Search results for: modern code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4150

Search results for: modern code

2560 Between Kenzo Tange and Fernando Távora: An ‘Affinitarian’ Architectural Regard

Authors: João Cepeda

Abstract:

In crafting their way between theory and practice, authors and artists seem to be always immersed in a never-ending process of relating epochs, objects, and images. Endless ‘affinities’ emerge from a somewhat unexplainable (and intimate) magnetic relation. It is through this ‘warburgian’ assessment that two of the most prominent twentieth-century modern architects from Japan and Portugal are put into perspective, focusing on their paths and thinking-practice, and on the research of their personal and professional archives. Moreover, this research especially aims its focus at essaying specifically on the possible ‘affinities’ between two of their most renowned architectural projects: the Kenzo Tange’s (demolished) Villa Seijo project in Tokyo (Japan) and Fernando Távora’s Tennis Pavilion design in Matosinhos (Portugal), respectively, side-by-side – through in-depth fieldwork in the sites, bibliographical and archival research, (unprecedented) material analysis, and final critical consideration.

Keywords: Tange, Távora, architecture, affinities

Procedia PDF Downloads 66
2559 A Study on Golden Ratio (ф) and Its Implications on Seismic Design Using ETABS

Authors: Vishal A. S. Salelkar, Sumitra S. Kandolkar

Abstract:

Golden ratio (ф) or Golden mean or Golden section, as it is often referred to, is a proportion or a mean, which is often used by architects while conceiving the aesthetics of a structure. Golden Ratio (ф) is an irrational number that can be roughly rounded to 1.618 and is derived out of quadratic equation x2-x-1=0. The use of Golden Ratio (ф) can be observed throughout history, as far as ancient Egyptians, which later peaked during the Greek golden age. The use of this design technique is very much prevalent. At present, architects around the world prefer this as one of the primary techniques to decide aesthetics. In this study, an analysis has been performed to investigate whether the use of the golden ratio while planning a structure has any effects on the seismic behavior of the structure. The structure is modeled and analyzed on ETABS (by Computers and Structures, Inc.) for Seismic requirements equivalent to Zone III (Region: Goa-India) as per Indian Standard Code IS-1893. The results were compared to that of an identical structure modeled along the lines of normal design philosophy, not using the Golden Ratio tools. The results were then compared for Story Shear, Story Drift, and Story Displacement Readings. Improvement in performance, although slight, but was observed. Similar improvements were also observed in subsequent iterations, performed using time-acceleration data of previous major earthquakes matched to Zone III as per IS-1893.

Keywords: ETABS, golden ratio, seismic design, structural behavior

Procedia PDF Downloads 181
2558 Walking in the Steps of Poets: Evoking Past Poets in Sufi Poetry

Authors: Bilal Orfali

Abstract:

It is common practice in modern times to read mystical poetry and apply it to our mundane lives and loves. Sufis in the early period did the opposite. Their mystical hymns often spun out of the courtly poetic ghazal, panegyric, and wine songs. This paper highlights the relation of the Arabic courtly poetic canon to early Sufism. Sufi akhbār and poetry evoke past poets and their poetic heritage. They tend to quote or refer to eminent poets whose poetry must have been widely circulated and memorized. However, Sufism places this readily recognizable poetry in a new context that deliberately changes the past. It is a process of a metaphorization in which the reality of the pre-Islamic, Umayyad, and Abbasid models now acts as a device or metaphor for the Sufi poetics.

Keywords: Sufism, Arabic poetry, literature, Islamic literature, Abbasid

Procedia PDF Downloads 313
2557 Multi-Agent System for Irrigation Using Fuzzy Logic Algorithm and Open Platform Communication Data Access

Authors: T. Wanyama, B. Far

Abstract:

Automatic irrigation systems usually conveniently protect landscape investment. While conventional irrigation systems are known to be inefficient, automated ones have the potential to optimize water usage. In fact, there is a new generation of irrigation systems that are smart in the sense that they monitor the weather, soil conditions, evaporation and plant water use, and automatically adjust the irrigation schedule. In this paper, we present an agent based smart irrigation system. The agents are built using a mix of commercial off the shelf software, including MATLAB, Microsoft Excel and KEPServer Ex5 OPC server, and custom written code. The Irrigation Scheduler Agent uses fuzzy logic to integrate the information that affect the irrigation schedule. In addition, the Multi-Agent system uses Open Platform Connectivity (OPC) technology to share data. OPC technology enables the Irrigation Scheduler Agent to communicate over the Internet, making the system scalable to a municipal or regional agent based water monitoring, management, and optimization system. Finally, this paper presents simulation and pilot installation test result that show the operational effectiveness of our system.

