Search results for: BCH code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1360

Search results for: BCH code

910 Cyclostationary Analysis of Polytime Coded Signals for LPI Radars

Authors: Metuku Shyamsunder, Kakarla Subbarao, P. Prasanna

Abstract:

In radars, an electromagnetic waveform is sent, and an echo of the same signal is received by the receiver. From this received signal, by extracting various parameters such as round trip delay, Doppler frequency it is possible to find distance, speed, altitude, etc. However, nowadays as the technology increases, intruders are intercepting transmitted signal as it reaches them, and they will be extracting the characteristics and trying to modify them. So there is a need to develop a system whose signal cannot be identified by no cooperative intercept receivers. That is why LPI radars came into existence. In this paper, a brief discussion on LPI radar and its modulation (polytime code (PT1)), detection (cyclostationary (DFSM & FAM) techniques such as DFSM, FAM are presented and compared with respect to computational complexity.

Keywords: LPI radar, polytime codes, cyclostationary DFSM, FAM

Procedia PDF Downloads 448
909 High Viscous Oil–Water Flow: Experiments and CFD Simulations

Authors: A. Archibong-Eso, J. Shi, Y Baba, S. Alagbe, W. Yan, H. Yeung

Abstract:

This study presents over 100 experiments conducted in a 25.4 mm internal diameter (ID) horizontal pipeline. Oil viscosity ranging from 3.5 Pa.s–5.0 Pa.s are used with superficial velocities of oil and water ranging from 0.06 to 0.55 m/s and 0.01 m/s to 1.0 m/s, respectively. Pressure gradient measurements and flow pattern observations are discussed. Numerical simulation of some flow conditions is performed using the commercial CFD code ANSYS Fluent® and the simulation results are compared with experimental results. Results indicate that CFD numerical simulation performed moderately well in predicting the flow configurations observed in this study while discrepancies were observed in the pressure gradient predictions.

Keywords: flow patterns, plug, pressure gradient, rivulet

Procedia PDF Downloads 397
908 Heritage Spanish Speaker’s Bilingual Practices and Linguistic Varieties: Challenges and Opportunities

Authors: Ana C. Sanchez

Abstract:

This paper will discuss some of the bilingual practices of Heritage Spanish speakers caused by living within two cultures and two languages, Spanish, the heritage language, and English, the dominant language. When two languages remain in contact for long periods, such as the case of Spanish and English, it is common that both languages can be affected by bilingual practices such as Spanglish, code-switching, borrowing, anglicisms and calques. Examples of these translingual practices will be provided, as well as HS speaker’s linguistic dialects, and the challenges they encounter with the standard variety used in the Spanish classroom.

Keywords: heritage, practices, Spanish, speakers translingual

Procedia PDF Downloads 174
907 Seismic Design Approach for Areas with Low Seismicity

Authors: Mogens Saberi

Abstract:

The following article focuses on a new seismic design approach for Denmark. Denmark is located in a low seismic zone and up till now a general and very simplified approach has been used to accommodate the effect of seismic loading. The current used method is presented and it is found that the approach is on the unsafe side for many building types in Denmark. The damages during time due to earth quake is presented and a seismic map for Denmark is developed and presented. Furthermore, a new design approach is suggested and compared to the existing one. The new approach is relatively simple but captures the effect of seismic loading more realistic than the existing one. The new approach is believed to the incorporated in the Danish Deign Code for building structures.

Keywords: low seismicity, new design approach, earthquakes, Denmark

Procedia PDF Downloads 334
906 A Critical Examination of the Iranian National Legal Regulation of the Ecosystem of Lake Urmia

Authors: Siavash Ostovar

Abstract:

The Iranian national Law on the Ramsar Convention (officially known as the Convention of International Wetlands and Aquatic Birds' Habitat Wetlands) was approved by the Senate and became a law in 1974 after the ratification of the National Council. There are other national laws with the aim of preservation of environment in the country. However, Lake Urmia which is declared a wetland of international importance by the Ramsar Convention in 1971 and designated a UNESCO Biosphere Reserve in 1976 is now at the brink of total disappearance due mainly to the climate change, water mismanagement, dam construction, and agricultural deficiencies. Lake Urmia is located in the north western corner of Iran. It is the third largest salt water lake in the world and the largest lake in the Middle East. Locally, it is designated as a National Park. It is, indeed, a unique lake both nationally and internationally. This study investigated how effective the national legal regulation of the ecosystem of Lake Urmia is in Iran. To do so, the Iranian national laws as Enforcement of Ramsar Convention in the country including three nationally established laws of (i) Five sets of laws for the programme of economic, social and cultural development of Islamic Republic of Iran, (ii) The Iranian Penal Code, (iii) law of conservation, restoration and management of the country were investigated. Using black letter law methods, it was revealed that (i) regarding the national five sets of laws; the benchmark to force the implementation of the legislations and policies is not set clearly. In other words, there is no clear guarantee to enforce these legislations and policies at the time of deviation and violation; (ii) regarding the Penal Code, there is lack of determining the environmental crimes, determining appropriate penalties for the environmental crimes, implementing those penalties appropriately, monitoring and training programmes precisely; (iii) regarding the law of conservation, restoration and management, implementation of this regulation is adjourned to preparation, announcement and approval of several categories of enactments and guidelines. In fact, this study used a national environmental catastrophe caused by drying up of Lake Urmia as an excuse to direct the attention to the weaknesses of the existing national rules and regulations. Finally, as we all depend on the natural world for our survival, this study recommended further research on every environmental issue including the Lake Urmia.

Keywords: conservation, environmental law, Lake Urmia, national laws, Ramsar Convention, water management, wetlands

Procedia PDF Downloads 180
905 Statistical Study and Simulation of 140 Kv X– Ray Tube by Monte Carlo

Authors: Mehdi Homayouni, Karim Adinehvand, Bakhtiar Azadbakht

Abstract:

In this study, we used Monte Carlo code (MCNP4C) that is a general method, for simulation, electron source and electric field, a disc source with 0.05 cm radius in direct of anode are used, radius of disc source show focal spot of X-ray tube that here is 0.05 cm. In this simulation, the anode is from tungsten with 18.9 g/cm3 density and angle of the anode is 18°. We simulated X-ray tube for 140 kv. For increasing of speed data acquisition, we use F5 tally. With determination the exact position of F5 tally in the program, outputs are acquired. In this spectrum the start point is about 0.02 Mev, the absorption edges are about 0.06 Mev and 0.07 Mev, and average energy is about 0.05 Mev.

Keywords: X-spectrum, simulation, Monte Carlo, tube

Procedia PDF Downloads 692
904 Cold Flow Investigation of Silicon Carbide Cylindrical Filter Element

Authors: Mohammad Alhajeri

Abstract:

This paper reports a computational fluid dynamics (CFD) investigation of cylindrical filter. Silicon carbide cylindrical filter elements have proven to be an effective mean of removing particulates to levels exceeding the new source performance standard. The CFD code is used here to understand the deposition process and the factors that affect the particles distribution over the filter element surface. Different approach cross flow velocity to filter face velocity ratios and different face velocities (ranging from 2 to 5 cm/s) are used in this study. Particles in the diameter range 1 to 100 microns are tracked through the domain. The radius of convergence (or the critical trajectory) is compared and plotted as a function of many parameters.

Keywords: filtration, CFD, CCF, hot gas filtration

Procedia PDF Downloads 439
903 Condensation of Moist Air in Heat Exchanger Using CFD

Authors: Jan Barak, Karel Frana, Joerg Stiller

Abstract:

This work presents results of moist air condensation in heat exchanger. It describes theoretical knowledge and definition of moist air. Model with geometry of square canal was created for better understanding and post processing of condensation phenomena. Different approaches were examined on this model to find suitable software and model. Obtained knowledge was applied to geometry of real heat exchanger and results from experiment were compared with numerical results. One of the goals is to solve this issue without creating any user defined function in the applied code. It also contains summary of knowledge and outlook for future work.

Keywords: condensation, exchanger, experiment, validation

Procedia PDF Downloads 375
902 Improving Access and Quality of Patient Information Resources for Orthognathic Treatment: A Quality Improvement Project

Authors: Evelyn Marie Richmond, Andrew McBride, Chris Johnston, John Marley

Abstract:

Background: Good quality patient information resources for orthognathic treatment help to reinforce information delivered during the initial consultation and help patients make informed decisions about their care. The Consultant Orthodontists and a Dental Core Trainee noted limited patient engagement with the British Orthodontic Society (BOS) 'Your Jaw Surgery' online resources and that the existing BOS patient information leaflet (PIL) could be customised and developed to meet local requirements. Aim: The quality improvement project (QIP) aimed to improve patients' understanding of orthognathic treatment by ensuring at least 90% of patients had read the new in-house patient information leaflet (PIL) and a minimum of 50% of patients had accessed the British Orthodontic Society (BOS) 'Your Jaw Surgery' online resources before attending the joint orthognathic multidisciplinary clinic by June 2023. Methods: The QIP was undertaken in the orthodontic department of the School of Dentistry, Belfast. Data was collected prospectively during a 6-month period from January 2023 to June 2023 over 3 Plan, Do, Study, Act (PDSA) cycles. Suitable patients were identified at consultant orthodontic new patient clinics. Following initial consultation for orthognathic treatment, patients were contacted to complete a patient questionnaire. Design: The change ideas were a poster with a QR code directing patients to the BOS 'Your Jaw Surgery' website in consultation areas and a new in-house PIL with a QR code directing patients to the BOS 'Your Jaw Surgery' website. Results: In PDSA cycle 1, 86.7% of patients were verbally directed to the BOS 'Your Jaw Surgery' website, and 53.3% accessed the online resources after their initial consultation. Although 100% of patients reported reading the existing PIL, only 64.3% felt it discussed the risks of orthognathic treatment in sufficient detail. By PDSA cycle 3, 100% of patients reported being directed to the BOS 'Your Jaw Surgery' website, however, only 58.3% engaged with the website. 100% of patients who read the new PIL felt that it discussed the risks of orthognathic treatment in sufficient detail. Conclusion: The slight improvement in access to the BOS 'Your Jaw Surgery' website shows that patients do not necessarily choose to access information online despite its availability. The uptake of the new PIL was greater than reported patient engagement with the BOS 'Your Jaw Surgery' website, which indicates patients still value written information despite the availability of online resources.

Keywords: orthognathic surgery, patient information resources, quality improvement project, risks

Procedia PDF Downloads 41
901 Performance Analysis of Next Generation OCDM-RoF-Based Hybrid Network under Diverse Conditions

Authors: Anurag Sharma, Rahul Malhotra, Love Kumar, Harjit Pal Singh

Abstract:

This paper demonstrates OCDM-ROF based hybrid architecture where data/voice communication is enabled via a permutation of Optical Code Division Multiplexing (OCDM) and Radio-over-Fiber (RoF) techniques under various diverse conditions. OCDM-RoF hybrid network of 16 users with DPSK modulation format has been designed and performance of proposed network is analyzed for 100, 150, and 200 km fiber span length under the influence of linear and nonlinear effect. It has been reported that Polarization Mode Dispersion (PMD) has the least effect while other nonlinearity affects the performance of proposed network.

Keywords: OCDM, RoF, DPSK, PMD, eye diagram, BER, Q factor

Procedia PDF Downloads 608
900 Modulation of the Europay, MasterCard, and VisaCard Authentications by Using Avispa Tool

Authors: Ossama Al-Maliki

Abstract:

The Europay, MasterCard, and Visa (EMV) is the transaction protocol for most of the world and especially in Europe and the UK. EMV protocol consists of three main stages which are: card authentication, cardholder verification methods, and transaction authorization. This paper details in full the EMV card authentications. We have used AVISPA and SPAN tools to do our modulization for the EMV card authentications. The code for each type of the card authentication was written by using CAS+ language. The results showed that our modulations were successfully addressed all the steps of the EMV card authentications and the entire process of the EMV card authentication are secured. Also, our modulations were successfully addressed all the main goals behind the EMV card authentications according to the EMV specifications.

Keywords: EMV, card authentication, contactless card, SDA, DDA, CDA AVISPA

Procedia PDF Downloads 155
899 NFTs, between Opportunities and Absence of Legislation: A Study on the Effect of the Rulings of the OpenSea Case

Authors: Andrea Ando

Abstract:

The development of the blockchain has been a major innovation in the technology field. It opened the door to the creation of novel cyberassets and currencies. In more recent times, the non-fungible tokens have started to be at the centre of media attention. Their popularity has been increasing since 2021, and they represent the latest in the world of distributed ledger technologies and cryptocurrencies. It seems more and more likely that NFTs will play a more important role in our online interactions. They are indeed increasingly taking part in the arts and technology sectors. Their impact on society and the market is still very difficult to define, but it is very likely that there will be a turning point in the world of digital assets. There are some examples of their peculiar behaviour and effect in our contemporary tech-market: the former CEO of the famous social media site Twitter sold an NFT of his first tweet for around £2,1 million ($2,5 million), or the National Basketball Association has created a platform to sale unique moment and memorabilia from the history of basketball through the non-fungible token technology. Their growth, as imaginable, paved the way for civil disputes, mostly regarding their position under the current intellectual property law in each jurisdiction. In April 2022, the High Court of England and Wales ruled in the OpenSea case that non-fungible tokens can be considered properties. The judge, indeed, concluded that the cryptoasset had all the indicia of property under common law (National Provincial Bank v. Ainsworth). The research has demonstrated that the ruling of the High Court is not providing enough answers to the dilemma of whether minting an NFT is a violation or not of intellectual property and/or property rights. Indeed, if, on the one hand, the technology follows the framework set by the case law (e.g., the 4 criteria of Ainsworth), on the other hand, the question that arises is what is effectively protected and owned by both the creator and the purchaser. Then the question that arises is whether a person has ownership of the cryptographed code, that it is indeed definable, identifiable, intangible, distinct, and has a degree of permanence, or what is attached to this block-chain, hence even a physical object or piece of art. Indeed, a simple code would not have any financial importance if it were not attached to something that is widely recognised as valuable. This was demonstrated first through the analysis of the expectations of intellectual property law. Then, after having laid the foundation, the paper examined the OpenSea case, and finally, it analysed whether the expectations were met or not.

