Search results for: mining operation
1256 Reservoir Inflow Prediction for Pump Station Using Upstream Sewer Depth Data
Authors: Osung Im, Neha Yadav, Eui Hoon Lee, Joong Hoon Kim
Abstract:
Artificial Neural Network (ANN) approach is commonly used in lots of fields for forecasting. In water resources engineering, forecast of water level or inflow of reservoir is useful for various kind of purposes. Due to advantages of ANN, many papers were written for inflow prediction in river networks, but in this study, ANN is used in urban sewer networks. The growth of severe rain storm in Korea has increased flood damage severely, and the precipitation distribution is getting more erratic. Therefore, effective pump operation in pump station is an essential task for the reduction in urban area. If real time inflow of pump station reservoir can be predicted, it is possible to operate pump effectively for reducing the flood damage. This study used ANN model for pump station reservoir inflow prediction using upstream sewer depth data. For this study, rainfall events, sewer depth, and inflow into Banpo pump station reservoir between years of 2013-2014 were considered. Feed – Forward Back Propagation (FFBF), Cascade – Forward Back Propagation (CFBP), Elman Back Propagation (EBP) and Nonlinear Autoregressive Exogenous (NARX) were used as ANN model for prediction. A comparison of results with ANN model suggests that ANN is a powerful tool for inflow prediction using the sewer depth data.Keywords: artificial neural network, forecasting, reservoir inflow, sewer depth
Procedia PDF Downloads 3171255 Optimization of Manufacturing Process Parameters: An Empirical Study from Taiwan's Tech Companies
Authors: Chao-Ton Su, Li-Fei Chen
Abstract:
The parameter design is crucial to improving the uniformity of a product or process. In the product design stage, parameter design aims to determine the optimal settings for the parameters of each element in the system, thereby minimizing the functional deviations of the product. In the process design stage, parameter design aims to determine the operating settings of the manufacturing processes so that non-uniformity in manufacturing processes can be minimized. The parameter design, trying to minimize the influence of noise on the manufacturing system, plays an important role in the high-tech companies. Taiwan has many well-known high-tech companies, which show key roles in the global economy. Quality remains the most important factor that enables these companies to sustain their competitive advantage. In Taiwan however, many high-tech companies face various quality problems. A common challenge is related to root causes and defect patterns. In the R&D stage, root causes are often unknown, and defect patterns are difficult to classify. Additionally, data collection is not easy. Even when high-volume data can be collected, data interpretation is difficult. To overcome these challenges, high-tech companies in Taiwan use more advanced quality improvement tools. In addition to traditional statistical methods and quality tools, the new trend is the application of powerful tools, such as neural network, fuzzy theory, data mining, industrial engineering, operations research, and innovation skills. In this study, several examples of optimizing the parameter settings for the manufacturing process in Taiwan’s tech companies will be presented to illustrate proposed approach’s effectiveness. Finally, a discussion of using traditional experimental design versus the proposed approach for process optimization will be made.Keywords: quality engineering, parameter design, neural network, genetic algorithm, experimental design
Procedia PDF Downloads 1451254 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia
Authors: Aulia Dwi Nastiti
Abstract:
A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism
Procedia PDF Downloads 2931253 Synchronized Vehicle Routing for Equitable Resource Allocation in Food Banks
Authors: Rabiatu Bonku, Faisal Alkaabneh
Abstract:
Inspired by a food banks distribution operation for non-profit organization, we study a variant synchronized vehicle routing problem for equitable resource allocation. This research paper introduces a Mixed Integer Programming (MIP) model aimed at addressing the complex challenge of efficiently distributing vital resources, particularly for food banks serving vulnerable populations in urban areas. Our optimization approach places a strong emphasis on social equity, ensuring a fair allocation of food to partner agencies while minimizing wastage. The primary objective is to enhance operational efficiency while guaranteeing fair distribution and timely deliveries to prevent food spoilage. Furthermore, we assess four distinct models that consider various aspects of sustainability, including social and economic factors. We conduct a comprehensive numerical analysis using real-world data to gain insights into the trade-offs that arise, while also demonstrating the models’ performance in terms of fairness, effectiveness, and the percentage of food waste. This provides valuable managerial insights for food bank managers. We show that our proposed approach makes a significant contribution to the field of logistics optimization and social responsibility, offering valuable insights for improving the operations of food banks.Keywords: food banks, humanitarian logistics, equitable resource allocation, synchronized vehicle routing
Procedia PDF Downloads 621252 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network
Authors: Abdulaziz Alsadhan, Naveed Khan
Abstract:
In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)
Procedia PDF Downloads 3671251 Viability Study of the Use of Solar Energy for Water Heating in Homes in Brazil
