Search results for: security analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29094

Search results for: security analysis

26454 Chromia-Carbon Nanocomposite Materials for Energy Storage Devices

Authors: Muhammad A. Nadeem, Shaheed Ullah

Abstract:

The article reports the synthesis of Cr2O3/C nanocomposites obtained by the direct carbonization of PFA/MIL-101(Cr) bulk composite. The nanocomposites were characterized by various instrumental techniques like powder X-ray diffraction (PXRD), X-ray photoelectron spectroscopy (XPS), scanning electron microscopy (SEM), transmission electron microscopy (TEM), selected area electron diffraction (SAED) and the surface characterized were investigated via N2 adsorption/desorption analysis. TEM and SAED analysis shows that turbostatic graphitic carbon was obtained with high crystallinity. The nanocomposites were tested for electrochemical supercapacitor and the faradic and non-Faradic processes were checked through cyclic voltammetry (CV). The maximum specific capacitance calculated for Cr2O3/C 900 sample from CV measurement is 301 F g-1 at 2 mV s-1 due to its maximum charge storing capacity as confirm by frequency response analysis.

Keywords: nanocomposites, transmission electron microscopy, non-faradic process

Procedia PDF Downloads 423
26453 Application of Neutron Stimulated Gamma Spectroscopy for Soil Elemental Analysis and Mapping

Authors: Aleksandr Kavetskiy, Galina Yakubova, Nikolay Sargsyan, Stephen A. Prior, H. Allen Torbert

Abstract:

Determining soil elemental content and distribution (mapping) within a field are key features of modern agricultural practice. While traditional chemical analysis is a time consuming and labor-intensive multi-step process (e.g., sample collections, transport to laboratory, physical preparations, and chemical analysis), neutron-gamma soil analysis can be performed in-situ. This analysis is based on the registration of gamma rays issued from nuclei upon interaction with neutrons. Soil elements such as Si, C, Fe, O, Al, K, and H (moisture) can be assessed with this method. Data received from analysis can be directly used for creating soil elemental distribution maps (based on ArcGIS software) suitable for agricultural purposes. The neutron-gamma analysis system developed for field application consisted of an MP320 Neutron Generator (Thermo Fisher Scientific, Inc.), 3 sodium iodide gamma detectors (SCIONIX, Inc.) with a total volume of 7 liters, 'split electronics' (XIA, LLC), a power system, and an operational computer. Paired with GPS, this system can be used in the scanning mode to acquire gamma spectra while traversing a field. Using acquired spectra, soil elemental content can be calculated. These data can be combined with geographical coordinates in a geographical information system (i.e., ArcGIS) to produce elemental distribution maps suitable for agricultural purposes. Special software has been developed that will acquire gamma spectra, process and sort data, calculate soil elemental content, and combine these data with measured geographic coordinates to create soil elemental distribution maps. For example, 5.5 hours was needed to acquire necessary data for creating a carbon distribution map of an 8.5 ha field. This paper will briefly describe the physics behind the neutron gamma analysis method, physical construction the measurement system, and main characteristics and modes of work when conducting field surveys. Soil elemental distribution maps resulting from field surveys will be presented. and discussed. Comparison of these maps with maps created on the bases of chemical analysis and soil moisture measurements determined by soil electrical conductivity was similar. The maps created by neutron-gamma analysis were reproducible, as well. Based on these facts, it can be asserted that neutron stimulated soil gamma spectroscopy paired with GPS system is fully applicable for soil elemental agricultural field mapping.

Keywords: ArcGIS mapping, neutron gamma analysis, soil elemental content, soil gamma spectroscopy

Procedia PDF Downloads 125
26452 The Impact of Artificial Intelligence on Human Rights Principles and Obligations and Rights

Authors: Samy Ayoub Abdou Ghobrial

Abstract:

The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized. The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 56
26451 Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks

Authors: Manoj Kumar Dutta

Abstract:

Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance.