Keywords: community water usage, fuzzy logic, irrigation, multi-agent system

Procedia PDF Downloads 298
2556 The Humanistic Buddhist Ideas of Venerable Master Hsing Yun: A Case Study of the Eighteen Arhats at the Buddha Museum

Authors: You Lu Shi

Abstract:

The Sixteen Arhats evolved around the third and fourth centuries based on a discourse expounded by the great Arhat Nandimitra, the text of which was translated into Chinese by Xuanzang in the mid-seventh century. The iconographical form emerged soon after, in the ninth century. Subsequently, two more Arhats were introduced, which gave rise to the Eighteen Arhats. Today, the Eighteen Arhats at the Fo Guang Shan Buddha Museum is not simply a recollection of the traditionally listed Eighteen Arhats; the roster includes three female Arhats as well. This paper aims to study the ideas that Venerable Master Hsing Yun envisioned when referring to these Eighteen Arhats, and what they represent in the modern world, in the context of Humanistic Buddhism. The differences between the traditional Eighteen Arhats and the new line-up erected at the Buddha Museum will be carefully examined.

Keywords: eighteen Arhats, humanistic Buddhism, Hsing Yun, Buddha Museum

Procedia PDF Downloads 131
2555 Secular Ethics from the Viewpoint of Mostafa Malekian (Analyze, Review, and Critique)

Authors: Hamideh Rahmani

Abstract:

The subject matter of ethics is being changed in modern life, which had been an issue for a long time and aimed to define its moral boundaries in human's intellectual and everyday life. This has led to the introduction of notions based on the separation of religion from ethics in recent decades. It is in conflict with the traditional view, which introduces ethics as raised from religion and religion as the most crucial credit for ethics. The purpose of this study is to investigate the elements of secular ethics from the perspective of Mostafa Malekian, seeking to achieve his notions. After examining the strengths of secular ethics parameters from the viewpoint of Malekian, this research found his ethics in his interpretation of the ideal life which he treats as ethics, got a very strong link with his secularist project known as rationality and spirituality. We will analyze, review, and critique his ethics in the following.

Keywords: secular ethics, Mostafa Malakian, global ethics, rationality, spirituality

Procedia PDF Downloads 127
2554 Neuron Imaging in Lateral Geniculate Nucleus

Authors: Sandy Bao, Yankang Bao

Abstract:

The understanding of information that is being processed in the brain, especially in the lateral geniculate nucleus (LGN), has been proven challenging for modern neuroscience and for researchers with a focus on how neurons process signals and images. In this paper, we are proposing a method to image process different colors within different layers of LGN, that is, green information in layers 4 & 6 and red & blue in layers 3 & 5 based on the surface dimension of layers. We take into consideration the images in LGN and visual cortex, and that the edge detected information from the visual cortex needs to be considered in order to return back to the layers of LGN, along with the image in LGN to form the new image, which will provide an improved image that is clearer, sharper, and making it easier to identify objects in the image. Matrix Laboratory (MATLAB) simulation is performed, and results show that the clarity of the output image has significant improvement.

Keywords: lateral geniculate nucleus, matrix laboratory, neuroscience, visual cortex

Procedia PDF Downloads 279
2553 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 95
2552 Analysis of the Interventions Performed in Pediatric Cardiology Unit Based on Nursing Interventions Classification (NIC-6th): A Pilot Study

Authors: Ji Wen Sun, Nan Ping Shen, Yi Bei Wu

Abstract:

This study used Nursing Interventions Classification (NIC-6th) to identify the interventions performed in a pediatric cardiology unit, and then to analysis its frequency, time and difficulty, so as to give a brief review on what our nurses have done. The research team selected a 35 beds pediatric cardiology unit, and drawn all the nursing interventions in the nursing record from our hospital information system (HIS) from 1 October 2015 to 30 November 2015, using NIC-6th to do the matching and then counting their frequencies. Then giving each intervention its own time and difficulty code according to NIC-6th. The results showed that nurses in pediatric cardiology unit performed totally 43 interventions from 5394 statements, and most of them were in RN(basic) education level needed and less than 15 minutes time needed. There still had some interventions just needed by a nursing assistant but done by nurses, which should call for nurse managers to think about the suitable staffing. Thus, counting the summary of the product of frequency, time and difficulty for each intervention of each nurse can know one's performance. Acknowledgement Clinical Management Optimization Project of Shanghai Shen Kang Hospital Development Center (SHDC2014615); Hundred-Talent Program of Construction of Nursing Plateau Discipline (hlgy16073qnhb).