Authors: Elmo Thiago Lins Cöuras Ford, Valentina Alessandra Carvalho do Vale
Abstract:
The sun is an inexhaustible source and harnessing its potential both for heating and for power generation is one of the most promising and necessary alternatives, mainly due to environmental issues. However, it should be noted that this has always been present in the generation of energy on the planet, only indirectly, as it is responsible for virtually all other energy sources, such as: Generates the evaporation source of the water cycle, which allows the impoundment and the consequent generation of electricity (hydroelectricity); Winds are caused by large-scale atmospheric induction caused by solar radiation; Oil, coal and natural gas were generated from waste plants and animals that originally obtained the energy needed for its development of solar radiation. Thus, the idea of using solar energy for practical purposes for the benefit of man is not new, as it accompanies the story since the beginning of time, which means that the sun was always of utmost importance in the design of shelters, or homes is, constructed by taking into consideration the use of sunlight, practicing what was being lost through the centuries, until a time when the buildings started to be designed completely independent of the sun. However, the climatic rigors still needed to be fought, only artificially and today seen as unsustainable, with additional facilities fueled by energy consumption. This paper presents a study on the feasibility of using solar energy for heating water in homes, developing a simplified methodology covering the mode of operation of solar water heaters, solar potential existing alternative systems of Brazil, the international market, and barriers encountered.Keywords: solar energy, solar heating, solar project, water heating
Procedia PDF Downloads 3321250 Safe and Efficient Deep Reinforcement Learning Control Model: A Hydroponics Case Study
Authors: Almutasim Billa A. Alanazi, Hal S. Tharp
Abstract:
Safe performance and efficient energy consumption are essential factors for designing a control system. This paper presents a reinforcement learning (RL) model that can be applied to control applications to improve safety and reduce energy consumption. As hardware constraints and environmental disturbances are imprecise and unpredictable, conventional control methods may not always be effective in optimizing control designs. However, RL has demonstrated its value in several artificial intelligence (AI) applications, especially in the field of control systems. The proposed model intelligently monitors a system's success by observing the rewards from the environment, with positive rewards counting as a success when the controlled reference is within the desired operating zone. Thus, the model can determine whether the system is safe to continue operating based on the designer/user specifications, which can be adjusted as needed. Additionally, the controller keeps track of energy consumption to improve energy efficiency by enabling the idle mode when the controlled reference is within the desired operating zone, thus reducing the system energy consumption during the controlling operation. Water temperature control for a hydroponic system is taken as a case study for the RL model, adjusting the variance of disturbances to show the model’s robustness and efficiency. On average, the model showed safety improvement by up to 15% and energy efficiency improvements by 35%- 40% compared to a traditional RL model.Keywords: control system, hydroponics, machine learning, reinforcement learning
Procedia PDF Downloads 1851249 Building a Transformative Continuing Professional Development Experience for Educators through a Principle-Based, Technological-Driven Knowledge Building Approach: A Case Study of a Professional Learning Team in Secondary Education
Authors: Melvin Chan, Chew Lee Teo
Abstract:
There has been a growing emphasis in elevating the teachers’ proficiency and competencies through continuing professional development (CPD) opportunities. In this era of a Volatile, Uncertain, Complex, Ambiguous (VUCA) world, teachers are expected to be collaborative designers, critical thinkers and creative builders. However, many of the CPD structures are still revolving in the model of transmission, which stands in contradiction to the cultivation of future-ready teachers for the innovative world of emerging technologies. This article puts forward the framing of CPD through a Principle-Based, Technological-Driven Knowledge Building Approach grounded in the essence of andragogy and progressive learning theories where growth is best exemplified through an authentic immersion in a social/community experience-based setting. Putting this Knowledge Building Professional Development Model (KBPDM) in operation via a Professional Learning Team (PLT) situated in a Secondary School in Singapore, research findings reveal that the intervention has led to a fundamental change in the learning paradigm of the teachers, henceforth equipping and empowering them successfully in their pedagogical design and practices for a 21st century classroom experience. This article concludes with the possibility in leveraging the Learning Analytics to deepen the CPD experiences for educators.Keywords: continual professional development, knowledge building, learning paradigm, principle-based
Procedia PDF Downloads 1301248 Destruction of Coastal Wetlands in Harper City-Liberia: Setting Nature against the Future Society
Authors: Richard Adu Antwako
Abstract:
Coastal wetland destruction and its consequences have recently taken the center stage of global discussions. This phenomenon is no gray area to humanity as coastal wetland-human interaction seems inevitably ingrained in the earliest civilizations, amidst the demanding use of its resources to meet their necessities. The severity of coastal wetland destruction parallels with growing civilizations, and it is against this backdrop that, this paper interrogated the causes of coastal wetland destruction in Harper City in Liberia, compared the degree of coastal wetland stressors to the non-equilibrium thermodynamic scale as well as suggested an integrated coastal zone management to address the problems. Literature complemented the primary data gleaned via global positioning system devices, field observation, questionnaire, and interviews. Multi-sampling techniques were used to generate data from the sand miners, institutional heads, fisherfolk, community-based groups, and other stakeholders. Non-equilibrium thermodynamic theory remains vibrant in discerning the ecological stability, and it would be employed to further understand the coastal wetland destruction in Harper City, Liberia and to measure the coastal wetland stresses-amplitude and elasticity. The non-equilibrium thermodynamics postulates that the coastal wetlands are capable of assimilating resources (inputs), as well as discharging products (outputs). However, the input-output relationship exceedingly stretches beyond the thresholds of the coastal wetlands, leading to coastal wetland disequilibrium. Findings revealed that the sand mining, mangrove removal, and crude dumping have transformed the coastal wetlands, resulting in water pollution, flooding, habitat loss and disfigured beaches in Harper City in Liberia. This paper demonstrates that the coastal wetlands are converted into developmental projects and agricultural fields, thus, endangering the future society against nature.Keywords: amplitude, crude dumping, elasticity, non-equilibrium thermodynamics, wetland destruction
Procedia PDF Downloads 1411247 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection
Authors: Muhammad Ali
Abstract:
Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection
Procedia PDF Downloads 1251246 Significance of High Specific Speed in Circulating Water Pump, Which Can Cause Cavitation, Noise and Vibration
Authors: Chandra Gupt Porwal
Abstract:
Excessive vibration means increased wear, increased repair efforts, bad product selection & quality and high energy consumption. This may be sometimes experienced by cavitation or suction/discharge re-circulation which could occur only when net positive suction head available NPSHA drops below the net positive suction head required NPSHR. Cavitation can cause axial surging if it is excessive, will damage mechanical seals, bearings, possibly other pump components frequently and shorten the life of the impeller. Efforts have been made to explain Suction Energy (SE), Specific Speed (Ns), Suction Specific Speed (Nss), NPSHA, NPSHR & their significance, possible reasons of cavitation /internal re-circulation, its diagnostics and remedial measures to arrest and prevent cavitation in this paper. A case study is presented by the author highlighting that the root cause of unwanted noise and vibration is due to cavitation, caused by high specific speeds or inadequate net- positive suction head available which results in damages to material surfaces of impeller & suction bells and degradation of machine performance, its capacity and efficiency too. The author strongly recommends revisiting the technical specifications of CW pumps to provide sufficient NPSH margin ratios > 1.5, for future projects and Nss be limited to 8500 -9000 for cavitation free operation.Keywords: best efficiency point (BEP), net positive suction head NPSHA, NPSHR, specific speed NS, suction specific speed NSS
Procedia PDF Downloads 2541245 Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison between Central Processing Unit vs. Graphics Processing Unit Functions for Neural Networks
Authors: Mst Shapna Akter, Hossain Shahriar
Abstract:
Neural network approaches are machine learning methods used in many domains, such as healthcare and cyber security. Neural networks are mostly known for dealing with image datasets. While training with the images, several fundamental mathematical operations are carried out in the Neural Network. The operation includes a number of algebraic and mathematical functions, including derivative, convolution, and matrix inversion and transposition. Such operations require higher processing power than is typically needed for computer usage. Central Processing Unit (CPU) is not appropriate for a large image size of the dataset as it is built with serial processing. While Graphics Processing Unit (GPU) has parallel processing capabilities and, therefore, has higher speed. This paper uses advanced Neural Network techniques such as VGG16, Resnet50, Densenet, Inceptionv3, Xception, Mobilenet, XGBOOST-VGG16, and our proposed models to compare CPU and GPU resources. A system for classifying autism disease using face images of an autistic and non-autistic child was used to compare performance during testing. We used evaluation matrices such as Accuracy, F1 score, Precision, Recall, and Execution time. It has been observed that GPU runs faster than the CPU in all tests performed. Moreover, the performance of the Neural Network models in terms of accuracy increases on GPU compared to CPU.Keywords: autism disease, neural network, CPU, GPU, transfer learning
Procedia PDF Downloads 1181244 A Clinical Study on the Versatility of Lateral Supra Malleolar Flap in Lower Limb Wound Reconstruction
Authors: Animesh Gupta
Abstract:
Objective: The purpose of this study is to evaluate the versatility and outcome of lateral supra malleolar flap (LSMF) in soft tissue reconstruction of the regions including the distal leg, ankle, dorsal foot and heel. Methods: From March 2021 to April 2023, 18 patients with soft tissue defects in the regions, including the distal leg, ankle, dorsal foot and heel, who underwent LSMF repair for lower limb wound reconstruction were analyzed. The location, size of the defects, etiology, outcome, complications, and other alternative options were studied and presented. Results: The follow-up period of the cases was 3-6 months after surgery. All flaps were successful; however, one flap was complicated by venous congestion and was managed by loosening a few sutures and the patient was required to elevate the affected limb to resolve the issue. Conclusion: The LSMF has numerous advantages in repairing soft tissue defects in areas involving the ankle, distal leg, heel and dorsum of the foot. In comparison to reverse sural flaps for repairing defects in the heel and lower leg, LSMF offers shorter operation time, shorter hospitalization, lower cost, and fewer postoperative complications.Keywords: lateral supra malleolar flap, LSMF, soft tissue reconstruction, lower leg defect
Procedia PDF Downloads 751243 Climate Change: Affecting Basic Human Rights in Bangladesh
Authors: Shekh Shadi Rahaman
Abstract:
In Bangladesh, basic human rights more specifically right to food and right to shelter are being adversely affected by the consequences of climate change. Over the last two decades, a considerable number of environmental studies revealed that basic human rights, more specifically, the right to food and right to a shelter are going to be seriously affected by climate change. Agriculture, forestry, and fisheries and livestock, which are most sensitive to climate change, are key sources interconnected with food security and the security of shelter. Consequences of climate change affecting these key sources, and with the change of time, climate change is turning into a gigantic challenge towards ensuring basic human rights in Bangladesh. This study was carried out by employing a general review of literature on climate change, focusing on effects of climate change on basic two major human rights in Bangladesh. Upon analysis of existing researches, it is found very few researches focused on correlating climate change and right to food and right to shelter. This study shows how the consequences of climate change affects food production and abode of people of Bangladesh. This study recommends that tree plantation, floating agricultural practice, co-operation with international organization, developing environment friendly institutions, increased use of renewable energy, proper management of wetlands and forests, shelter for climate induced migrated people, encouraging research and public awareness are key issues to be followed for combating climate change and protecting basic human right to food and shelter.Keywords: achievements, agriculture and forestry, fisheries and livestock, renewable energy
Procedia PDF Downloads 1351242 Flame Volume Prediction and Validation for Lean Blowout of Gas Turbine Combustor
Authors: Ejaz Ahmed, Huang Yong
Abstract:
The operation of aero engines has a critical importance in the vicinity of lean blowout (LBO) limits. Lefebvre’s model of LBO based on empirical correlation has been extended to flame volume concept by the authors. The flame volume takes into account the effects of geometric configuration, the complex spatial interaction of mixing, turbulence, heat transfer and combustion processes inside the gas turbine combustion chamber. For these reasons, flame volume based LBO predictions are more accurate. Although LBO prediction accuracy has improved, it poses a challenge associated with Vf estimation in real gas turbine combustors. This work extends the approach of flame volume prediction previously based on fuel iterative approximation with cold flow simulations to reactive flow simulations. Flame volume for 11 combustor configurations has been simulated and validated against experimental data. To make prediction methodology robust as required in the preliminary design stage, reactive flow simulations were carried out with the combination of probability density function (PDF) and discrete phase model (DPM) in FLUENT 15.0. The criterion for flame identification was defined. Two important parameters i.e. critical injection diameter (Dp,crit) and critical temperature (Tcrit) were identified, and their influence on reactive flow simulation was studied for Vf estimation. Obtained results exhibit ±15% error in Vf estimation with experimental data.Keywords: CFD, combustion, gas turbine combustor, lean blowout
Procedia PDF Downloads 2671241 Development of Membrane Reactor for Auto Thermal Reforming of Dimethyl Ether for Hydrogen Production
Authors: Tie-Qing Zhang, Seunghun Jung, Young-Bae Kim
Abstract:
This research is devoted to developing a membrane reactor to flexibly meet the hydrogen demand of onboard fuel cells, which is an important part of green energy development. Among many renewable chemical products, dimethyl ether (DME) has the advantages of low reaction temperature (400 °C in this study), high hydrogen atom content, low toxicity, and easy preparation. Autothermal reforming, on the other hand, has a high hydrogen recovery rate and exhibits thermal neutrality during the reaction process, so the additional heat source in the hydrogen production process can be omitted. Therefore, the DME auto thermal reforming process was adopted in this study. To control the temperature of the reaction catalyst bed and hydrogen production rate, a Model Predictive Control (MPC) scheme was designed. Taking the above two variables as the control objectives, stable operation of the reformer can be achieved by controlling the flow rates of DME, steam, and high-purity air in real-time. To prevent catalyst poisoning in the fuel cell, the hydrogen needs to be purified to reduce the carbon monoxide content to below 50 ppm. Therefore, a Pd-Ag hydrogen semi-permeable membrane with a thickness of 3-5 μm was inserted into the auto thermal reactor, and the permeation efficiency of hydrogen was improved by steam purging on the permeation side. Finally, hydrogen with a purity of 99.99 was obtained.Keywords: hydrogen production, auto thermal reforming, membrane, fuel cell
