Search results for: security analysis
26454 Chromia-Carbon Nanocomposite Materials for Energy Storage Devices
Authors: Muhammad A. Nadeem, Shaheed Ullah
Abstract:
The article reports the synthesis of Cr2O3/C nanocomposites obtained by the direct carbonization of PFA/MIL-101(Cr) bulk composite. The nanocomposites were characterized by various instrumental techniques like powder X-ray diffraction (PXRD), X-ray photoelectron spectroscopy (XPS), scanning electron microscopy (SEM), transmission electron microscopy (TEM), selected area electron diffraction (SAED) and the surface characterized were investigated via N2 adsorption/desorption analysis. TEM and SAED analysis shows that turbostatic graphitic carbon was obtained with high crystallinity. The nanocomposites were tested for electrochemical supercapacitor and the faradic and non-Faradic processes were checked through cyclic voltammetry (CV). The maximum specific capacitance calculated for Cr2O3/C 900 sample from CV measurement is 301 F g-1 at 2 mV s-1 due to its maximum charge storing capacity as confirm by frequency response analysis.Keywords: nanocomposites, transmission electron microscopy, non-faradic process
Procedia PDF Downloads 42326453 Application of Neutron Stimulated Gamma Spectroscopy for Soil Elemental Analysis and Mapping
Authors: Aleksandr Kavetskiy, Galina Yakubova, Nikolay Sargsyan, Stephen A. Prior, H. Allen Torbert
Abstract:
Determining soil elemental content and distribution (mapping) within a field are key features of modern agricultural practice. While traditional chemical analysis is a time consuming and labor-intensive multi-step process (e.g., sample collections, transport to laboratory, physical preparations, and chemical analysis), neutron-gamma soil analysis can be performed in-situ. This analysis is based on the registration of gamma rays issued from nuclei upon interaction with neutrons. Soil elements such as Si, C, Fe, O, Al, K, and H (moisture) can be assessed with this method. Data received from analysis can be directly used for creating soil elemental distribution maps (based on ArcGIS software) suitable for agricultural purposes. The neutron-gamma analysis system developed for field application consisted of an MP320 Neutron Generator (Thermo Fisher Scientific, Inc.), 3 sodium iodide gamma detectors (SCIONIX, Inc.) with a total volume of 7 liters, 'split electronics' (XIA, LLC), a power system, and an operational computer. Paired with GPS, this system can be used in the scanning mode to acquire gamma spectra while traversing a field. Using acquired spectra, soil elemental content can be calculated. These data can be combined with geographical coordinates in a geographical information system (i.e., ArcGIS) to produce elemental distribution maps suitable for agricultural purposes. Special software has been developed that will acquire gamma spectra, process and sort data, calculate soil elemental content, and combine these data with measured geographic coordinates to create soil elemental distribution maps. For example, 5.5 hours was needed to acquire necessary data for creating a carbon distribution map of an 8.5 ha field. This paper will briefly describe the physics behind the neutron gamma analysis method, physical construction the measurement system, and main characteristics and modes of work when conducting field surveys. Soil elemental distribution maps resulting from field surveys will be presented. and discussed. Comparison of these maps with maps created on the bases of chemical analysis and soil moisture measurements determined by soil electrical conductivity was similar. The maps created by neutron-gamma analysis were reproducible, as well. Based on these facts, it can be asserted that neutron stimulated soil gamma spectroscopy paired with GPS system is fully applicable for soil elemental agricultural field mapping.Keywords: ArcGIS mapping, neutron gamma analysis, soil elemental content, soil gamma spectroscopy
Procedia PDF Downloads 12526452 The Impact of Artificial Intelligence on Human Rights Principles and Obligations and Rights
Authors: Samy Ayoub Abdou Ghobrial
Abstract:
The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized. The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 5626451 Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks
Authors: Manoj Kumar Dutta
Abstract:
Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance.Keywords: WDM network, contention resolution, optical buffering, non-linearity, throughput
Procedia PDF Downloads 43326450 Numerical Analysis of End Plate Bolted Connection with Corrugated Beam
Authors: M. A. Sadeghian, J. Yang, Q. F. Liu
Abstract:
Steel extended end plate bolted connections are recommended to be widely utilized in special moment-resisting frame subjected to monotonic loading. Improper design of steel beam to column connection can lead to the collapse and fatality of structures. Therefore comprehensive research studies of beam to column connection design should be carried out. Also the performance and effect of corrugated on the strength of beam column end plate connection up to failure under monotonic loading in horizontal direction is presented in this paper. The non-linear elastic–plastic behavior has been considered through a finite element analysis using the multi-purpose software package LUSAS. The effect of vertically and horizontally types of corrugated web was also investigated.Keywords: corrugated beam, monotonic loading, finite element analysis, end plate connection