Keywords: nursing interventions, nursing interventions classification, nursing record, pediatric cardiology

Procedia PDF Downloads 364
2551 Eco-Entrepreneurship: Practice Examples both in the World and Turkey

Authors: O. Esmen, A. Beduk, K. Eryesil, F. Karacelebi

Abstract:

Entrepreneurship is crucial for the economy of countries in development of economy, creating new jobs and increasing employment; therefore improving welfare and a modern point of view in the society. In the development of a country encouragement of entrepreneurship and entrepreneurial qualities also play a paramount role. The increase in the world population results in more production, which brings excessive use of resources and inevitably shortage of them. In addition to this; development in technology, mismanagement in production and deficiency of waste system cause negative effects on the environmental ecological balance. Nowadays, with the societies getting awareness of environment while buying products and services, they prefer companies which are careful about environment. And as a result of this, ecoentrepreneurship gains importance. In this study; ecoentrepreneurship, which we think will gain more importance in the world and Turkey, is presented with the examples from the world and Turkey.

Keywords: ecoentrepreneurship, entrepreneurship, environmental awareness, development of economy

Procedia PDF Downloads 261
2550 Core Competence Development while Carrying out Organizational Changes

Authors: Olga A. Shvetsova

Abstract:

The paper contains the different issues of competence management in industrial companies. The theoretical bases of human resources management and practical issues of innovative enterprises’ competitiveness are considered. The research is focused on the modern industrial enterprise changes management problems; it focuses on the effective personnel management of industrial enterprises on the basis of competence approach. The influence of organizational changes on the competence development is discussed. The need for development of the new technologies is mentioned, proposal is based on competence-based approach in personnel management including in the conditions of carrying out organizational changes; methods of acquisition and development of missing key professional competences are discussed; importance of key competencies in forming competitive advantage of the organization is mentioned.

Keywords: competence model, core competencies, development of industrial company, organizational changes, competitiveness

Procedia PDF Downloads 303
2549 Academic Freedom Policy: A Case Study

Authors: Marlin Killen

Abstract:

The American Association of University Professors (AAUP) describes academic freedom as essential to the purposes of research and teaching. The importance of academic freedom as a bedrock foundation that supports the work of the professoriate cannot be overstated, and there have been innumerable challenges that have attempted to curtail it. These challenges come from a variety of sources that span legal, ethical, cultural, institutional, and professional perspective and are amplified by social media, traditional media, and political action efforts. Because of these challenges, the development of a comprehensive institutional policy on academic freedom that addresses the principles, practices, and appropriate responses to modern challenges can be a daunting task. This presentation will focus on a case study of a university’s effort to develop an updated, evolving policy on academic freedom that provides a framework and remedies for contemporary challenges to this critical function in higher education.

Keywords: academic freedom, academic freedom policy, higher education policy

Procedia PDF Downloads 199
2548 Evolutionary Advantages of Loneliness with an Agent-Based Model

Authors: David Gottlieb, Jason Yoder

Abstract:

The feeling of loneliness is not uncommon in modern society, and yet, there is a fundamental lack of understanding in its origins and purpose in nature. One interpretation of loneliness is that it is a subjective experience that punishes a lack of social behavior, and thus its emergence in human evolution is seemingly tied to the survival of early human tribes. Still, a common counterintuitive response to loneliness is a state of hypervigilance, resulting in social withdrawal, which may appear maladaptive to modern society. So far, no computational model of loneliness’ effect during evolution yet exists; however, agent-based models (ABM) can be used to investigate social behavior, and applying evolution to agents’ behaviors can demonstrate selective advantages for particular behaviors. We propose an ABM where each agent contains four social behaviors, and one goal-seeking behavior, letting evolution select the best behavioral patterns for resource allocation. In our paper, we use an algorithm similar to the boid model to guide the behavior of agents, but expand the set of rules that govern their behavior. While we use cohesion, separation, and alignment for simple social movement, our expanded model adds goal-oriented behavior, which is inspired by particle swarm optimization, such that agents move relative to their personal best position. Since agents are given the ability to form connections by interacting with each other, our final behavior guides agent movement toward its social connections. Finally, we introduce a mechanism to represent a state of loneliness, which engages when an agent's perceived social involvement does not meet its expected social involvement. This enables us to investigate a minimal model of loneliness, and using evolution we attempt to elucidate its value in human survival. Agents are placed in an environment in which they must acquire resources, as their fitness is based on the total resource collected. With these rules in place, we are able to run evolution under various conditions, including resource-rich environments, and when disease is present. Our simulations indicate that there is strong selection pressure for social behavior under circumstances where there is a clear discrepancy between initial resource locations, and against social behavior when disease is present, mirroring hypervigilance. This not only provides an explanation for the emergence of loneliness, but also reflects the diversity of response to loneliness in the real world. In addition, there is evidence of a richness of social behavior when loneliness was present. By introducing just two resource locations, we observed a divergence in social motivation after agents became lonely, where one agent learned to move to the other, who was in a better resource position. The results and ongoing work from this project show that it is possible to glean insight into the evolutionary advantages of even simple mechanisms of loneliness. The model we developed has produced unexpected results and has led to more questions, such as the impact loneliness would have at a larger scale, or the effect of creating a set of rules governing interaction beyond adjacency.

Keywords: agent-based, behavior, evolution, loneliness, social

Procedia PDF Downloads 97
2547 High Performance Nanomaterials for Sustainable and Modern Façade Application

Authors: Farrin Ghorbanalavi, Nihal Arıoğlu

Abstract:

The concept of enhancing mechanical /thermal/physical properties of architectural materials is being practiced for over five decades. In comparison with other approaches, the current nanotechnology era equally attracted the structural scientists, engineers, and industries. It simply promises that using building blocks with dimensions in the nano size range makes it possible to design and develop new multi-functional materials. This research focuses on understanding the effects of nanotechnology on the building facade and new facade concepts based on the new possibilities of nanotechnology. Mentioned factors are very prosperous for the comfort as well as sustainability of the building itself. Furthermore, the study suggests that the potential for energy conservation and reduced waste, toxicity, non-renewable resource consumption, and carbon emissions through the architectural applications of nanotechnologies significant. More clearly, it provides us the information about what does the future hold for surface structures.

Keywords: sustainable, nano materials, façade, energy efficiency

Procedia PDF Downloads 557
2546 Shear Strengthening of RC T-Beams by Means of CFRP Sheets

Authors: Omar A. Farghal

Abstract:

This research aimed to experimentally and analytically investigate the contribution of bonded web carbon fiber reinforced polymer (CFRP) sheets to the shear strength of reinforced concrete (RC) T-beams. Two strengthening techniques using CFRP strips were applied along the shear-span zone: the first one is vertical U-jacket and the later is vertical strips bonded to the beam sides only. Fibers of both U-jacket and side sheets were vertically oriented (θ = 90°). Test results showed that the strengthening technique with U-jacket CFRP sheets improved the shear strength particularly. Three mechanisms of failure were recognized for the tested beams depending upon the end condition of the bonded CFRP sheet. Although the failure mode for the different beams was a brittle one, the strengthened beams provided with U-jacket CFRP sheets showed more or less a ductile behavior at a higher loading level up to a load level just before failure. As a consequence, these beams approved an acceptable enhancement in the structural ductility. Moreover, the obtained results concerning both the strains induced in the CFRP sheets and the maximum loads are used to study the applicability of the analytical models proposed in this study (ACI code) to predict: the nominal shear strength of the strengthened beams.

Keywords: carbon fiber reinforced polymer, wrapping, ductility, shear strengthening

Procedia PDF Downloads 255
2545 Segmentation of Arabic Handwritten Numeral Strings Based on Watershed Approach

Authors: Nidal F. Shilbayeh, Remah W. Al-Khatib, Sameer A. Nooh

Abstract:

Arabic offline handwriting recognition systems are considered as one of the most challenging topics. Arabic Handwritten Numeral Strings are used to automate systems that deal with numbers such as postal code, banking account numbers and numbers on car plates. Segmentation of connected numerals is the main bottleneck in the handwritten numeral recognition system.  This is in turn can increase the speed and efficiency of the recognition system. In this paper, we proposed algorithms for automatic segmentation and feature extraction of Arabic handwritten numeral strings based on Watershed approach. The algorithms have been designed and implemented to achieve the main goal of segmenting and extracting the string of numeral digits written by hand especially in a courtesy amount of bank checks. The segmentation algorithm partitions the string into multiple regions that can be associated with the properties of one or more criteria. The numeral extraction algorithm extracts the numeral string digits into separated individual digit. Both algorithms for segmentation and feature extraction have been tested successfully and efficiently for all types of numerals.