Keywords: WDM network, contention resolution, optical buffering, non-linearity, throughput

Procedia PDF Downloads 433
26450 Numerical Analysis of End Plate Bolted Connection with Corrugated Beam

Authors: M. A. Sadeghian, J. Yang, Q. F. Liu

Abstract:

Steel extended end plate bolted connections are recommended to be widely utilized in special moment-resisting frame subjected to monotonic loading. Improper design of steel beam to column connection can lead to the collapse and fatality of structures. Therefore comprehensive research studies of beam to column connection design should be carried out. Also the performance and effect of corrugated on the strength of beam column end plate connection up to failure under monotonic loading in horizontal direction is presented in this paper. The non-linear elastic–plastic behavior has been considered through a finite element analysis using the multi-purpose software package LUSAS. The effect of vertically and horizontally types of corrugated web was also investigated.

Keywords: corrugated beam, monotonic loading, finite element analysis, end plate connection

Procedia PDF Downloads 302
26449 The Effect of Remifentanil on Emergence Agitation after Sevoflurane Anesthesia in Children: A Meta-Analysis

Authors: Jong Yeop Kim, Sung Young Park, Dae Hee Kim, Han Bum Joe, Ji Young Yoo, Jong Bum Choi, Sook Young Lee

Abstract:

Emergence agitation (EA) is commonly reported adverse events after sevoflurane anesthesia in pediatric patients. The efficacy of prophylactic remifentanil, one of mu opioid agonist, in preventing EA is controversial. This meta-analysis assessed the effectiveness of remifentanil to decrease the incidence of EA from sevoflurane anesthesia in children. We searched for randomized controlled trials comparing sevoflurane alone anesthesia with sevoflurane and remifentanil anesthesia to prevent EA in the Cochrane Library, Embase, Pubmed, and KoreaMed, and included 6 studies with 361 patients. The number of patients of reporting EA was summarized using risk ratio (RR) with 95% confidence interval (CI), with point estimates and 95CIs derived from a random effects Mantel-Haenszel method. Overall incidence of EA was about 41%. Compared with sevoflurane alone anesthesia, intravenous infusion of remifentanil with sevoflurane significantly reduced the incidence of EA (RR 0.53, 95% CI 0.39-0.73, P < 0.0001), (heterogeneity, I2 = 0, P = 0.42). This meta-analysis suggested that continuous infusion of remifentanil could be effective in decreasing the EA of about 47% after sevoflurane anesthesia. However, considering limitations of the included studies, more randomized controlled studies are required to verify our results.

Keywords: emergence agitation, meta-analysis, remifentanil, pediatrics

Procedia PDF Downloads 358
26448 Electro-Hydrodynamic Analysis of Low-Pressure DC Glow Discharge by Lattice Boltzmann Method

Authors: Ji-Hyok Kim, Il-Gyong Paek, Yong-Jun Kim

Abstract:

We propose a numerical model based on drift-diffusion theory and lattice Boltzmann method (LBM) to analyze the electro-hydrodynamic behavior in low-pressure direct current (DC) glow discharge plasmas. We apply the drift-diffusion theory for 4-species and employ the standard lattice Boltzmann model (SLBM) for the electron, the finite difference-lattice Boltzmann model (FD-LBM) for heavy particles, and the finite difference model (FDM) for the electric potential, respectively. Our results are compared with those of other methods, and emphasize the necessity of a two-dimensional analysis for glow discharge.

Keywords: glow discharge, lattice Boltzmann method, numerical analysis, plasma simulation, electro-hydrodynamic

Procedia PDF Downloads 83
26447 Accidental Compartment Fire Dynamics: Experiment, Computational Fluid Dynamics Weakness and Expert Interview Analysis

Authors: Timothy Onyenobi

Abstract:

Accidental fires and its dynamic as it relates to building compartmentation and the impact of the compartment morphology, is still an on-going area of study; especially with the use of computational fluid dynamics (CFD) modeling methods. With better knowledge on this subject come better solution recommendations by fire engineers. Interviews were carried out for this study where it was identified that the response perspectives to accidental fire were different with the fire engineer providing qualitative data which is based on “what is expected in real fires” and the fire fighters provided information on “what actually obtains in real fires”. This further led to a study and analysis of two real and comprehensively instrumented fire experiments: the Open Plan Office Project by National Institute of Standard and Technology (NIST) USA (to study time to flashover) and the TF2000 project by the Building Research Establishment (BRE) UK (to test for conformity with Building Regulation requirements). The findings from the analysis of the experiments revealed the relative yet critical weakness of fire prediction using a CFD model (usually used by fire engineers) as well as explained the differences in response perspectives of the fire engineers and firefighters from the interview analysis.