Procedia PDF Downloads 30226449 The Effect of Remifentanil on Emergence Agitation after Sevoflurane Anesthesia in Children: A Meta-Analysis
Authors: Jong Yeop Kim, Sung Young Park, Dae Hee Kim, Han Bum Joe, Ji Young Yoo, Jong Bum Choi, Sook Young Lee
Abstract:
Emergence agitation (EA) is commonly reported adverse events after sevoflurane anesthesia in pediatric patients. The efficacy of prophylactic remifentanil, one of mu opioid agonist, in preventing EA is controversial. This meta-analysis assessed the effectiveness of remifentanil to decrease the incidence of EA from sevoflurane anesthesia in children. We searched for randomized controlled trials comparing sevoflurane alone anesthesia with sevoflurane and remifentanil anesthesia to prevent EA in the Cochrane Library, Embase, Pubmed, and KoreaMed, and included 6 studies with 361 patients. The number of patients of reporting EA was summarized using risk ratio (RR) with 95% confidence interval (CI), with point estimates and 95CIs derived from a random effects Mantel-Haenszel method. Overall incidence of EA was about 41%. Compared with sevoflurane alone anesthesia, intravenous infusion of remifentanil with sevoflurane significantly reduced the incidence of EA (RR 0.53, 95% CI 0.39-0.73, P < 0.0001), (heterogeneity, I2 = 0, P = 0.42). This meta-analysis suggested that continuous infusion of remifentanil could be effective in decreasing the EA of about 47% after sevoflurane anesthesia. However, considering limitations of the included studies, more randomized controlled studies are required to verify our results.Keywords: emergence agitation, meta-analysis, remifentanil, pediatrics
Procedia PDF Downloads 35826448 Electro-Hydrodynamic Analysis of Low-Pressure DC Glow Discharge by Lattice Boltzmann Method
Authors: Ji-Hyok Kim, Il-Gyong Paek, Yong-Jun Kim
Abstract:
We propose a numerical model based on drift-diffusion theory and lattice Boltzmann method (LBM) to analyze the electro-hydrodynamic behavior in low-pressure direct current (DC) glow discharge plasmas. We apply the drift-diffusion theory for 4-species and employ the standard lattice Boltzmann model (SLBM) for the electron, the finite difference-lattice Boltzmann model (FD-LBM) for heavy particles, and the finite difference model (FDM) for the electric potential, respectively. Our results are compared with those of other methods, and emphasize the necessity of a two-dimensional analysis for glow discharge.Keywords: glow discharge, lattice Boltzmann method, numerical analysis, plasma simulation, electro-hydrodynamic
Procedia PDF Downloads 8326447 Accidental Compartment Fire Dynamics: Experiment, Computational Fluid Dynamics Weakness and Expert Interview Analysis
Authors: Timothy Onyenobi
Abstract:
Accidental fires and its dynamic as it relates to building compartmentation and the impact of the compartment morphology, is still an on-going area of study; especially with the use of computational fluid dynamics (CFD) modeling methods. With better knowledge on this subject come better solution recommendations by fire engineers. Interviews were carried out for this study where it was identified that the response perspectives to accidental fire were different with the fire engineer providing qualitative data which is based on “what is expected in real fires” and the fire fighters provided information on “what actually obtains in real fires”. This further led to a study and analysis of two real and comprehensively instrumented fire experiments: the Open Plan Office Project by National Institute of Standard and Technology (NIST) USA (to study time to flashover) and the TF2000 project by the Building Research Establishment (BRE) UK (to test for conformity with Building Regulation requirements). The findings from the analysis of the experiments revealed the relative yet critical weakness of fire prediction using a CFD model (usually used by fire engineers) as well as explained the differences in response perspectives of the fire engineers and firefighters from the interview analysis.Keywords: CFD, compartment fire, experiment, fire fighters, fire engineers
Procedia PDF Downloads 32226446 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks
Authors: Huseyin Gokberk, Shian Gao
Abstract:
CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.Keywords: CFD, turbulence modelling, aerofoil, angle of attack
Procedia PDF Downloads 20026445 Measuring Energy Efficiency Performance of Mena Countries
Authors: Azam Mohammadbagheri, Bahram Fathi
Abstract:
DEA has become a very popular method of performance measure, but it still suffers from some shortcomings. One of these shortcomings is the issue of having multiple optimal solutions to weights for efficient DMUs. The cross efficiency evaluation as an extension of DEA is proposed to avoid this problem. Lam (2010) is also proposed a mixed-integer linear programming formulation based on linear discriminate analysis and super efficiency method (MILP model) to avoid having multiple optimal solutions to weights. In this study, we modified MILP model to determine more suitable weight sets and also evaluate the energy efficiency of MENA countries as an application of the proposed model.Keywords: data envelopment analysis, discriminate analysis, cross efficiency, MILP model
