Search results for: computer terms
6597 On Confidence Intervals for the Difference between Inverse of Normal Means with Known Coefficients of Variation
Authors: Arunee Wongkhao, Suparat Niwitpong, Sa-aat Niwitpong
Abstract:
In this paper, we propose two new confidence intervals for the difference between the inverse of normal means with known coefficients of variation. One of these two confidence intervals for this problem is constructed based on the generalized confidence interval and the other confidence interval is constructed based on the closed form method of variance estimation. We examine the performance of these confidence intervals in terms of coverage probabilities and expected lengths via Monte Carlo simulation.Keywords: coverage probability, expected length, inverse of normal mean, coefficient of variation, generalized confidence interval, closed form method of variance estimation
Procedia PDF Downloads 3096596 Nature, Elixir of Architecture: A Contemplation on Human, Nature and Architecture in Islam
Authors: A. Kabiri-Samani, M. J. Seddighi
Abstract:
There is no doubt that a key factor in the manifestation of architecture is the interaction of human and nature. Explaining the type of relationship defined by “the architect” between architecture and nature opens a window towards understanding the theoretical conceptions of the architect as the creator of “architecture”. Now, if these theoretical foundations are put under scrutiny from the viewpoint of Islam, and an architect considers the relationship of human and nature within the context of Islam, he would let nature to manifest itself in architecture. The reasons for such a relationship is explicable in terms of the degree and nature of knowledge of the architect about nature; while the way it comes to existence is explained by defining the force of nature – ruling the entire nature – and its acts. It is by the scientific command of the architect and his mastery in the hermetic force of nature that the material bodies of buildings evolve from artificial to natural. Additionally, the presence of nature creates hermetic architectural spaces for the spiritual development of humans while serving for living at different levels.Keywords: nature, Islam, cognition, science, presence, elixir
Procedia PDF Downloads 4896595 Compare Hot Forming and Cold Forming in Rolling Process
Authors: Ali Moarrefzadeh
Abstract:
In metalworking, rolling is a metal forming process in which metal stock is passed through a pair of rolls. Rolling is classified according to the temperature of the metal rolled. If the temperature of the metal is above its recrystallization temperature, then the process is termed as hot rolling. If the temperature of the metal is below its recrystallization temperature, the process is termed as cold rolling. In terms of usage, hot rolling processes more tonnage than any other manufacturing process, and cold rolling processes the most tonnage out of all cold working processes. This article describes the use of advanced tubing inspection NDT methods for boiler and heat exchanger equipment in the petrochemical industry to supplement major turnaround inspections. The methods presented include remote field eddy current, magnetic flux leakage, internal rotary inspection system and eddy current.Keywords: hot forming, cold forming, metal, rolling, simulation
Procedia PDF Downloads 5296594 National Project 'Environment' of Russian Federation as a Management Tool in Achieving SDGs
Authors: Ekaterina Posokhova, Boris Gavrilov
Abstract:
Priority national projects have become an essential phenomenon in the Russian Federation. Both regional and local government institutions and a significant part of the society have been involved in their implementation. The scale and multispectricity of the national projects give a reason to believe that their concept is beyond the scope of the individual state programs. The national project “environment” contains federal projects on waste management, water, and air quality, ecotourism development, and biodiversity conservation highlights the importance of the preservation and restoration of Volga River and Lake Baikal ecosystems. This study assesses the national projects according to their relativeness with the current SDGs (i.e., SGD 14 and 15), evaluates the methodology of the projects. The paper considers the peculiarities of the national projects as strategic management tools as well as the possibility of amending the project objective indicators. Conclusion on the effectiveness of NP in terms of achieving SDGs is provided.Keywords: management, SDP, russia, conservation, law
Procedia PDF Downloads 1446593 Analysis of Environmental Impacts Generated in the Seasons of Holidays from Praia Dos Buritis in Palmas, Tocantins, Brazil
Authors: Alana C. M. Santana, Mary L. G. S. Senna
Abstract:
T Sustainable development is very important for the existence of life on the planet. The use of any space without planning can cause impacts on the environment, which depending on the proportion may be irreversible. Buritis beach is very frequented by visitors, but it has no information on use and does not have enough infrastructure to collaborate with the preservation of the environment. Therefore, the objective of this study was to adopt a simple control list of environmental impacts in river beaches, in order to identify the environmental impacts generated in the post-holiday seasons of Buritis beach and to characterize the beach in terms of infrastructure. The holidays that carried out the analyzes were the nationals of the second half of 2017, as well as the universal fraternization holiday of 2018. The results show that the beach needs investments in its infrastructure and educational campaigns to minimize environmental impacts caused by anthropic action.Keywords: environmental impacts, sustainable development, Buritis Beach, Brazil.