Keywords: CFD, compartment fire, experiment, fire fighters, fire engineers

Procedia PDF Downloads 322
26446 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks

Authors: Huseyin Gokberk, Shian Gao

Abstract:

CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.

Keywords: CFD, turbulence modelling, aerofoil, angle of attack

Procedia PDF Downloads 200
26445 Measuring Energy Efficiency Performance of Mena Countries

Authors: Azam Mohammadbagheri, Bahram Fathi

Abstract:

DEA has become a very popular method of performance measure, but it still suffers from some shortcomings. One of these shortcomings is the issue of having multiple optimal solutions to weights for efficient DMUs. The cross efficiency evaluation as an extension of DEA is proposed to avoid this problem. Lam (2010) is also proposed a mixed-integer linear programming formulation based on linear discriminate analysis and super efficiency method (MILP model) to avoid having multiple optimal solutions to weights. In this study, we modified MILP model to determine more suitable weight sets and also evaluate the energy efficiency of MENA countries as an application of the proposed model.

Keywords: data envelopment analysis, discriminate analysis, cross efficiency, MILP model

Procedia PDF Downloads 674
26444 Comparison of Computer Software for Swept Path Analysis on Example of Special Paved Areas

Authors: Ivana Cestar, Ivica Stančerić, Saša Ahac, Vesna Dragčević, Tamara Džambas

Abstract:

On special paved areas, such as road intersections, vehicles are usually moving through horizontal curves with smaller radii and occupy considerably greater area compared to open road segments. Planning procedure of these areas is mainly an iterative process that consists of designing project elements, assembling those elements to a design project, and analyzing swept paths for the design vehicle. If applied elements do not fulfill the swept path requirements for the design vehicle, the process must be carried out again. Application of specialized computer software for swept path analysis significantly facilitates planning procedure of special paved areas. There are various software of this kind available on the global market, and each of them has different specifications. In this paper, comparison of two software commonly used in Croatia (Auto TURN and Vehicle Tracking) is presented, their advantages and disadvantages are described, and their applicability on a particular paved area is discussed. In order to reveal which one of the analyszed software is more favorable in terms of swept paths widths, which one includes input parameters that are more relevant for this kind of analysis, and which one is more suitable for the application on a certain special paved area, the analysis shown in this paper was conducted on a number of different intersection types.

Keywords: software comparison, special paved areas, swept path analysis, swept path input parameters

Procedia PDF Downloads 309
26443 False Assumptions Made in Cybersecurity Curriculum: K-12

Authors: Nathaniel Evans, Jessica Boersma, Kenneth Kass

Abstract:

With technology and STEM fields growing every day, there is a significant projected shortfall in qualified cybersecurity workers. As such, it is essential to develop a cybersecurity curriculum that builds skills and cultivates interest in cybersecurity early on. With new jobs being created every day and an already significant gap in the job market, it is vital that educators are pro-active in introducing a cybersecurity curriculum where students are able to learn new skills and engage in an age-appropriate cyber curriculum. Within this growing world of cybersecurity, students should engage in age-appropriate technology and cybersecurity curriculum, starting with elementary school (k-5), extending through high school, and ultimately into college. Such practice will provide students with the confidence, skills, and, ultimately, the opportunity to work in the burgeoning information security field. This paper examines educational methods, pedagogical practices, current cybersecurity curricula, and other educational resources and conducts analysis for false assumptions and developmental appropriateness. It also examines and identifies common mistakes with current cyber curriculum and lessons and discuss strategies for improvement. Throughout the lessons that were reviewed, many common mistakes continued to pop up. These mistakes included age appropriateness, technology resources that were available, and consistency of student’s skill levels. Many of these lessons were written for the wrong grade levels. The ones written for the elementary level all had activities that assumed that every student in the class could read at grade level and also had background knowledge of the cyber activity at hand, which is not always the case. Another major mistake was that these lessons assumed that all schools had any kind of technology resource available to them. Some schools are 1:1, and others are only allotted three computers in their classroom where the students have to share. While coming up with a cyber-curriculum, it has to be kept in mind that not all schools are the same, not every classroom is the same. There are many students who are not reading at their grade level or have not had exposure to the digital world. We need to start slow and ease children into the cyber world. Once they have a better understanding, it will be easier to move forward with these lessons and get the students engaged. With a better understanding of common mistakes that are being made, a more robust curriculum and lessons can be created that no only spark a student’s interest in this much-needed career field but encourage learning while keeping our students safe from cyber-attacks.