Procedia PDF Downloads 67426444 Comparison of Computer Software for Swept Path Analysis on Example of Special Paved Areas
Authors: Ivana Cestar, Ivica Stančerić, Saša Ahac, Vesna Dragčević, Tamara Džambas
Abstract:
On special paved areas, such as road intersections, vehicles are usually moving through horizontal curves with smaller radii and occupy considerably greater area compared to open road segments. Planning procedure of these areas is mainly an iterative process that consists of designing project elements, assembling those elements to a design project, and analyzing swept paths for the design vehicle. If applied elements do not fulfill the swept path requirements for the design vehicle, the process must be carried out again. Application of specialized computer software for swept path analysis significantly facilitates planning procedure of special paved areas. There are various software of this kind available on the global market, and each of them has different specifications. In this paper, comparison of two software commonly used in Croatia (Auto TURN and Vehicle Tracking) is presented, their advantages and disadvantages are described, and their applicability on a particular paved area is discussed. In order to reveal which one of the analyszed software is more favorable in terms of swept paths widths, which one includes input parameters that are more relevant for this kind of analysis, and which one is more suitable for the application on a certain special paved area, the analysis shown in this paper was conducted on a number of different intersection types.Keywords: software comparison, special paved areas, swept path analysis, swept path input parameters
Procedia PDF Downloads 30926443 False Assumptions Made in Cybersecurity Curriculum: K-12
Authors: Nathaniel Evans, Jessica Boersma, Kenneth Kass
Abstract:
With technology and STEM fields growing every day, there is a significant projected shortfall in qualified cybersecurity workers. As such, it is essential to develop a cybersecurity curriculum that builds skills and cultivates interest in cybersecurity early on. With new jobs being created every day and an already significant gap in the job market, it is vital that educators are pro-active in introducing a cybersecurity curriculum where students are able to learn new skills and engage in an age-appropriate cyber curriculum. Within this growing world of cybersecurity, students should engage in age-appropriate technology and cybersecurity curriculum, starting with elementary school (k-5), extending through high school, and ultimately into college. Such practice will provide students with the confidence, skills, and, ultimately, the opportunity to work in the burgeoning information security field. This paper examines educational methods, pedagogical practices, current cybersecurity curricula, and other educational resources and conducts analysis for false assumptions and developmental appropriateness. It also examines and identifies common mistakes with current cyber curriculum and lessons and discuss strategies for improvement. Throughout the lessons that were reviewed, many common mistakes continued to pop up. These mistakes included age appropriateness, technology resources that were available, and consistency of student’s skill levels. Many of these lessons were written for the wrong grade levels. The ones written for the elementary level all had activities that assumed that every student in the class could read at grade level and also had background knowledge of the cyber activity at hand, which is not always the case. Another major mistake was that these lessons assumed that all schools had any kind of technology resource available to them. Some schools are 1:1, and others are only allotted three computers in their classroom where the students have to share. While coming up with a cyber-curriculum, it has to be kept in mind that not all schools are the same, not every classroom is the same. There are many students who are not reading at their grade level or have not had exposure to the digital world. We need to start slow and ease children into the cyber world. Once they have a better understanding, it will be easier to move forward with these lessons and get the students engaged. With a better understanding of common mistakes that are being made, a more robust curriculum and lessons can be created that no only spark a student’s interest in this much-needed career field but encourage learning while keeping our students safe from cyber-attacks.Keywords: assumptions, cybersecurity, k-12, teacher
Procedia PDF Downloads 15326442 Implementation of an IoT Sensor Data Collection and Analysis Library
Authors: Jihyun Song, Kyeongjoo Kim, Minsoo Lee
Abstract:
Due to the development of information technology and wireless Internet technology, various data are being generated in various fields. These data are advantageous in that they provide real-time information to the users themselves. However, when the data are accumulated and analyzed, more various information can be extracted. In addition, development and dissemination of boards such as Arduino and Raspberry Pie have made it possible to easily test various sensors, and it is possible to collect sensor data directly by using database application tools such as MySQL. These directly collected data can be used for various research and can be useful as data for data mining. However, there are many difficulties in using the board to collect data, and there are many difficulties in using it when the user is not a computer programmer, or when using it for the first time. Even if data are collected, lack of expert knowledge or experience may cause difficulties in data analysis and visualization. In this paper, we aim to construct a library for sensor data collection and analysis to overcome these problems.Keywords: clustering, data mining, DBSCAN, k-means, k-medoids, sensor data
Procedia PDF Downloads 36126441 Thermal Elastic Stress Analysis of Steel Fiber Reinforced Aluminum Composites
Authors: Mustafa Reşit Haboğlu, Ali Kurşun , Şafak Aksoy, Halil Aykul, Numan Behlül Bektaş
Abstract:
A thermal elastic stress analysis of steel fiber reinforced aluminum laminated composite plate is investigated. Four sides of the composite plate are clamped and subjected to a uniform temperature load. The analysis is performed both analytically and numerically. Laminated composite is manufactured via hot pressing method. The investigation of the effects of the orientation angle is provided. Different orientation angles are used such as [0°/90°]s, [30°/-30°]s, [45°/-45°]s and [60/-60]s. The analytical solution is obtained via classical laminated composite theory and the numerical solution is obtained by applying finite element method via ANSYS.Keywords: laminated composites, thermo elastic stress, finite element method.
Procedia PDF Downloads 48526440 Public Health Emergency Management (PHEM) to COVID-19 Pandemic in North-Eastern Part of Thailand
Authors: Orathai Srithongtham, Ploypailin Mekathepakorn, Tossaphong Buraman, Pontida Moonpradap, Rungrueng Kitpati, Chulapon Kratet, Worayuth Nak-ai, Suwaree Charoenmukkayanan, Peeranuch Keawkanya
Abstract:
The COVID-19 pandemic was effect to the health security of the Thai people. The PHEM principle was essential to the surveillance, prevention, and control of COVID-19. This study aimed to present the process of prevention and control of COVID-19 from February 29, 2021- April 30, 2022, and the factors and conditions influent the successful outcome. The study areas were three provinces. The target group was 37 people, composed of public health personnel. The data was collected in-depth, and group interviews followed the non-structure interview guide and were analyzed by content analysis. The components of COVID-19 prevention and control were found in the process of PHEM as follows; 1) Emergency Operation Center (EOC) with an incidence command system (ICS) from the district to provincial level and to propose the provincial measure, 2) Provincial Communicable Disease Committee (PCDC) to decide the provincial measure 3) The measure for surveillance, prevention, control, and treatment of COVID-19, and 4) outcomes and best practices for surveillance and control of COVID-19. The success factors of 4S and EC were as follows; Space: prepare the quarantine (HQ, LQ), Cohort Ward (CW), field hospital, and community isolation and home isolation to face with the patient and risky group, Staff network from various organization and group cover the community leader and Health Volunteer (HV), Stuff the management and sharing of the medical and non-medical equipment, System of Covid-19 respond were EOC, ICS, Joint Investigation Team (JIT) and Communicable Disease Control Unit (CDCU) for monitoring the real-time of surveillance and control of COVID-19 output, Environment management in hospital and the community with Infections Control (IC) principle, and Culture in term of social capital on “the relationship of Isan people” supported the patient provide the good care and support. The structure of PHEM, Isan’s Culture, and good preparation was a significant factor in the three provinces.Keywords: public health, emergency management, covid-19, pandemic
Procedia PDF Downloads 7326439 Thermal Fracture Analysis of Fibrous Composites with Variable Fiber Spacing Using Jk-Integral
Authors: Farid Saeidi, Serkan Dag
Abstract:
In this study, fracture analysis of a fibrous composite laminate with variable fiber spacing is carried out using Jk-integral method. The laminate is assumed to be under thermal loading. Jk-integral is formulated by using the constitutive relations of plane orthotropic thermoelasticity. Developed domain independent form of the Jk-integral is then integrated into the general purpose finite element analysis software ANSYS. Numerical results are generated so as to assess the influence of variable fiber spacing on mode I and II stress intensity factors, energy release rate, and T-stress. For verification, some of the results are compared to those obtained using displacement correlation technique (DCT).Keywords: Jk-integral, Variable Fiber Spacing, Thermoelasticity, T-stress, Finite Element Method, Fibrous Composite.