Procedia PDF Downloads 1041240 Assessment Power and Oscillation Damping Using the POD Controller and Proposed FOD Controller
Authors: Tohid Rahimi, Yahya Naderi, Babak Yousefi, Seyed Hossein Hoseini
Abstract:
Today’s modern interconnected power system is highly complex in nature. In this, one of the most important requirements during the operation of the electric power system is the reliability and security. Power and frequency oscillation damping mechanism improve the reliability. Because of power system stabilizer (PSS) low speed response against of major fault such as three phase short circuit, FACTs devise that can control the network condition in very fast time, are becoming popular. However, FACTs capability can be seen in a major fault present when nonlinear models of FACTs devise and power system equipment are applied. To realize this aim, the model of multi-machine power system with FACTs controller is developed in MATLAB/SIMULINK using Sim Power System (SPS) blockiest. Among the FACTs device, Static synchronous series compensator (SSSC) due to high speed changes its reactance characteristic inductive to capacitive, is effective power flow controller. Tuning process of controller parameter can be performed using different method. However, Genetic Algorithm (GA) ability tends to use it in controller parameter tuning process. In this paper, firstly POD controller is used to power oscillation damping. But in this station, frequency oscillation dos not has proper damping situation. Therefore, FOD controller that is tuned using GA is using that cause to damp out frequency oscillation properly and power oscillation damping has suitable situation.Keywords: power oscillation damping (POD), frequency oscillation damping (FOD), Static synchronous series compensator (SSSC), Genetic Algorithm (GA)
Procedia PDF Downloads 4761239 Identification of Deep Landslide on Erzurum-Turkey Highway by Geotechnical and Geophysical Methods and its Prevention
Authors: Neşe Işık, Şenol Altıok, Galip Devrim Eryılmaz, Aydın durukan, Hasan Özgür Daş
Abstract:
In this study, an active landslide zone affecting the road alignment on the Tortum-Uzundere (Erzurum/Turkey) highway was investigated. Due to the landslide movement, problems have occurred in the existing road pavement, which has caused both safety problems and reduced driving comfort in the operation of the road. In order to model the landslide, drilling, geophysical and inclinometer studies were carried out in the field within the scope of ground investigation. Laboratory tests were carried out on soil and rock samples obtained from the borings. When the drilling and geophysical studies were evaluated together, it was determined that the study area has a complex geological structure. In addition, according to the inclinometer results, the direction and speed of movement of the landslide mass were observed. In order to create an idealized geological profile, all field and laboratory studies were evaluated together and then the sliding surface of the landslide was determined by back analysis method. According to the findings obtained, it was determined that the landslide was massively large, and the movement occurred had a deep sliding surface. As a result of the numerical analyses, it was concluded that the Slope angle reduction is the most economical and environmentally friendly method for the control of the landslide mass.Keywords: landslide, geotechnical methods, geophysics, monitoring, highway
Procedia PDF Downloads 681238 Evaluation of Sloshing in Process Equipment for Floating Cryogenic Application
Authors: Bo Jin
Abstract:
A variety of process equipment having flow in and out is widely used in industrial land-based cryogenic facilities. In some of this equipment, such as vapor-liquid separator, a liquid level is established during the steady operation. As the implementation of such industrial processes extends to off-shore floating facilities, it is important to investigate the effect of sea motion on the process equipment partially filled with liquid. One important aspect to consider is the occurrence of sloshing therein. The flow characteristics are different from the classical study of sloshing, where the fluid is enclosed inside a vessel (e.g., storage tank) with no flow in or out. Liquid inside process equipment continuously flows in and out of the system. To understand this key difference, a Computational Fluid Dynamics (CFD) model is developed to simulate the liquid motion inside a partially filled cylinder with and without continuous flow in and out. For a partially filled vertical cylinder without any continuous flow in and out, the CFD model is found to be able to capture the well-known sloshing behavior documented in the literature. For the cylinder with a continuous steady flow in and out, the CFD simulation results demonstrate that the continuous flow suppresses sloshing. Given typical cryogenic fluid has very low viscosity, an analysis based on potential flow theory is developed to explain why flow into and out of the cylinder changes the natural frequency of the system and thereby suppresses sloshing. This analysis further validates the CFD results.Keywords: computational fluid dynamics, CFD, cryogenic process equipment, off-shore floating processes, sloshing