Keywords: assumptions, cybersecurity, k-12, teacher

Procedia PDF Downloads 153
26442 Implementation of an IoT Sensor Data Collection and Analysis Library

Authors: Jihyun Song, Kyeongjoo Kim, Minsoo Lee

Abstract:

Due to the development of information technology and wireless Internet technology, various data are being generated in various fields. These data are advantageous in that they provide real-time information to the users themselves. However, when the data are accumulated and analyzed, more various information can be extracted. In addition, development and dissemination of boards such as Arduino and Raspberry Pie have made it possible to easily test various sensors, and it is possible to collect sensor data directly by using database application tools such as MySQL. These directly collected data can be used for various research and can be useful as data for data mining. However, there are many difficulties in using the board to collect data, and there are many difficulties in using it when the user is not a computer programmer, or when using it for the first time. Even if data are collected, lack of expert knowledge or experience may cause difficulties in data analysis and visualization. In this paper, we aim to construct a library for sensor data collection and analysis to overcome these problems.

Keywords: clustering, data mining, DBSCAN, k-means, k-medoids, sensor data

Procedia PDF Downloads 361
26441 Thermal Elastic Stress Analysis of Steel Fiber Reinforced Aluminum Composites

Authors: Mustafa Reşit Haboğlu, Ali Kurşun , Şafak Aksoy, Halil Aykul, Numan Behlül Bektaş

Abstract:

A thermal elastic stress analysis of steel fiber reinforced aluminum laminated composite plate is investigated. Four sides of the composite plate are clamped and subjected to a uniform temperature load. The analysis is performed both analytically and numerically. Laminated composite is manufactured via hot pressing method. The investigation of the effects of the orientation angle is provided. Different orientation angles are used such as [0°/90°]s, [30°/-30°]s, [45°/-45°]s and [60/-60]s. The analytical solution is obtained via classical laminated composite theory and the numerical solution is obtained by applying finite element method via ANSYS.

Keywords: laminated composites, thermo elastic stress, finite element method.

Procedia PDF Downloads 485
26440 Public Health Emergency Management (PHEM) to COVID-19 Pandemic in North-Eastern Part of Thailand

Authors: Orathai Srithongtham, Ploypailin Mekathepakorn, Tossaphong Buraman, Pontida Moonpradap, Rungrueng Kitpati, Chulapon Kratet, Worayuth Nak-ai, Suwaree Charoenmukkayanan, Peeranuch Keawkanya

Abstract:

The COVID-19 pandemic was effect to the health security of the Thai people. The PHEM principle was essential to the surveillance, prevention, and control of COVID-19. This study aimed to present the process of prevention and control of COVID-19 from February 29, 2021- April 30, 2022, and the factors and conditions influent the successful outcome. The study areas were three provinces. The target group was 37 people, composed of public health personnel. The data was collected in-depth, and group interviews followed the non-structure interview guide and were analyzed by content analysis. The components of COVID-19 prevention and control were found in the process of PHEM as follows; 1) Emergency Operation Center (EOC) with an incidence command system (ICS) from the district to provincial level and to propose the provincial measure, 2) Provincial Communicable Disease Committee (PCDC) to decide the provincial measure 3) The measure for surveillance, prevention, control, and treatment of COVID-19, and 4) outcomes and best practices for surveillance and control of COVID-19. The success factors of 4S and EC were as follows; Space: prepare the quarantine (HQ, LQ), Cohort Ward (CW), field hospital, and community isolation and home isolation to face with the patient and risky group, Staff network from various organization and group cover the community leader and Health Volunteer (HV), Stuff the management and sharing of the medical and non-medical equipment, System of Covid-19 respond were EOC, ICS, Joint Investigation Team (JIT) and Communicable Disease Control Unit (CDCU) for monitoring the real-time of surveillance and control of COVID-19 output, Environment management in hospital and the community with Infections Control (IC) principle, and Culture in term of social capital on “the relationship of Isan people” supported the patient provide the good care and support. The structure of PHEM, Isan’s Culture, and good preparation was a significant factor in the three provinces.