Procedia PDF Downloads 37726438 Decision Tree Analysis of Risk Factors for Intravenous Infiltration among Hospitalized Children: A Retrospective Study
Authors: Soon-Mi Park, Ihn Sook Jeong
Abstract:
This retrospective study was aimed to identify risk factors of intravenous (IV) infiltration for hospitalized children. The participants were 1,174 children for test and 424 children for validation, who admitted to a general hospital, received peripheral intravenous injection therapy at least once and had complete records. Data were analyzed with frequency and percentage or mean and standard deviation were calculated, and decision tree analysis was used to screen for the most important risk factors for IV infiltration for hospitalized children. The decision tree analysis showed that the most important traditional risk factors for IV infiltration were the use of ampicillin/sulbactam, IV insertion site (lower extremities), and medical department (internal medicine) both in the test sample and validation sample. The correct classification was 92.2% in the test sample and 90.1% in the validation sample. More careful attention should be made to patients who are administered ampicillin/sulbactam, have IV site in lower extremities and have internal medical problems to prevent or detect infiltration occurrence.Keywords: decision tree analysis, intravenous infiltration, child, validation
Procedia PDF Downloads 16226437 Some Trends in Analysis of Two-Way Solid Slabs
Authors: Reem I. Al-Ya' Goub, Nasim Shatarat
Abstract:
This paper presents the results of analytical and comparative study among software programs' outputs in analysis of some two way solid slabs; flat plate, flat slab with beams and flat slab with drop panels problems that already been analyzed using Classical Equivalent Frame Method (CEFM) by several reinforced concrete book authors. The primary objective of this research is to determine the moment results using various software programs. Then, a summary of the results and differences percentages were obtained to show how analysis procedure effects the outputs of calculations that vary from software program to another when comparing them with the results of CEFM. Moment values were obtained using either the Equivalent Frame Method (EFM) or Finite Element Method (FEM) that's used among many software programs. The results of the analyses demonstrate that software programs vary markedly in terms of the information they provide to the structural designer regarding values of the model insertion, stiffness, effective moment of inertia used and specially the moment values.Keywords: two-way solid slabs, flat plate, flat slab with beams, flat slab with drop panels, analysis, modeling, EFM, CEFM, FEM
Procedia PDF Downloads 40126436 The Gezi Park Protests in the Columns
Authors: Süleyman Hakan Yilmaz, Yasemin Gülsen Yilmaz
Abstract:
The Gezi Park protests of 2013 have significantly changed the Turkish agenda and its effects have been felt historically. The protests, which rapidly spread throughout the country, were triggered by the proposal to recreate the Ottoman Army Barracks to function as a shopping mall on Gezi Park located in Istanbul’s Taksim neighbourhood despite the oppositions of several NGOs and when trees were cut in the park for this purpose. Once the news that construction vehicles entered the park on May 27 spread on social media, activists moved into the park to stop the demolition, against whom the police used disproportioned force. With this police intervention and the then prime-minister Tayyip Erdoğan's insistent statements about the construction plans, the protests turned into anti-government demonstrations, which then spread to the rest of the country, mainly in big cities like Ankara and Izmir. According to the Ministry of Internal Affairs’ June 23rd reports, 2.5 million people joined the demonstrations in 79 provinces, that is all of them, except for the provinces of Bayburt and Bingöl, while even more people shared their opinions via social networks. As a result of these events, 8 civilians and 2 security personnel lost their lives, namely police chief Mustafa Sarı, police officer Ahmet Küçükdağ, citizens Mehmet Ayvalıtaş, Abdullah Cömert, Ethem Sarısülük, Ali İsmail Korkmaz, Ahmet Atakan, Berkin Elvan, Burak Can Karamanoğlu, Mehmet İstif, and Elif Çermik, and 8163 more were injured. Besides being a turning point in Turkish history, the Gezi Park protests also had broad repercussions in both in Turkish and in global media, which focused on Turkey throughout the events. Our study conducts content analysis of three Turkish reporting newspapers with varying ideological standpoints, Hürriyet, Cumhuriyet ve Yeni Şafak, in order to reveal their basic approach to columns casting in context of the Gezi Park protests. Columns content relating to the Gezi protests were treated and analysed for this purpose. The aim of this study is to understand the social effects of the Gezi Park protests through media samples with varying political attitudes towards news casting.Keywords: Gezi Park, media, news casting, columns