Procedia PDF Downloads 1566592 An Improvement of Multi-Label Image Classification Method Based on Histogram of Oriented Gradient
Authors: Ziad Abdallah, Mohamad Oueidat, Ali El-Zaart
Abstract:
Image Multi-label Classification (IMC) assigns a label or a set of labels to an image. The big demand for image annotation and archiving in the web attracts the researchers to develop many algorithms for this application domain. The existing techniques for IMC have two drawbacks: The description of the elementary characteristics from the image and the correlation between labels are not taken into account. In this paper, we present an algorithm (MIML-HOGLPP), which simultaneously handles these limitations. The algorithm uses the histogram of gradients as feature descriptor. It applies the Label Priority Power-set as multi-label transformation to solve the problem of label correlation. The experiment shows that the results of MIML-HOGLPP are better in terms of some of the evaluation metrics comparing with the two existing techniques.Keywords: data mining, information retrieval system, multi-label, problem transformation, histogram of gradients
Procedia PDF Downloads 3746591 Assessment of an ICA-Based Method for Detecting the Effect of Attention in the Auditory Late Response
Authors: Siavash Mirahmadizoghi, Steven Bell, David Simpson
Abstract:
In this work a new independent component analysis (ICA) based method for noise reduction in evoked potentials is evaluated on for auditory late responses (ALR) captured with a 63-channel electroencephalogram (EEG) from 10 normal-hearing subjects. The performance of the new method is compared with a single channel alternative in terms of signal to noise ratio (SNR), the number of channels with an SNR above an empirically derived statistical critical value and an estimate of the effect of attention on the major components in the ALR waveform. The results show that the multichannel signal processing method can significantly enhance the quality of the ALR signal and also detect the effect of the attention on the ALR better than the single channel alternative.Keywords: auditory late response (ALR), attention, EEG, independent component analysis (ICA), multichannel signal processing
Procedia PDF Downloads 5056590 A Research Review on the Presence of Pesticide Residues in Apples Carried out in Poland in the Years 1980-2015
Authors: Bartosz Piechowicz, Stanislaw Sadlo, Przemyslaw Grodzicki, Magdalena Podbielska
Abstract:
Apples are popular fruits. They are eaten freshly and/or after processing. For instance Golden Delicious is an apple variety commonly used in production of foods for babies and toddlers. It is no wonder that complex analyses of the pesticide residue levels in those fruits have been carried out since eighties, and continued for the next years up to now. The results obtained were presented, usually as a teamwork, at the scientific sessions organised by the (IOR) Institute of Plant Protection-National Research Institute in Poznań and published in Scientific Works of the Institute (now Progress in Plant Protection/ Postępy w Ochronie Roślin) or Journal of Plant Protection Research, and in many non-periodical publications. These reports included studies carried out by IOR Laboratories in Poznań, Sośnicowice, Rzeszów and Bialystok. First detailed studies on the presence of pesticide residues in apple fruits by the laboratory in Rzeszów were published in 1991 in the article entitled 'The presence of pesticides in apples of late varieties from the area of south-eastern Poland in the years 1986-1989', in Annals of National Institute of Hygiene in Warsaw. These surveys gave the scientific base for business contacts between the Polish company Alima and the American company Gerber. At the beginning of XXI century, in Poland, systematic and complex studies on the deposition of pesticide residues in apples were initiated. First of all, the levels of active ingredients of plant protection products applied against storage diseases at 2-3 weeks before the harvest were determined. It is known that the above mentioned substances usually generate the highest residue levels. Also, the assessment of the fungicide residues in apples during their storage in controlled atmosphere and during their processing was carried out. Taking into account the need of actualisation the Maximum Residue Levels of pesticides, in force in Poland and in other European countries, and rationalisation of the ways of their determination, a lot of field tests on the behaviour of more important