Keywords: public health, emergency management, covid-19, pandemic

Procedia PDF Downloads 73
26439 Thermal Fracture Analysis of Fibrous Composites with Variable Fiber Spacing Using Jk-Integral

Authors: Farid Saeidi, Serkan Dag

Abstract:

In this study, fracture analysis of a fibrous composite laminate with variable fiber spacing is carried out using Jk-integral method. The laminate is assumed to be under thermal loading. Jk-integral is formulated by using the constitutive relations of plane orthotropic thermoelasticity. Developed domain independent form of the Jk-integral is then integrated into the general purpose finite element analysis software ANSYS. Numerical results are generated so as to assess the influence of variable fiber spacing on mode I and II stress intensity factors, energy release rate, and T-stress. For verification, some of the results are compared to those obtained using displacement correlation technique (DCT).

Keywords: Jk-integral, Variable Fiber Spacing, Thermoelasticity, T-stress, Finite Element Method, Fibrous Composite.

Procedia PDF Downloads 377
26438 Decision Tree Analysis of Risk Factors for Intravenous Infiltration among Hospitalized Children: A Retrospective Study

Authors: Soon-Mi Park, Ihn Sook Jeong

Abstract:

This retrospective study was aimed to identify risk factors of intravenous (IV) infiltration for hospitalized children. The participants were 1,174 children for test and 424 children for validation, who admitted to a general hospital, received peripheral intravenous injection therapy at least once and had complete records. Data were analyzed with frequency and percentage or mean and standard deviation were calculated, and decision tree analysis was used to screen for the most important risk factors for IV infiltration for hospitalized children. The decision tree analysis showed that the most important traditional risk factors for IV infiltration were the use of ampicillin/sulbactam, IV insertion site (lower extremities), and medical department (internal medicine) both in the test sample and validation sample. The correct classification was 92.2% in the test sample and 90.1% in the validation sample. More careful attention should be made to patients who are administered ampicillin/sulbactam, have IV site in lower extremities and have internal medical problems to prevent or detect infiltration occurrence.

Keywords: decision tree analysis, intravenous infiltration, child, validation

Procedia PDF Downloads 162
26437 Some Trends in Analysis of Two-Way Solid Slabs

Authors: Reem I. Al-Ya' Goub, Nasim Shatarat

Abstract:

This paper presents the results of analytical and comparative study among software programs' outputs in analysis of some two way solid slabs; flat plate, flat slab with beams and flat slab with drop panels problems that already been analyzed using Classical Equivalent Frame Method (CEFM) by several reinforced concrete book authors. The primary objective of this research is to determine the moment results using various software programs. Then, a summary of the results and differences percentages were obtained to show how analysis procedure effects the outputs of calculations that vary from software program to another when comparing them with the results of CEFM. Moment values were obtained using either the Equivalent Frame Method (EFM) or Finite Element Method (FEM) that's used among many software programs. The results of the analyses demonstrate that software programs vary markedly in terms of the information they provide to the structural designer regarding values of the model insertion, stiffness, effective moment of inertia used and specially the moment values.

Keywords: two-way solid slabs, flat plate, flat slab with beams, flat slab with drop panels, analysis, modeling, EFM, CEFM, FEM

Procedia PDF Downloads 401
26436 The Gezi Park Protests in the Columns

Authors: Süleyman Hakan Yilmaz, Yasemin Gülsen Yilmaz

Abstract:

The Gezi Park protests of 2013 have significantly changed the Turkish agenda and its effects have been felt historically. The protests, which rapidly spread throughout the country, were triggered by the proposal to recreate the Ottoman Army Barracks to function as a shopping mall on Gezi Park located in Istanbul’s Taksim neighbourhood despite the oppositions of several NGOs and when trees were cut in the park for this purpose. Once the news that construction vehicles entered the park on May 27 spread on social media, activists moved into the park to stop the demolition, against whom the police used disproportioned force. With this police intervention and the then prime-minister Tayyip Erdoğan's insistent statements about the construction plans, the protests turned into anti-government demonstrations, which then spread to the rest of the country, mainly in big cities like Ankara and Izmir. According to the Ministry of Internal Affairs’ June 23rd reports, 2.5 million people joined the demonstrations in 79 provinces, that is all of them, except for the provinces of Bayburt and Bingöl, while even more people shared their opinions via social networks. As a result of these events, 8 civilians and 2 security personnel lost their lives, namely police chief Mustafa Sarı, police officer Ahmet Küçükdağ, citizens Mehmet Ayvalıtaş, Abdullah Cömert, Ethem Sarısülük, Ali İsmail Korkmaz, Ahmet Atakan, Berkin Elvan, Burak Can Karamanoğlu, Mehmet İstif, and Elif Çermik, and 8163 more were injured. Besides being a turning point in Turkish history, the Gezi Park protests also had broad repercussions in both in Turkish and in global media, which focused on Turkey throughout the events. Our study conducts content analysis of three Turkish reporting newspapers with varying ideological standpoints, Hürriyet, Cumhuriyet ve Yeni Şafak, in order to reveal their basic approach to columns casting in context of the Gezi Park protests. Columns content relating to the Gezi protests were treated and analysed for this purpose. The aim of this study is to understand the social effects of the Gezi Park protests through media samples with varying political attitudes towards news casting.