Procedia PDF Downloads 41926435 Truthful or Untruthful Social Media Posts: Applying Statement Analysis to Decode online Deception
Authors: Christa L. Arnold, Margaret C. Stewart
Abstract:
This research shares the results of an exploratory study examining Statement Analysis (SA) to detect deception in online truthful and untruthful social media posts. Applying a Law Enforcement methodology SA, used in criminal interview statements, this research analyzes what is stated to assist in evaluating written deceptive information. Preliminary findings reveal qualitative and quantitative nuances for SA in online deception detection and uncover insights regarding digital deceptive behavior. Thus far, findings reveal truthful statements tend to differ from untruthful statements in both content and quality.Keywords: deception detection, online deception, social media content, statement analysis
Procedia PDF Downloads 5726434 Thermal Analysis and Computational Fluid Dynamics Simulation of Large-Scale Cryopump
Authors: Yue Shuai Zhao, Rong Ping Shao, Wei Sun, Guo Hua Ren, Yong Wang, Li Chen Sun
Abstract:
A large-scale cryopump (DN1250) used in large vacuum leak detecting system was designed and its performance experimentally investigated by Beijing Institute of Spacecraft Environment Engineering. The cryopump was cooled by four closed cycle helium refrigerators (two dual stage refrigerators and two single stage refrigerators). Detailed numerical analysis of the heat transfer in the first stage array and the second stage array were performed by using computational fluid dynamic method (CFD). Several design parameters were considered to find the effect on the temperature distribution and the cooldown time. The variation of thermal conductivity and heat capacity with temperature was taken into account. The thermal analysis method based on numerical techniques was introduced in this study, the heat transfer in the first stage array and the second stage cryopanel was carefully analyzed to determine important considerations in the thermal design of the cryopump. A performance test system according to the RNEUROP standards was built to test main performance of the cryopump. The experimental results showed that the structure of first stage array which was optimized by the method could meet the requirement of the cryopump well. The temperature of the cryopanel was down to 10K within 300 min, and the result of the experiment was accordant with theoretical analysis' conclusion. The test also showed that the pumping speed for N2 of the pump was up to 57,000 L/s, and the crossover was over than 300,000 Pa•L.Keywords: cryopump, temperature distribution, thermal analysis, CFD Simulation
Procedia PDF Downloads 29126433 Bioinformatic Approaches in Population Genetics and Phylogenetic Studies
Authors: Masoud Sheidai
Abstract:
Biologists with a special field of population genetics and phylogeny have different research tasks such as populations’ genetic variability and divergence, species relatedness, the evolution of genetic and morphological characters, and identification of DNA SNPs with adaptive potential. To tackle these problems and reach a concise conclusion, they must use the proper and efficient statistical and bioinformatic methods as well as suitable genetic and morphological characteristics. In recent years application of different bioinformatic and statistical methods, which are based on various well-documented assumptions, are the proper analytical tools in the hands of researchers. The species delineation is usually carried out with the use of different clustering methods like K-means clustering based on proper distance measures according to the studied features of organisms. A well-defined species are assumed to be separated from the other taxa by molecular barcodes. The species relationships are studied by using molecular markers, which are analyzed by different analytical methods like multidimensional scaling (MDS) and principal coordinate analysis (PCoA). The species population structuring and genetic divergence are usually investigated by PCoA and PCA methods and a network diagram. These are based on bootstrapping of data. The Association of different genes and DNA sequences to ecological and geographical variables is determined by LFMM (Latent factor mixed model) and redundancy analysis (RDA), which are based on Bayesian and distance methods. Molecular and morphological differentiating characters in the studied species may be identified by linear discriminant analysis (DA) and discriminant analysis of principal components (DAPC). We shall illustrate these methods and related conclusions by giving examples from different edible and medicinal plant species.Keywords: GWAS analysis, K-Means clustering, LFMM, multidimensional scaling, redundancy analysis