fungicides on the mature fruits just before their harvesting, were carried out. A rate of their disappearance and mathematical equation that showed the relationship between the residue level of any substance and the used dose, have been determined. The two parameters have allowed to evaluate the Maximum Residue Levels (MRLs) of pesticides, which were in force at that time, and to propose a coherent model of their determination in respect to the new substances. The obtained results were assessed in terms of the health risk for adult consumers and children, and to such determination of terms of treatment that mature apples could meet the rigorous level of 0.01 mg/kg.Keywords: apple, disappearance, health risk, MRL, pesticide residue, research
Procedia PDF Downloads 2746589 Constructing a Semi-Supervised Model for Network Intrusion Detection
Authors: Tigabu Dagne Akal
Abstract:
While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.Keywords: intrusion detection, data mining, computer science, data mining
Procedia PDF Downloads 2966588 The Customer Attitude and Behavior of Boutique Hotels in Eastern Part of Thailand
Authors: Anocha Rojanapanich
Abstract:
This research aimed to identify important factors that effect customer satisfaction in boutique hotels and the important factors effecting customer loyalty in returning to boutique hotels. Furthermore, this study also aimed to study demographics, which effect variable factors. Four hundred questionnaires were completed by customers of the boutique hotels. The descriptive statistics used in this paper were percentages, means, and standard deviation (S.D.), while hypothesis testing was done using T-test, Anova, Correlation and Regression to analyze the relationship among those factors. In terms of the purpose in staying, it was found that the largest respondent was for ‘leisure purposes’. While the frequency indicated that most of the customers who stayed ‘once’in the last two years in the hotels had less concern in the hotel’s image than other groups. For customer’s perceived value and income levels had an influence on customer perceived values in both functional value price and emotional value.Keywords: boutique hotels, customer attitude, customer satisfaction, customer loyalty
Procedia PDF Downloads 3086587 Solving Process Planning and Scheduling with Number of Operation Plus Processing Time Due-Date Assignment Concurrently Using a Genetic Search
Authors: Halil Ibrahim Demir, Alper Goksu, Onur Canpolat, Caner Erden, Melek Nur
Abstract:
Traditionally process planning, scheduling and due date assignment are performed sequentially and separately. High interrelation between these functions makes integration very useful. Although there are numerous works on integrated process planning and scheduling and many works on scheduling with due date assignment, there are only a few works on the integration of these three functions. Here we tested the different integration levels of these three functions and found a fully integrated version as the best. We applied genetic search and random search and genetic search was found better compared to the random search. We penalized all earliness, tardiness and due date related costs. Since all these three terms are all undesired, it is better to penalize all of them.Keywords: process planning, scheduling, due-date assignment, genetic algorithm, random search
Procedia PDF Downloads 3756586 Urban Design for Autonomous Vehicles
Authors: Narjis Zehra
Abstract:
After automobile revolution 1.0, we have automobile revolution 2.0 standing at the horizon, Autonomous Vehicles (AVs). While the technology is developing into more adaptable form, the conversations around its impact on our cities have already started on multiple scales, from academic institutions and community town halls, to the offices of mayors. In order to explore more the AVs impact on Urban transformation, we first inquire if cities can be redesigned or rebuilt. Secondly, we discuss expectation management for the public and policy in terms of what people think/believe AV technology will deliver, and what the current technological evidence suggests the technology and its adoption will look like. Thirdly, based on these discussions, we take Pittsburgh, PA, as a case study to extrapolate what other cities might need to do in order to prepare themselves for the upcoming technological revolution, that may impact more than just the research institutes. Finally, we conclude by suggesting a political way forward to embed urban design with AV technology for equitable cities of tomorrow.Keywords: urban design, autonomous vehicles, transformation, policy