Keywords: Gezi Park, media, news casting, columns

Procedia PDF Downloads 419
26435 Truthful or Untruthful Social Media Posts: Applying Statement Analysis to Decode online Deception

Authors: Christa L. Arnold, Margaret C. Stewart

Abstract:

This research shares the results of an exploratory study examining Statement Analysis (SA) to detect deception in online truthful and untruthful social media posts. Applying a Law Enforcement methodology SA, used in criminal interview statements, this research analyzes what is stated to assist in evaluating written deceptive information. Preliminary findings reveal qualitative and quantitative nuances for SA in online deception detection and uncover insights regarding digital deceptive behavior. Thus far, findings reveal truthful statements tend to differ from untruthful statements in both content and quality.

Keywords: deception detection, online deception, social media content, statement analysis

Procedia PDF Downloads 57
26434 Thermal Analysis and Computational Fluid Dynamics Simulation of Large-Scale Cryopump

Authors: Yue Shuai Zhao, Rong Ping Shao, Wei Sun, Guo Hua Ren, Yong Wang, Li Chen Sun

Abstract:

A large-scale cryopump (DN1250) used in large vacuum leak detecting system was designed and its performance experimentally investigated by Beijing Institute of Spacecraft Environment Engineering. The cryopump was cooled by four closed cycle helium refrigerators (two dual stage refrigerators and two single stage refrigerators). Detailed numerical analysis of the heat transfer in the first stage array and the second stage array were performed by using computational fluid dynamic method (CFD). Several design parameters were considered to find the effect on the temperature distribution and the cooldown time. The variation of thermal conductivity and heat capacity with temperature was taken into account. The thermal analysis method based on numerical techniques was introduced in this study, the heat transfer in the first stage array and the second stage cryopanel was carefully analyzed to determine important considerations in the thermal design of the cryopump. A performance test system according to the RNEUROP standards was built to test main performance of the cryopump. The experimental results showed that the structure of first stage array which was optimized by the method could meet the requirement of the cryopump well. The temperature of the cryopanel was down to 10K within 300 min, and the result of the experiment was accordant with theoretical analysis' conclusion. The test also showed that the pumping speed for N2 of the pump was up to 57,000 L/s, and the crossover was over than 300,000 Pa•L.

Keywords: cryopump, temperature distribution, thermal analysis, CFD Simulation

Procedia PDF Downloads 291
26433 Bioinformatic Approaches in Population Genetics and Phylogenetic Studies

Authors: Masoud Sheidai

Abstract:

Biologists with a special field of population genetics and phylogeny have different research tasks such as populations’ genetic variability and divergence, species relatedness, the evolution of genetic and morphological characters, and identification of DNA SNPs with adaptive potential. To tackle these problems and reach a concise conclusion, they must use the proper and efficient statistical and bioinformatic methods as well as suitable genetic and morphological characteristics. In recent years application of different bioinformatic and statistical methods, which are based on various well-documented assumptions, are the proper analytical tools in the hands of researchers. The species delineation is usually carried out with the use of different clustering methods like K-means clustering based on proper distance measures according to the studied features of organisms. A well-defined species are assumed to be separated from the other taxa by molecular barcodes. The species relationships are studied by using molecular markers, which are analyzed by different analytical methods like multidimensional scaling (MDS) and principal coordinate analysis (PCoA). The species population structuring and genetic divergence are usually investigated by PCoA and PCA methods and a network diagram. These are based on bootstrapping of data. The Association of different genes and DNA sequences to ecological and geographical variables is determined by LFMM (Latent factor mixed model) and redundancy analysis (RDA), which are based on Bayesian and distance methods. Molecular and morphological differentiating characters in the studied species may be identified by linear discriminant analysis (DA) and discriminant analysis of principal components (DAPC). We shall illustrate these methods and related conclusions by giving examples from different edible and medicinal plant species.