Procedia PDF Downloads 1371237 Multi-Objective Optimization and Effect of Surface Conditions on Fatigue Performance of Burnished Components Made of AISI 52100 Steel
Authors: Ouahiba Taamallah, Tarek Litim
Abstract:
The study deals with the burnishing effect of AISI 52100 steel and parameters influence (Py, i and f on surface integrity. The results show that the optimal effects are closely related to the treatment parameters. With a 92% improvement in roughness, SB can be defined as a finishing operation within the machining range. Due to 85% gain in consolidation rate, this treatment constitutes an efficient process for work-hardening of material. In addition, a statistical study based on regression and Taguchi's design has made it possible to develop mathematical models to predict output responses according to the studied burnishing parameters. Response Surface Methodology RSM showed a simultaneous influence of the burnishing parameters and to observe the optimal parameters of the treatment. ANOVA Analysis of results led to validate the prediction model with a determination coefficient R2=94.60% and R2=93.41% for surface roughness and micro-hardness, respectively. Furthermore, a multi-objective optimization allowed to identify a regime characterized by P=20 Kgf, i=5 passes and f=0.08 mm.rev-1, which favors minimum surface roughness and a maximum of micro-hardness. The result was validated by a composite desirability D_i=1 for both surface roughness and microhardness, respectively. Applying optimal parameters, burnishing showed its beneficial effects in fatigue resistance, especially for imposed loading in the low cycle fatigue of the material where the lifespan increased by 90%.Keywords: AISI 52100 steel, burnishing, Taguchi, fatigue
Procedia PDF Downloads 1881236 Privacy Concerns and Law Enforcement Data Collection to Tackle Domestic and Sexual Violence
Authors: Francesca Radice
Abstract:
Domestic and sexual violence provokes, on average in Australia, one female death per week due to intimate violence behaviours. 83% of couples meet online, and intercepting domestic and sexual violence at this level would be beneficial. It has been observed that violent or coercive behaviour has been apparent from initial conversations on dating apps like Tinder. Child pornography, stalking, and coercive control are some criminal offences from dating apps, including women murdered after finding partners through Tinder. Police databases and predictive policing are novel approaches taken to prevent crime before harm is done. This research will investigate how police databases can be used in a privacy-preserving way to characterise users in terms of their potential for violent crime. Using the COPS database of NSW Police, we will explore how the past criminal record can be interpreted to yield a category of potential danger for each dating app user. It is up to the judgement of each subscriber on what degree of the potential danger they are prepared to enter into. Sentiment analysis is an area where research into natural language processing has made great progress over the last decade. This research will investigate how sentiment analysis can be used to interpret interchanges between dating app users to detect manipulative or coercive sentiments. These can be used to alert law enforcement if continued for a defined number of communications. One of the potential problems of this approach is the potential prejudice a categorisation can cause. Another drawback is the possibility of misinterpreting communications and involving law enforcement without reason. The approach will be thoroughly tested with cross-checks by human readers who verify both the level of danger predicted by the interpretation of the criminal record and the sentiment detected from personal messages. Even if only a few violent crimes can be prevented, the approach will have a tangible value for real people.Keywords: sentiment analysis, data mining, predictive policing, virtual manipulation
Procedia PDF Downloads 781235 Magneto-Thermo-Mechanical Analysis of Electromagnetic Devices Using the Finite Element Method
Authors: Michael G. Pantelyat
Abstract:
Fundamental basics of pure and applied research in the area of magneto-thermo-mechanical numerical analysis and design of innovative electromagnetic devices (modern induction heaters, novel thermoelastic actuators, rotating electrical machines, induction cookers, electrophysical devices) are elaborated. Thus, mathematical models of magneto-thermo-mechanical processes in electromagnetic devices taking into account main interactions of interrelated phenomena are developed. In addition, graphical representation of coupled (multiphysics) phenomena under consideration is proposed. Besides, numerical techniques for nonlinear problems solution are developed. On this base, effective numerical algorithms for solution of actual problems of practical interest are proposed, validated and implemented in applied 2D and 3D computer codes developed. Many applied problems of practical interest regarding modern electrical engineering devices are numerically solved. Investigations of the influences of various interrelated physical phenomena (temperature dependences of material properties, thermal radiation, conditions of convective heat transfer, contact phenomena, etc.) on the accuracy of the electromagnetic, thermal and structural analyses are conducted. Important practical recommendations on the choice of rational structures, materials and operation modes of electromagnetic devices under consideration are proposed and implemented in industry.Keywords: electromagnetic devices, multiphysics, numerical analysis, simulation and design
Procedia PDF Downloads 3861234 Hybrid Collaborative-Context Based Recommendations for Civil Affairs Operations
Authors: Patrick Cummings, Laura Cassani, Deirdre Kelliher