Keywords: handwritten numerals, segmentation, courtesy amount, feature extraction, numeral recognition

Procedia PDF Downloads 381
2544 Consumer Market for Georgian Hazelnut and the Strategy to Improve Its Competitiveness

Authors: M. Chavleishvili

Abstract:

The paper presents the trends of Georgian hazelnut market development and analyses the competitive advantages which will help Georgia to enter international hazelnut market using modern technologies. The history of hazelnut crop development and hazelnut species in Georgia are discussed. For hazelnut supply analysis trends in hazelnut production are considered, trends in export and import development is evaluated, domestic hazelnut market is studied and analysed based on expert interviews and initial accounting materials. In order to achieve and strengthen its position in international market, potential advantages and disadvantages of Georgian hazelnut are revealed, analysis of export and import possibilities of hazelnut is presented. Recommendations are developed based on the conclusions, which are made through identifying the key factors that hinder development of Georgian hazelnut market.

Keywords: hazelnut market, hazelnut export and import, competitiveness of hazelnut

Procedia PDF Downloads 437
2543 Media Coverage of the Turkish Armenian Journalist Hrant Dink Assassination: The Analysis of Media News in the Aftermath of the Assassination

Authors: Nusret Mesut Sahin

Abstract:

Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos, was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. Despite intensive media coverage of his assassination, there is not enough research analyzing how national and international media presented Dink’s assassination. In this research, a content analysis of national and international news articles (N= 139) is conducted to identify whether there is a significant difference in national and international media’s coverage of the assassination. The content of the newspaper articles is categorized and coded according to the topics covered. The findings of this research suggested that Dink’s assassination wounded Turkey’s image as a democratic country. It has also been found that the Turkish media focused on security forces and their responsibility in Dink’s assassination, whereas international media focused more on the Article 301 of the Turkish penal code, freedom of expression, and atrocities against the Armenians during the Ottoman rule.

Keywords: Hrant Dink, Armenian, journalist, assassination

Procedia PDF Downloads 152
2542 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security

Authors: James Andrew Fitzjohn

Abstract:

This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.

Keywords: quantum computing, encryption, RSA, roadmap, real world

Procedia PDF Downloads 131
2541 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases

Authors: Suglo Tohari Luri

Abstract:

Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.

Keywords: data, engine, intelligence, customer, neo4j, database

Procedia PDF Downloads 193
2540 Magnitude of Green Computing in Trending IT World

Authors: Raghul Vignesh Kumar, M. Vadivel

Abstract:

With the recent years many industries and companies have turned their attention in realizing how going 'green' can benefit public relations, lower cost, and reduce global emissions from industrial manufacturing. Green Computing has become an originative way on how technology and ecology converge together. It is a growing import subject that creates an urgent need to train next generation computer scientists or practitioners to think ‘green’. However, green computing has not yet been well taught in computer science or computer engineering courses as a subject. In this modern IT world it’s impossible for an organization or common man to work without hardware like servers, desktop, IT devices, smartphones etc. But it is also important to consider the harmful impact of those devices and steps to achieve energy saving and environmental protection. This paper presents the magnitude of green computing and steps to be followed to go green.

Keywords: green computing, carbon-dioxide, greenhouse gas, energy saving, environmental protection agency

Procedia PDF Downloads 416
2539 Chromite Exploration Using Electrical Resistivity Tomography in Ingessana Hill, Blue Nile State, Sudan

Authors: Mohamed A. Mohamed-Ali, Jannis Simos, Khalid M. Kheiralla

Abstract:

The Ingessana hills in the southern Blue Nile of Sudan are part of the southern sector of the NE-SW trending ophiolithic belt of the Arab-Nubian Shield with mid-neoproterozoic age. The rocks are mainly serpentinized and in parts highly silicified dunites especially towards the contact with the intruding Bau granite. A promising chromite mineralization zones in the area tend to be generally associated with NE-SW trending shear-zones. A detailed geophysical survey employing electrical resistivity tomography (ERT) at 34 lines were carried out over a zone of a known chromite mineralization to test feasibility of detecting and delineating the ore (if exist) and accordingly facilitate the positioning of exploratory drill holes. ERT sections were inverted with smooth constraints inversion code where the contacts between the granite and the ultramafics are showing up clearly. The continuity of mineralization along the contact is not well confirmed. However, the low-resistivity anomalies are probably recognized as potential chromite mineralization zones. These anomalies represent prime targets for further exploration by drilling, trenching or shallow pits. If the results of the drilling or excavations are positive, small open pit exploitations may produce important tonnages of chromite.

Keywords: chromite exploration, ERT, Ingessana Hills, inversion

Procedia PDF Downloads 388
2538 The Model Establishment and Analysis of TRACE/FRAPTRAN for Chinshan Nuclear Power Plant Spent Fuel Pool

Authors: J. R. Wang, H. T. Lin, Y. S. Tseng, W. Y. Li, H. C. Chen, S. W. Chen, C. Shih

Abstract:

TRACE is developed by U.S. NRC for the nuclear power plants (NPPs) safety analysis. We focus on the establishment and application of TRACE/FRAPTRAN/SNAP models for Chinshan NPP (BWR/4) spent fuel pool in this research. The geometry is 12.17 m × 7.87 m × 11.61 m for the spent fuel pool. In this study, there are three TRACE/SNAP models: one-channel, two-channel, and multi-channel TRACE/SNAP model. Additionally, the cooling system failure of the spent fuel pool was simulated and analyzed by using the above models. According to the analysis results, the peak cladding temperature response was more accurate in the multi-channel TRACE/SNAP model. The results depicted that the uncovered of the fuels occurred at 2.7 day after the cooling system failed. In order to estimate the detailed fuel rods performance, FRAPTRAN code was used in this research. According to the results of FRAPTRAN, the highest cladding temperature located on the node 21 of the fuel rod (the highest node at node 23) and the cladding burst roughly after 3.7 day.

Keywords: TRACE, FRAPTRAN, BWR, spent fuel pool

Procedia PDF Downloads 357
2537 A Study for the Effect of Fire Initiated Location on Evacuation Success Rate

Authors: Jin A Ryu, Hee Sun Kim

Abstract:

As the number of fire accidents is gradually raising, many studies have been reported on evacuation. Previous studies have mostly focused on evaluating the safety of evacuation and the risk of fire in particular buildings. However, studies on effects of various parameters on evacuation have not been nearly done. Therefore, this paper aims at observing evacuation time under the effect of fire initiated location. In this study, evacuation simulations are performed on a 5-floor building located in Seoul, South Korea using the commercial program, Fire Dynamics Simulator with Evacuation (FDS+EVAC). Only the fourth and fifth floors are modeled with an assumption that fire starts in a room located on the fourth floor. The parameter for evacuation simulations is location of fire initiation to observe the evacuation time and safety. Results show that the location of fire initiation is closer to exit, the more time is taken to evacuate. The case having the nearest location of fire initiation to exit has the lowest ratio of successful occupants to the total occupants. In addition, for safety evaluation, the evacuation time calculated from computer simulation model is compared with the tolerable evacuation time according to code in Japan. As a result, all cases are completed within the tolerable evacuation time. This study allows predicting evacuation time under various conditions of fire and can be used to evaluate evacuation appropriateness and fire safety of building.

Keywords: fire simulation, evacuation simulation, temperature, evacuation safety

Procedia PDF Downloads 349
2536 A Study of Adaptive Fault Detection Method for GNSS Applications

Authors: Je Young Lee, Hee Sung Kim, Kwang Ho Choi, Joonhoo Lim, Sebum Chun, Hyung Keun Lee

Abstract:

A purpose of this study is to develop efficient detection method for Global Navigation Satellite Systems (GNSS) applications based on adaptive estimation. Due to dependence of radio frequency signals, GNSS measurements are dominated by systematic errors in receiver’s operating environment. Thus, to utilize GNSS for aerospace or ground vehicles requiring high level of safety, unhealthy measurements should be considered seriously. For the reason, this paper proposes adaptive fault detection method to deal with unhealthy measurements in various harsh environments. By the proposed method, the test statistics for fault detection is generated by estimated measurement noise. Pseudorange and carrier-phase measurement noise are obtained at time propagations and measurement updates in process of Carrier-Smoothed Code (CSC) filtering, respectively. Performance of the proposed method was evaluated by field-collected GNSS measurements. To evaluate the fault detection capability, intentional faults were added to measurements. The experimental result shows that the proposed detection method is efficient in detecting unhealthy measurements and improves the accuracy of GNSS positioning under fault occurrence.