Keywords: GWAS analysis, K-Means clustering, LFMM, multidimensional scaling, redundancy analysis

Procedia PDF Downloads 107
26432 Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation

Authors: Edward Guillén, Jhordany Rodriguez, Rafael Páez

Abstract:

Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance.

Keywords: network intrusion detection, machine learning, artificial neural network, anomaly detection module

Procedia PDF Downloads 328
26431 Synthesis of Highly Valuable Fuel Fractions from Waste Date Seeds Oil

Authors: Farrukh Jamil, Ala'A H. Al-Muhtaseb, Lamya Al-Haj, Mohab A. Al-Hinai

Abstract:

Environmental problems and the security of energy supply have motivated the attention in the expansion of alternatives for fossil based fuels. Biomass has been recognized as a capable resource because it is plentifully available and in principle carbon dioxide neutral. Present study focuses on utilization date seeds oil for synthesizing high value fuels formulations such as green diesel and jet fuel. The hydrodeoxygenation of date seeds oil occurred to be highly efficient at following operating conditions temperature 300°C pressure 10bar with continuous stirring at 500 rpm. Products characterization revealed the efficiency of hydrodeoxygenation by formation of linear hydrocarbons (paraffin) in larger fraction. Based on the type of components in product oil it was calculated that maximum fraction lies within the range of green diesel 72.78 % then jet fuel 28.25 % by using Pt/C catalyst. It can be concluded that waste date seeds oil has potential to be used for obtaining high value products.

Keywords: date seeds, hydrodeoxygenation, paraffin, deoxygenation

Procedia PDF Downloads 250
26430 Morphological Processing of Punjabi Text for Sentiment Analysis of Farmer Suicides

Authors: Jaspreet Singh, Gurvinder Singh, Prabhsimran Singh, Rajinder Singh, Prithvipal Singh, Karanjeet Singh Kahlon, Ravinder Singh Sawhney

Abstract:

Morphological evaluation of Indian languages is one of the burgeoning fields in the area of Natural Language Processing (NLP). The evaluation of a language is an eminent task in the era of information retrieval and text mining. The extraction and classification of knowledge from text can be exploited for sentiment analysis and morphological evaluation. This study coalesce morphological evaluation and sentiment analysis for the task of classification of farmer suicide cases reported in Punjab state of India. The pre-processing of Punjabi text involves morphological evaluation and normalization of Punjabi word tokens followed by the training of proposed model using deep learning classification on Punjabi language text extracted from online Punjabi news reports. The class-wise accuracies of sentiment prediction for four negatively oriented classes of farmer suicide cases are 93.85%, 88.53%, 83.3%, and 95.45% respectively. The overall accuracy of sentiment classification obtained using proposed framework on 275 Punjabi text documents is found to be 90.29%.

Keywords: deep neural network, farmer suicides, morphological processing, punjabi text, sentiment analysis

Procedia PDF Downloads 307
26429 Cd2+ Ions Removal from Aqueous Solutions Using Alginite

Authors: Vladimír Frišták, Martin Pipíška, Juraj Lesný

Abstract:

Alginate has been evaluated as an efficient pollution control material. In this paper, alginate from maar Pinciná (SR) for removal of Cd2+ ions from aqueous solution was studied. The potential sorbent was characterized by X-Ray Fluorescence Analysis (RFA) analysis, Fourier Transform Infrared Spectral Analysis (FT-IR) and Specific Surface Area (SSA) was also determined. The sorption process was optimized from the point of initial cadmium concentration effect and effect of pH value. The Freundlich and Langmuir models were used to interpret the sorption behaviour of Cd2+ ions, and the results showed that experimental data were well fitted by the Langmuir equation. Alginate maximal sorption capacity (QMAX) for Cd2+ ions calculated from Langmuir isotherm was 34 mg/g. Sorption process was significantly affected by initial pH value in the range from 4.0-7.0. Alginate is a comparable sorbent with other materials for toxic metals removal.