Abstract:
In this paper we present findings from a research effort to apply a hybrid collaborative-context approach for a system focused on Marine Corps civil affairs data collection, aggregation, and analysis called the Marine Civil Information Management System (MARCIMS). The goal of this effort is to provide operators with information to make sense of the interconnectedness of entities and relationships in their area of operation and discover existing data to support civil military operations. Our approach to build a recommendation engine was designed to overcome several technical challenges, including 1) ensuring models were robust to the relatively small amount of data collected by the Marine Corps civil affairs community; 2) finding methods to recommend novel data for which there are no interactions captured; and 3) overcoming confirmation bias by ensuring content was recommended that was relevant for the mission despite being obscure or less well known. We solve this by implementing a combination of collective matrix factorization (CMF) and graph-based random walks to provide recommendations to civil military operations users. We also present a method to resolve the challenge of computation complexity inherent from highly connected nodes through a precomputed process.Keywords: Recommendation engine, collaborative filtering, context based recommendation, graph analysis, coverage, civil affairs operations, Marine Corps
Procedia PDF Downloads 1251233 Software Vulnerability Markets: Discoverers and Buyers
Authors: Abdullah M. Algarni, Yashwant K. Malaiya
Abstract:
Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analysed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect first-hand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration.Keywords: risk management, software security, vulnerability discoverers, vulnerability markets
Procedia PDF Downloads 2521232 Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia
Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana
Abstract:
In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values.Keywords: caliphate, jihad, ASEAN, counterterrorism, social community
Procedia PDF Downloads 2341231 An Experimental Study to Investigate the Behaviour of Torque Fluctuation of Crossflow Turbines Operating in an Open Channel
Authors: Sunil Kumar Singal, Manoj Sood, Upendra Bajpai
Abstract:
Instream technology is the upcoming sustainable approach in the hydro sector for energy harnessing. With well-known cross-sections and regulated supply, open channels are the most prominent locations for the installation of hydrokinetic turbines. The fluctuation in generated torque varies with site condition (flow depth and flow velocity), as well as with the type of turbine. The present experimental study aims to investigate the torque/power fluctuations of crossflow hydrokinetic turbines operating at different flow velocities and water depths. The flow velocity is varied from 1.0 m/s to 2.0 m/s. The complete assembly includes an open channel having dimensions of 0.3 m (depth) x 0.71 m (width) x 4.5 m (length), along with a lifting mechanism for varying the channel slope, a digital transducer for monitoring the torque, power, and rpm, a digital handheld water velocity meter for measuring the flow velocity. Further, a time series of torque, power, and rpm is plotted for a duration of 30 minutes showing the continuous operation of the turbine. A comparison of Savonius, Darrieus, and their improved twisted and helical blades is also presented in the study. A correlation has also been developed for assessing the hydropower generation from the installed turbine. The developed correlations will be very useful in the decision-making process for development at a site.Keywords: darrieus turbine, flow velocity, open channel, savoinus turbine, water depth, hydropower
Procedia PDF Downloads 851230 Evaluation of the Notifiable Diseases Surveillance System, South, Haiti, 2022
Authors: Djeamsly Salomon
Abstract:
Background: Epidemiological surveillance is a dynamic national system used to observe all aspects of the evolution of priority health problems, through: collection, analysis, systematic interpretation of information, and dissemination of results with necessary recommendations. The study was conducted to assess the mandatory disease surveillance system in the Sud Department. Methods: A study was conducted from March to May 2021 with key players involved in surveillance at the level of health institutions in the department . The CDC's 2021 updated guideline was used to evaluate the system. We collected information about the operation, attributes, and usefulness of the surveillance system using interviewer-administered questionnaires. Epi-Info7.2 and Excel 2016 were used to generate the mean, frequencies and proportions. Results: Of 30 participants, 23 (77%) were women. The average age was 39 years[30-56]. 25 (83%) had training in epidemiological surveillance. (50%) of the forms checked were signed by the supervisor. Collection tools were available at (80%). Knowledge of at least 7 notifiable diseases was high (100%). Among the respondents, 29 declared that the collection tools were simple, 27 had already filled in a notification form. The maximum time taken to fill out a form was 10 minutes. The feedback between the different levels was done at (60%). Conclusion: The surveillance system is useful, simple, acceptable, representative, flexible, stable and responsive. The data generated was of high quality. However, it is threatened by the lack of supervision of sentinel sites, lack of investigation and weak feedback. This evaluation demonstrated the urgent need to improve supervision in the sites and to feedback information. Strengthen epidemiological surveillance.Keywords: evaluation, notifiable diseases, surveillance, system