Procedia PDF Downloads 10726432 Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation
Authors: Edward Guillén, Jhordany Rodriguez, Rafael Páez
Abstract:
Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance.Keywords: network intrusion detection, machine learning, artificial neural network, anomaly detection module
Procedia PDF Downloads 32826431 Synthesis of Highly Valuable Fuel Fractions from Waste Date Seeds Oil
Authors: Farrukh Jamil, Ala'A H. Al-Muhtaseb, Lamya Al-Haj, Mohab A. Al-Hinai
Abstract:
Environmental problems and the security of energy supply have motivated the attention in the expansion of alternatives for fossil based fuels. Biomass has been recognized as a capable resource because it is plentifully available and in principle carbon dioxide neutral. Present study focuses on utilization date seeds oil for synthesizing high value fuels formulations such as green diesel and jet fuel. The hydrodeoxygenation of date seeds oil occurred to be highly efficient at following operating conditions temperature 300°C pressure 10bar with continuous stirring at 500 rpm. Products characterization revealed the efficiency of hydrodeoxygenation by formation of linear hydrocarbons (paraffin) in larger fraction. Based on the type of components in product oil it was calculated that maximum fraction lies within the range of green diesel 72.78 % then jet fuel 28.25 % by using Pt/C catalyst. It can be concluded that waste date seeds oil has potential to be used for obtaining high value products.Keywords: date seeds, hydrodeoxygenation, paraffin, deoxygenation
Procedia PDF Downloads 25026430 Morphological Processing of Punjabi Text for Sentiment Analysis of Farmer Suicides
Authors: Jaspreet Singh, Gurvinder Singh, Prabhsimran Singh, Rajinder Singh, Prithvipal Singh, Karanjeet Singh Kahlon, Ravinder Singh Sawhney
Abstract:
Morphological evaluation of Indian languages is one of the burgeoning fields in the area of Natural Language Processing (NLP). The evaluation of a language is an eminent task in the era of information retrieval and text mining. The extraction and classification of knowledge from text can be exploited for sentiment analysis and morphological evaluation. This study coalesce morphological evaluation and sentiment analysis for the task of classification of farmer suicide cases reported in Punjab state of India. The pre-processing of Punjabi text involves morphological evaluation and normalization of Punjabi word tokens followed by the training of proposed model using deep learning classification on Punjabi language text extracted from online Punjabi news reports. The class-wise accuracies of sentiment prediction for four negatively oriented classes of farmer suicide cases are 93.85%, 88.53%, 83.3%, and 95.45% respectively. The overall accuracy of sentiment classification obtained using proposed framework on 275 Punjabi text documents is found to be 90.29%.Keywords: deep neural network, farmer suicides, morphological processing, punjabi text, sentiment analysis
Procedia PDF Downloads 30726429 Cd2+ Ions Removal from Aqueous Solutions Using Alginite
Authors: Vladimír Frišták, Martin Pipíška, Juraj Lesný
Abstract:
Alginate has been evaluated as an efficient pollution control material. In this paper, alginate from maar Pinciná (SR) for removal of Cd2+ ions from aqueous solution was studied. The potential sorbent was characterized by X-Ray Fluorescence Analysis (RFA) analysis, Fourier Transform Infrared Spectral Analysis (FT-IR) and Specific Surface Area (SSA) was also determined. The sorption process was optimized from the point of initial cadmium concentration effect and effect of pH value. The Freundlich and Langmuir models were used to interpret the sorption behaviour of Cd2+ ions, and the results showed that experimental data were well fitted by the Langmuir equation. Alginate maximal sorption capacity (QMAX) for Cd2+ ions calculated from Langmuir isotherm was 34 mg/g. Sorption process was significantly affected by initial pH value in the range from 4.0-7.0. Alginate is a comparable sorbent with other materials for toxic metals removal.Keywords: alginates, Cd2+, sorption, QMAX