Keywords: adaptive estimation, fault detection, GNSS, residual

Procedia PDF Downloads 575
2535 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 408
2534 Machine Learning Approach for Mutation Testing

Authors: Michael Stewart

Abstract:

Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs. This paper used reinforcement learning and parallel processing within the context of mutation testing for the selection of mutation operators and test cases that reduced the computational cost of testing and improved test suite effectiveness. Experiments were conducted using sample programs to determine how well the reinforcement learning-based algorithm performed with one live mutation, multiple live mutations and no live mutations. The experiments, measured by mutation score, were used to update the algorithm and improved accuracy for predictions. The performance was then evaluated on multiple processor computers. With reinforcement learning, the mutation operators utilized were reduced by 50 – 100%.

Keywords: automated-testing, machine learning, mutation testing, parallel processing, reinforcement learning, software engineering, software testing

Procedia PDF Downloads 198
2533 Optimal Design of Profiled Steel Sheet for Composite Slab

Authors: Adinew Gebremeskel Tizazu

Abstract:

Nowadays, in our world of technological development, there is an enhanced intention imposed on the building construction industry to improve the time, economy, and structural efficiency of structures. Modern profiled steel sheets are mostly designed as formwork and tensile reinforcement. This research is concerned with the optimal design of profiled steel sheets for composite slabs. Apart from satisfying the safety requirement, the design should be economical. For a given condition, there might be a large number of alternatives that satisfy the requirement set by the codes. But the designer must be in a position to choose the design, which is optimal against certain measures of optimality. Therefore, the designers have to do some optimization to arrive at such a design. In this research, the optimal cross-sectional dimensions of profiled steel sheets will be determined by considering different spans, loadings, and materials.

Keywords: profiled sheeting, optimal cross-sectional dimensions, cold-formed profiled sheets, composite slab

Procedia PDF Downloads 23
2532 Silage for Dairy Production: A Case Study of Pakistan

Authors: Noor-ul-Ain, Muhammad Thair Khan, Adeela Ajmal, Hamid Mustafa

Abstract:

Pakistan is an agricultural country and livestock only share 11.8 percent to national GDP during 2015-16. Pakistan is a 3rd largest milk producing country having 41.2, 35.6, 29.4, 68.4 and 1.0 million head cattle, buffalo, sheep, goat and camel, respectively. Modern urbanization and shortage of feed resources for livestock species in a country is an alarming threat. The introduction of new technology and advanced techniques solve this issue. This includes drought feeding, increase production, aid to crop management, balance nutrition and easily storaged of wet feed products. It is therefore clear that silage has important role in animal feed and feeding. Financial model of this study clear the effectiveness of silage. Therefore, it is revealed from this study that silage is a cost-effective option for a profitable dairy farming in Pakistan.

Keywords: feed, silage, dairy, production, Pakistan

Procedia PDF Downloads 437
2531 Modern Forms and Aesthetics in Design

Authors: Chukwuma Anya, Mekwa Eme

Abstract:

The term ‘’FORM’’ in design could be referred to as the combination of various shapes of different sizes and assembling them in appropriate positions to achieve a unique figure of high aesthetic value. A deduction from this definition is that forms contribute immensely to the actualization of aesthetics in a building. When these various shapes and figures are properly assembled, it may give rise to a concept in design. However some architects and other designers either misuse or abuse the use of these shapes, hence resulting to a design imbalance, lack of uniformity and expression. This academic work is designed to educate the public on the proper usage of some regular shapes like circles, rectangles, pentagons, hexagons, triangles etc, to achieve a unique form in design. By the end of this work, one should be able to assemble different shapes to express different emotions of the mind, such as peace, love, confusion, war, and unity. Some elements of design, such as balance, stability, functionality and aesthetics, will also be achieved even as the building maintains its unique form.

Keywords: aesthetics, form, balance, stability

Procedia PDF Downloads 85