Procedia PDF Downloads 781229 Impact Position Method Based on Distributed Structure Multi-Agent Coordination with JADE
Authors: YU Kaijun, Liang Dong, Zhang Yarong, Jin Zhenzhou, Yang Zhaobao
Abstract:
For the impact monitoring of distributed structures, the traditional positioning methods are based on the time difference, which includes the four-point arc positioning method and the triangulation positioning method. But in the actual operation, these two methods have errors. In this paper, the Multi-Agent Blackboard Coordination Principle is used to combine the two methods. Fusion steps: (1) The four-point arc locating agent calculates the initial point and records it to the Blackboard Module.(2) The triangulation agent gets its initial parameters by accessing the initial point.(3) The triangulation agent constantly accesses the blackboard module to update its initial parameters, and it also logs its calculated point into the blackboard.(4) When the subsequent calculation point and the initial calculation point are within the allowable error, the whole coordination fusion process is finished. This paper presents a Multi-Agent collaboration method whose agent framework is JADE. The JADE platform consists of several agent containers, with the agent running in each container. Because of the perfect management and debugging tools of the JADE, it is very convenient to deal with complex data in a large structure. Finally, based on the data in Jade, the results show that the impact location method based on Multi-Agent coordination fusion can reduce the error of the two methods.Keywords: impact monitoring, structural health monitoring(SHM), multi-agent system(MAS), black-board coordination, JADE
Procedia PDF Downloads 1781228 Phytotechnologies for Use and Reconstitution of Contaminated Sites
Authors: Olga Shuvaeva, Tamara Romanova, Sergey Volynkin, Valentina Podolinnaya
Abstract:
Green chemistry concept is focused on the prevention of environmental pollution caused by human activity. However, there are a lot of contaminated areas in the world which pose a serious threat to ecosystems in terms of their conservation. Therefore in accordance with the principles of green chemistry, it should not be forgotten about the need to clean these areas. Furthermore, the waste material often contains the valuable components, the extraction of which by traditional wet chemical technologies is inefficient both from the economic and environmental protection standpoint. Wherein, the plants may be successfully used to ‘scavenge’ a range of metals from polluted land sites in an approach allowing to carry out both of these processes – phytoremediation and phytomining in conjunction. The goal of the present work was to study bioaccumulation ability of floating macrophytes such as water hyacinth and pondweed toward Hg, Ba, Cd, Mo and Pb as pollutants in aquatic medium and terrestrial plants (birch, reed, and cane) towards gold and silver as valuable components. The peculiarity of ongoing research was that the plants grew under extreme conditions (pH of drainage and pore waters was about 2.5). The study was conducted at the territory of Ursk tailings (Southwestern Siberia, Russia) formed as a result of primary polymetallic ores cyanidation. The waste material is mainly presented (~80%) by pyrite (FeS₂) and barite (BaSO₄), the raw minerals included FeAsS, HgS, PbS, Ag₂S as minor ones. It has been shown that water hyacinth demonstrates high ability to accumulate different metals, and what is especially important – to remove mercury from polluted waters with BCF value more than 1000. As for the gold, its concentrations in reed and cane growing near the waste material were estimated as 500 and 900 μg∙kg⁻¹ respectively. It was also found that the plants can survive under extreme conditions of acidic environment and hence we can assume that there is a principal opportunity to use them for the valuable substances extraction from an area of the mining waste dumps burial.Keywords: bioaccumulation, gold, heavy metals, mine tailing
Procedia PDF Downloads 1711227 Performing Diagnosis in Building with Partially Valid Heterogeneous Tests
Authors: Houda Najeh, Mahendra Pratap Singh, Stéphane Ploix, Antoine Caucheteux, Karim Chabir, Mohamed Naceur Abdelkrim
Abstract:
Building system is highly vulnerable to different kinds of faults and human misbehaviors. Energy efficiency and user comfort are directly targeted due to abnormalities in building operation. The available fault diagnosis tools and methodologies particularly rely on rules or pure model-based approaches. It is assumed that model or rule-based test could be applied to any situation without taking into account actual testing contexts. Contextual tests with validity domain could reduce a lot of the design of detection tests. The main objective of this paper is to consider fault validity when validate the test model considering the non-modeled events such as occupancy, weather conditions, door and window openings and the integration of the knowledge of the expert on the state of the system. The concept of heterogeneous tests is combined with test validity to generate fault diagnoses. A combination of rules, range and model-based tests known as heterogeneous tests are proposed to reduce the modeling complexity. Calculation of logical diagnoses coming from artificial intelligence provides a global explanation consistent with the test result. An application example shows the efficiency of the proposed technique: an office setting at Grenoble Institute of Technology.Keywords: heterogeneous tests, validity, building system, sensor grids, sensor fault, diagnosis, fault detection and isolation
Procedia PDF Downloads 294