Procedia PDF Downloads 1066585 Password Cracking on Graphics Processing Unit Based Systems
Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik
Abstract:
Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.Keywords: GPGPU, password cracking, secret key, user authentication
Procedia PDF Downloads 2906584 Customization of Moodle Open Source LMS for Tanzania Secondary Schools’ Use
Authors: Ellen A. Kalinga
Abstract:
Moodle is an open source learning management system that enables creation of a powerful and flexible learning environment. Many organizations, especially learning institutions have customized Moodle open source LMS for their own use. In general open source LMSs are of great interest due to many advantages they offer in terms of cost, usage and freedom to customize to fit a particular context. Tanzania Secondary School e-Learning (TanSSe-L) system is the learning management system for Tanzania secondary schools. TanSSe-L system was developed using a number of methods, one of them being customization of Moodle Open Source LMS. This paper presents few areas on the way Moodle OS LMS was customized to produce a functional TanSSe-L system fitted to the requirements and specifications of Tanzania secondary schools’ context.Keywords: LMS, Moodle, e-learning, Tanzania, secondary school
Procedia PDF Downloads 3936583 Data-Mining Approach to Analyzing Industrial Process Information for Real-Time Monitoring
Authors: Seung-Lock Seo
Abstract:
This work presents a data-mining empirical monitoring scheme for industrial processes with partially unbalanced data. Measurement data of good operations are relatively easy to gather, but in unusual special events or faults it is generally difficult to collect process information or almost impossible to analyze some noisy data of industrial processes. At this time some noise filtering techniques can be used to enhance process monitoring performance in a real-time basis. In addition, pre-processing of raw process data is helpful to eliminate unwanted variation of industrial process data. In this work, the performance of various monitoring schemes was tested and demonstrated for discrete batch process data. It showed that the monitoring performance was improved significantly in terms of monitoring success rate of given process faults.Keywords: data mining, process data, monitoring, safety, industrial processes
Procedia PDF Downloads 4016582 Stability of Essential Oils in Pang-Rum by Gas Chromatography-Mass Spectrometry
Authors: K. Jarmkom, P. Eakwaropas, W. Khobjai, S. Techaeoi
Abstract:
Ancient Thai perfumed powder was used as a fragrance for clothing, food, and the body. Plant-based natural Thai perfume products are known as Pang-Rum. The objective of this study was to evaluate the stability of essential oils after six months of incubation. The chemical compositions were determined by gas chromatography-mass spectrometry (GC-MS), in terms of the qualitative composition of the isolated essential oil. The isolation of the essential oil of natural products by incubate sample for 5 min at 40 ºC is described. The volatile components were identified by percentage of total peak areas comparing their retention times of GC chromatograph with NIST mass spectral library. The results show no significant difference in the seven chromatograms of perfumed powder (Pang-Rum) both with binder and without binder. Further identification was done by GC-MS. Some components of Pang-Rum with/without binder were changed by temperature and time.Keywords: GC-MS analysis, essential oils, stability, Pang-Rum
Procedia PDF Downloads 2726581 Analysis of Cooperative Hybrid ARQ with Adaptive Modulation and Coding on a Correlated Fading Channel Environment
Authors: Ibrahim Ozkan
Abstract:
In this study, a cross-layer design which combines adaptive modulation and coding (AMC) and hybrid automatic repeat request (HARQ) techniques for a cooperative wireless network is investigated analytically. Previous analyses of such systems in the literature are confined to the case where the fading channel is independent at each retransmission, which can be unrealistic unless the channel is varying very fast. On the other hand, temporal channel correlation can have a significant impact on the performance of HARQ systems. In this study, utilizing a Markov channel model which accounts for the temporal correlation, the performance of non-cooperative and cooperative networks are investigated in terms of packet loss rate and throughput metrics for Chase combining HARQ strategy.Keywords: cooperative network, adaptive modulation and coding, hybrid ARQ, correlated fading