Keywords: alginates, Cd2+, sorption, QMAX

Procedia PDF Downloads 344
26428 Copper Doped P-Type Nickel Oxide Transparent Conducting Oxide Thin Films

Authors: Kai Huang, Assamen Ayalew Ejigu, Mu-Jie Lin, Liang-Chiun Chao

Abstract:

Nickel oxide and copper-nickel oxide thin films have been successfully deposited by reactive ion beam sputter deposition. Experimental results show that nickel oxide deposited at 300°C is single phase NiO while best crystalline quality is achieved with an O_pf of 0.5. XRD analysis of nickel-copper oxide deposited at 300°C shows a Ni2O3 like crystalline structure at low O_pf while changes to NiO like crystalline structure at high O_pf. EDS analysis shows that nickel-copper oxide deposited at low O_pf is CuxNi2-xO3 with x = 1, while nickel-copper oxide deposited at high O_pf is CuxNi1-xO with x = 0.5, which is supported by Raman analysis. The bandgap of NiO is ~ 3.5 eV regardless of O_pf while the band gap of nickel-copper oxide decreases from 3.2 to 2.3 eV as Opf reaches 1.0.

Keywords: copper, ion beam, NiO, oxide, resistivity, transparent

Procedia PDF Downloads 301
26427 Magnetic Field Analysis of External Rotor Permanent-Magnet Synchronous Motors with Non Magnetic Rotor Core

Authors: Mabrak Samir

Abstract:

The motor performance created by permanent magnetic in a slotless air-gap of a surface mounted permanent-magnet synchronous motor with non magnetic rotor and either sinusoidal or mixed (quasi-Halbatch) magnetization is presented in this paper using polar coordinates. The analysis works for both internal and external rotor motor topologies, The effect of stator slots is introduced by modulating the magnetic field distribution in the slotless stator by the complex relative air-gap permeance, calculated from the conformal transformation of the slot geometry. We compare predicted results of flux density distribution and cogging torque with those obtained by finite-element analysis.

Keywords: air-cored, cogging torque, finite element magnetic field, permanent-magnet

Procedia PDF Downloads 357
26426 Rise in Public Interest in COVID-19 Symptoms and the Need for Proper Information: Insights from the Google Trends Analysis

Authors: Jaweriya Aftab, Madho Mal, Hamida Memon

Abstract:

The first case of coronavirus disease 2019 (COVID-19) in Pakistan was recorded on February 26th, 2020. While the country went through various phases of lockdowns, the importance of proper sensitization campaigns was highlighted by healthcare workers to combat misinformation. Past studies via Google trends analysis have shown a rise in public interest in multiple COVID-19-related symptoms as well as cardiovascular symptoms. As there is a paucity of data related to the trends in Pakistan, we conducted a retrospective analysis to bridge further information. Methods: As per the recommendations from past studies, a Google trend analysis was conducted for various symptoms, including ‘Fever’, ‘Chest Pain’, ‘Shortness of Breath’, and ‘Cough’ between 1st January 2019 to 31st December 2021. The trends in various search results were analyzed and modeled. Results: Our analysis found various rises in public interest in the various symptoms (fever, chest pain, shortness of breath, and cough) that correspond closely to the wave of the virus's spread in the country. Conclusion: Our study confirms similar trends in Pakistan as previously reported in studies from India, USA, and UK, whereby the public interest in various COVID-19 symptoms rose with the number of cases. This further highlights the need for a strong approach to combat misinformation during such a critical period.

Keywords: covid, trend, Pakistan, public

Procedia PDF Downloads 14
26425 A Research and Application of Feature Selection Based on IWO and Tabu Search

Authors: Laicheng Cao, Xiangqian Su, Youxiao Wu

Abstract:

Feature selection is one of the important problems in network security, pattern recognition, data mining and other fields. In order to remove redundant features, effectively improve the detection speed of intrusion detection system, proposes a new feature selection method, which is based on the invasive weed optimization (IWO) algorithm and tabu search algorithm(TS). Use IWO as a global search, tabu search algorithm for local search, to improve the results of IWO algorithm. The experimental results show that the feature selection method can effectively remove the redundant features of network data information in feature selection, reduction time, and to guarantee accurate detection rate, effectively improve the speed of detection system.

Keywords: intrusion detection, feature selection, iwo, tabu search

Procedia PDF Downloads 514