M. Karol

Abstract:

Current quantum key distribution systems (QKD) offer low bit rate of up to single MHz. Compared to conventional optical fiber links with multiple GHz bitrates, parameters of recent QKD systems are significantly lower. In the article we present the conception of application of the Compressed Sensing method for compression of quantum information. The compression methodology as well as the signal reconstruction method and initial results of improving the throughput of quantum information link are presented.

Keywords: quantum key distribution systems, fiber optic system, compressed sensing

Procedia PDF Downloads 671
14224 Mining Coupled to Agriculture: Systems Thinking in Scalable Food Production

Authors: Jason West

Abstract:

Low profitability in agriculture production along with increasing scrutiny over environmental effects is limiting food production at scale. In contrast, the mining sector offers access to resources including energy, water, transport and chemicals for food production at low marginal cost. Scalable agricultural production can benefit from the nexus of resources (water, energy, transport) offered by mining activity in remote locations. A decision support bioeconomic model for controlled environment vertical farms was used. Four submodels were used: crop structure, nutrient requirements, resource-crop integration, and economic. They escalate to a macro mathematical model. A demonstrable dynamic systems framework is needed to prove productive outcomes are feasible. We demonstrate a generalized bioeconomic macro model for controlled environment production systems in minesites using systems dynamics modeling methodology. Despite the complexity of bioeconomic modelling of resource-agricultural dynamic processes and interactions, the economic potential greater than general economic models would assume. Scalability of production as an input becomes a key success feature.

Keywords: crop production systems, mathematical model, mining, agriculture, dynamic systems

Procedia PDF Downloads 63
14223 Numerical Analysis of a Reaction Diffusion System of Lambda-Omega Type

Authors: Hassan J. Al Salman, Ahmed A. Al Ghafli

Abstract:

In this study, we consider a nonlinear in time finite element approximation of a reaction diffusion system of lambda-omega type. We use a fixed-point theorem to prove existence of the approximations at each time level. Then, we derive some essential stability estimates and discuss the uniqueness of the approximations. In addition, we employ Nochetto mathematical framework to prove an optimal error bound in time for d= 1, 2 and 3 space dimensions. Finally, we present some numerical experiments to verify the obtained theoretical results.

Keywords: reaction diffusion system, finite element approximation, stability estimates, error bound

Procedia PDF Downloads 410
14222 Business and Psychological Principles Integrated into Automated Capital Investment Systems through Mathematical Algorithms

Authors: Cristian Pauna

Abstract:

With few steps away from the 2020, investments in financial markets is a common activity nowadays. In the electronic trading environment, the automated investment software has become a major part in the business intelligence system of any modern financial company. The investment decisions are assisted and/or made automatically by computers using mathematical algorithms today. The complexity of these algorithms requires computer assistance in the investment process. This paper will present several investment strategies that can be automated with algorithmic trading for Deutscher Aktienindex DAX30. It was found that, based on several price action mathematical models used for high-frequency trading some investment strategies can be optimized and improved for automated investments with good results. This paper will present the way to automate these investment decisions. Automated signals will be built using all of these strategies. Three major types of investment strategies were found in this study. The types are separated by the target length and by the exit strategy used. The exit decisions will be also automated and the paper will present the specificity for each investment type. A comparative study will be also included in this paper in order to reveal the differences between strategies. Based on these results, the profit and the capital exposure will be compared and analyzed in order to qualify the investment methodologies presented and to compare them with any other investment system. As conclusion, some major investment strategies will be revealed and compared in order to be considered for inclusion in any automated investment system.

Keywords: Algorithmic trading, automated investment systems, limit conditions, trading principles, trading strategies

Procedia PDF Downloads 173