Procedia PDF Downloads 1446580 Strengthening of Reinforced Concrete Beam-Column Joint by Reversible Mixed Technologies of FRP
Authors: Nasser-Eddine Attari
Abstract:
After the earthquake many structures were classified as slightly damaged and, being uneconomic to replace them, at least in the short term, suitable means of repairs of the beam column joint area are being studied. Furthermore there exist a large number of buildings that need retrofitting of the joints before the next earthquake. The paper reports the results of the experimental programme, constituted of three beam-column reinforced concrete joints at a scale of one to three (1/3) tested under the effect of a pre-stressed axial load acting over the column. The beams were subjected at their ends to an alternate cyclic loading under displacement control to simulate a seismic action. Strain and cracking fields were monitored with the help a digital recording camera. Following the analysis of the results, a comparison can be made between the performances in terms of ductility, strength and mode of failure of the different strengthening solution considered.Keywords: fibrereinforced polymers, joints, reinforced concrete, beam columns
Procedia PDF Downloads 5016579 A Normalized Non-Stationary Wavelet Based Analysis Approach for a Computer Assisted Classification of Laryngoscopic High-Speed Video Recordings
Authors: Mona K. Fehling, Jakob Unger, Dietmar J. Hecker, Bernhard Schick, Joerg Lohscheller
Abstract:
Voice disorders origin from disturbances of the vibration patterns of the two vocal folds located within the human larynx. Consequently, the visual examination of vocal fold vibrations is an integral part within the clinical diagnostic process. For an objective analysis of the vocal fold vibration patterns, the two-dimensional vocal fold dynamics are captured during sustained phonation using an endoscopic high-speed camera. In this work, we present an approach allowing a fully automatic analysis of the high-speed video data including a computerized classification of healthy and pathological voices. The approach bases on a wavelet-based analysis of so-called phonovibrograms (PVG), which are extracted from the high-speed videos and comprise the entire two-dimensional vibration pattern of each vocal fold individually. Using a principal component analysis (PCA) strategy a low-dimensional feature set is computed from each phonovibrogram. From the PCA-space clinically relevant measures can be derived that quantify objectively vibration abnormalities. In the first part of the work it will be shown that, using a machine learning approach, the derived measures are suitable to distinguish automatically between healthy and pathological voices. Within the approach the formation of the PCA-space and consequently the extracted quantitative measures depend on the clinical data, which were used to compute the principle components. Therefore, in the second part of the work we proposed a strategy to achieve a normalization of the PCA-space by registering the PCA-space to a coordinate system using a set of synthetically generated vibration patterns. The results show that owing to the normalization step potential ambiguousness of the parameter space can be eliminated. The normalization further allows a direct comparison of research results, which bases on PCA-spaces obtained from different clinical subjects.Keywords: Wavelet-based analysis, Multiscale product, normalization, computer assisted classification, high-speed laryngoscopy, vocal fold analysis, phonovibrogram
Procedia PDF Downloads 2656578 A Novel Multi-Block Selective Mapping Scheme for PAPR Reduction in FBMC/OQAM Systems
Authors: Laabidi Mounira, Zayani Rafk, Bouallegue Ridha
Abstract:
Filter Bank Multicarrier with Offset Quadrature Amplitude Modulation (FBMC/OQAM) is presently known as a sustainable alternative to conventional Orthogonal Frequency Division Multiplexing (OFDM) for signal transmission over multi-path fading channels. Like all multicarrier systems, FBMC/OQAM suffers from high Peak to Average Power Ratio (PAPR). Due to the symbol overlap inherent in the FBMC/OQAM system, the direct application of conventional OFDM PAPR reduction scheme is far from being effective. This paper suggests a novel scheme termed Multi-Blocks Selective Mapping (MB-SLM) whose simulation results show that its performance in terms of PAPR reduction is almost identical to that of OFDM system.Keywords: FBMC/OQAM, multi-blocks, OFDM, PAPR, SLM