Procedia PDF Downloads 34426428 Copper Doped P-Type Nickel Oxide Transparent Conducting Oxide Thin Films
Authors: Kai Huang, Assamen Ayalew Ejigu, Mu-Jie Lin, Liang-Chiun Chao
Abstract:
Nickel oxide and copper-nickel oxide thin films have been successfully deposited by reactive ion beam sputter deposition. Experimental results show that nickel oxide deposited at 300°C is single phase NiO while best crystalline quality is achieved with an O_pf of 0.5. XRD analysis of nickel-copper oxide deposited at 300°C shows a Ni2O3 like crystalline structure at low O_pf while changes to NiO like crystalline structure at high O_pf. EDS analysis shows that nickel-copper oxide deposited at low O_pf is CuxNi2-xO3 with x = 1, while nickel-copper oxide deposited at high O_pf is CuxNi1-xO with x = 0.5, which is supported by Raman analysis. The bandgap of NiO is ~ 3.5 eV regardless of O_pf while the band gap of nickel-copper oxide decreases from 3.2 to 2.3 eV as Opf reaches 1.0.Keywords: copper, ion beam, NiO, oxide, resistivity, transparent
Procedia PDF Downloads 30126427 Magnetic Field Analysis of External Rotor Permanent-Magnet Synchronous Motors with Non Magnetic Rotor Core
Authors: Mabrak Samir
Abstract:
The motor performance created by permanent magnetic in a slotless air-gap of a surface mounted permanent-magnet synchronous motor with non magnetic rotor and either sinusoidal or mixed (quasi-Halbatch) magnetization is presented in this paper using polar coordinates. The analysis works for both internal and external rotor motor topologies, The effect of stator slots is introduced by modulating the magnetic field distribution in the slotless stator by the complex relative air-gap permeance, calculated from the conformal transformation of the slot geometry. We compare predicted results of flux density distribution and cogging torque with those obtained by finite-element analysis.Keywords: air-cored, cogging torque, finite element magnetic field, permanent-magnet
Procedia PDF Downloads 35726426 Rise in Public Interest in COVID-19 Symptoms and the Need for Proper Information: Insights from the Google Trends Analysis
Authors: Jaweriya Aftab, Madho Mal, Hamida Memon
Abstract:
The first case of coronavirus disease 2019 (COVID-19) in Pakistan was recorded on February 26th, 2020. While the country went through various phases of lockdowns, the importance of proper sensitization campaigns was highlighted by healthcare workers to combat misinformation. Past studies via Google trends analysis have shown a rise in public interest in multiple COVID-19-related symptoms as well as cardiovascular symptoms. As there is a paucity of data related to the trends in Pakistan, we conducted a retrospective analysis to bridge further information. Methods: As per the recommendations from past studies, a Google trend analysis was conducted for various symptoms, including ‘Fever’, ‘Chest Pain’, ‘Shortness of Breath’, and ‘Cough’ between 1st January 2019 to 31st December 2021. The trends in various search results were analyzed and modeled. Results: Our analysis found various rises in public interest in the various symptoms (fever, chest pain, shortness of breath, and cough) that correspond closely to the wave of the virus's spread in the country. Conclusion: Our study confirms similar trends in Pakistan as previously reported in studies from India, USA, and UK, whereby the public interest in various COVID-19 symptoms rose with the number of cases. This further highlights the need for a strong approach to combat misinformation during such a critical period.Keywords: covid, trend, Pakistan, public
Procedia PDF Downloads 1426425 A Research and Application of Feature Selection Based on IWO and Tabu Search
Authors: Laicheng Cao, Xiangqian Su, Youxiao Wu
Abstract:
Feature selection is one of the important problems in network security, pattern recognition, data mining and other fields. In order to remove redundant features, effectively improve the detection speed of intrusion detection system, proposes a new feature selection method, which is based on the invasive weed optimization (IWO) algorithm and tabu search algorithm(TS). Use IWO as a global search, tabu search algorithm for local search, to improve the results of IWO algorithm. The experimental results show that the feature selection method can effectively remove the redundant features of network data information in feature selection, reduction time, and to guarantee accurate detection rate, effectively improve the speed of detection system.Keywords: intrusion detection, feature selection, iwo, tabu search
Procedia PDF Downloads 514