Procedia PDF Downloads 4636577 The Importance of Cultural Adaptation of B2C E-Services Design in Germany
Authors: Rasha Alhendawi
Abstract:
This research will give the introductory ideas for cultural adaption of B2C E-Service design in Germany. By the intense competition of E-Service development, many companies have realized the importance of understanding the emotional and cultural characteristics of their customers. Ignoring customers’ needs and requirements throughout the E-Service design can lead to faults, mistakes, and gaps. The term of E-Service usability now is changed not only to develop high quality E-Services, but also to be extended to include customer satisfaction and provide for them to feel local.Keywords: human computer interaction (HCI), usability, cultural usability, E-Services, business-to-consumer (B2C), e-services
Procedia PDF Downloads 4376576 Umbrella Reinforcement Learning – A Tool for Hard Problems
Authors: Egor E. Nuzhin, Nikolay V. Brilliantov
Abstract:
We propose an approach for addressing Reinforcement Learning (RL) problems. It combines the ideas of umbrella sampling, borrowed from Monte Carlo technique of computational physics and chemistry, with optimal control methods, and is realized on the base of neural networks. This results in a powerful algorithm, designed to solve hard RL problems – the problems, with long-time delayed reward, state-traps sticking and a lack of terminal states. It outperforms the prominent algorithms, such as PPO, RND, iLQR and VI, which are among the most efficient for the hard problems. The new algorithm deals with a continuous ensemble of agents and expected return, that includes the ensemble entropy. This results in a quick and efficient search of the optimal policy in terms of ”exploration-exploitation trade-off” in the state-action space.Keywords: umbrella sampling, reinforcement learning, policy gradient, dynamic programming
Procedia PDF Downloads 216575 Visualizing Class Metrics and Object Calls for Software Systems
Authors: Mohammad Alnabhan, Awni Hammouri, Mustafa Hammad, Anas Al-Badareen, Omamah Al-Thnebat
Abstract:
Software visualization is one of the main techniques used to simplify the presentation of software systems and enhance their understandability. It is used to present the software system in a visual manner using simple, clear and meaningful symbols. This study proposes a new 2D software visualization approach. In this approach, each class is represented by rectangle, the name of the class placed above the rectangle, the size of class (Line of Code) represented by the height of the rectangle. The methods and the attributes are represented by circles and triangles respectively. The relationships among classes correspond to arrows. The proposed visualization approach was evaluated in terms of applicability and efficiency. Results have confirmed successful implementation of the proposed approach, and its ability to provide a simple and effective graphical presentation of extracted software components and properties.Keywords: software visualization, software metrics, calling relationships, 2D graphs
Procedia PDF Downloads 2046574 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks
Authors: Mehmet Karaata
Abstract:
Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security
Procedia PDF Downloads 4426573 Improved Ohmic Contact by Li Doping in Electron Transport Layers
Authors: G. Sivakumar, T. Pratyusha, D. Gupta, W. Shen
Abstract:
To get ohmic contact between the cathode and organic semiconductor, transport layers are introduced between the active layer and the electrodes. Generally zinc oxide or titanium dioxide are used as electron transport layer. When electron transport layer is doped with lithium, the resultant film exhibited superior electronic properties, which enables faster electron transport. Doping is accomplished by heat treatment of films with Lithium salts. Li-doped films. We fabricated organic solar cell using PTB7(poly(3-hexylthiopene-2,5- diyl):PCBM(phenyl-C61-butyric acid methyl ester) and found that the solar cells prepared using Li doped films had better performance in terms of efficiency when compared to the undoped transport layers.Keywords: electron transport layer, higher efficiency, lithium doping, ohmic contact
Procedia PDF Downloads 5136572 EHD Effect on the Dynamic Characteristics of a Journal Bearing Lubricated with Couple Stress Fluids
Authors: B. Chetti, W. A. Crosby
Abstract:
This paper presents a numerical analysis for the dynamic performance of a finite journal bearing lubricated with couple stress fluid taking into account the effect of the deformation of the bearing liner. The modified Reynolds equation has been solved by using finite difference technique. The dynamic characteristics in terms of stiffness coefficients, damping coefficients, critical mass and whirl ratio are evaluated for different values of eccentricity ratio and elastic coefficient for a journal bearing lubricated with a couple stress fluids and a Newtonian fluid. The results show that the dynamic characteristics of journal bearings lubricated with couple stress fluids are improved compared to journal bearings lubricated with Newtonian fluids.Keywords: journal bearing, elastohydrodynamic, stability, couple stress
Procedia PDF Downloads 3626571 Production of Bioethanol through Hydrolysis of Agro-Industrial Banana Crop Residues
Authors: Sánchez Acuña, Juan Camilo, Granados Gómez, Mildred Magaly, Navarrete Rodríguez, Luisa Fernanda
Abstract:
Nowadays, the main biofuels source production as bioethanol is food crops. This means a high competition between foods and energy production. For this reason, it is necessary to take into account the use of new raw materials friendly to the environment. The main objective of this paper is to evaluate the potential of the agro-industrial banana crop residues in the production of bioethanol. A factorial design of 24 was used, the design has variables such as pH, time and concentration of hydrolysis, another variable is the time of fermentation that is of 7 or 15 days. In the hydrolysis phase, the pH is acidic (H2SO4) or basic (NaOH), the time is 30 or 15 minutes and the concentration is 0.1 or 0.5 M. It was observed that basic media, low concentrations, fermentation, and higher pretreatment times produced better performance in terms of biofuel obtained.Keywords: bioethanol, biofuels, banana waste, hydrolysis
Procedia PDF Downloads 4276570 Analysis and Measurement on Indoor Environment of University Dormitories
Authors: Xuechen Gui, Senmiao Li, Qi Kan
Abstract:
Dormitory is a place for college students to study and live their daily life. The indoor environment quality of the dormitory is closely related to the physical health, mood status and work efficiency of the dormitory students. In this paper, the temperature, humidity and carbon dioxide concentration of the dormitory in Zijingang campus of Zhejiang University have been tested for three days. The experimental results show that the concentration of carbon dioxide is related to the size of the window opens and the number of dormitory staff, and presents a high concentration of carbon dioxide at nighttime while a low concentration at daytime. In terms of temperature and humidity, there is no significant difference between different orientation and time and presents a small humidity at daytime while a high humidity at nighttime.Keywords: dormitory, indoor environment, temperature, relative humidity, carbon dioxide concentration
Procedia PDF Downloads 1766569 Cultural Resources Management of the Early Hospitals in Jordan between: 1890-1950
Authors: Jawdat Goussous, Samer Abu Ghazaleh
Abstract:
Heritage is closely linked with the national identity and because Jordan is a rich country of heritage where many civilizations had lived from early beginning of history ,therefore the conservation of this heritage is national task that gives many benefits as correlation between local inhabitance and enhance the linked with spirit of place . This study takes into account the most important concentration on some of old hospitals in Jordan ,which were constructed between 1890-1950 ,looking in their historical and architectural heritage values gained by their architectural distinguished ,longevity and their linked with events that happened in the region. then Focus on the study and analysis of some of them in terms of conservation methodology that have been followed to conserve the early hospitals such as preservation ,maintenance ,adaptive reuse , And their positive effects on these buildings, emphasize the importance of these buildings because of their historical and architectural values.Keywords: evangelical missionary, early hospitals, medical services, renovation
Procedia PDF Downloads 4556568 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks
Authors: Habib Gorine, Rabia Saleh
Abstract:
Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation
Procedia PDF Downloads 320