Keywords: technology, technology law, digital law, cryptoassets, NFTs, NFT, property law, intellectual property law, copyright law

Procedia PDF Downloads 64
898 Numerical Flow Simulation around HSP Propeller in Open Water and behind a Vessel Wake Using RANS CFD Code

Authors: Kadda Boumediene, Mohamed Bouzit

Abstract:

The prediction of the flow around marine propellers and vessel hulls propeller interaction is one of the challenges of Computational fluid dynamics (CFD). The CFD has emerged as a potential tool in recent years and has promising applications. The objective of the current study is to predict the hydrodynamic performances of HSP marine propeller in open water and behind a vessel. The unsteady 3-D flow was modeled numerically along with respectively the K-ω standard and K-ω SST turbulence models for steady and unsteady cases. The hydrodynamic performances such us a torque and thrust coefficients and efficiency show good agreement with the experiment results.

Keywords: seiun maru propeller, steady, unstead, CFD, HSP

Procedia PDF Downloads 277
897 Using HABIT to Estimate the Concentration of CO2 and H2SO4 for Kuosheng Nuclear Power Plant

Authors: Y. Chiang, W. Y. Li, J. R. Wang, S. W. Chen, W. S. Hsu, J. H. Yang, Y. S. Tseng, C. Shih

Abstract:

In this research, the HABIT code was used to estimate the concentration under the CO2 and H2SO4 storage burst conditions for Kuosheng nuclear power plant (NPP). The Final Safety Analysis Report (FSAR) and reports were used in this research. In addition, to evaluate the control room habitability for these cases, the HABIT analysis results were compared with the R.G. 1.78 failure criteria. The comparison results show that the HABIT results are below the criteria. Additionally, some sensitivity studies (stability classification, wind speed and control room intake rate) were performed in this study.

Keywords: BWR, HABIT, habitability, Kuosheng

Procedia PDF Downloads 462
896 Detection Characteristics of the Random and Deterministic Signals in Antenna Arrays

Authors: Olesya Bolkhovskaya, Alexey Davydov, Alexander Maltsev

Abstract:

In this paper approach to incoherent signal detection in multi-element antenna array are researched and modeled. Two types of useful signals with unknown wavefront were considered. First one is deterministic (Barker code), the second one is random (Gaussian distribution). The derivation of the sufficient statistics took into account the linearity of the antenna array. The performance characteristics and detecting curves are modeled and compared for different useful signals parameters and for different number of elements of the antenna array. Results of researches in case of some additional conditions can be applied to a digital communications systems.

Keywords: antenna array, detection curves, performance characteristics, quadrature processing, signal detection

Procedia PDF Downloads 371
895 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 473
894 Sexual Diversity Training for Hong Kong Teachers Preliminary Themes Identified from Qualitative Interviews

Authors: Diana K. Kwok

Abstract:

Despite the fact that Hong Kong government aims to develop an inclusive society, sexual minority students continue to encounter sexual prejudice without legal protection. They also have difficulties accessing relevant services from mental health and educational professionals, who do not receive systematic training to work with sexual minority students. Informed by the literature on sexual prejudice, heterosexual hegemony, genderism, as well as code of practice for frontline practitioners, the authors explored self-perceived knowledge of teachers and sexual minorities on sexuality and sexual prejudice, and how they perceive prejudice towards sexual minorities in Chinese cultural context. Semi-structure qualitative interviews were carried out with 31 school personnel informants (school teachers and counseling team members) and 25 sexual minority informants on their understanding of sexuality knowledge, their perception of sexual prejudice within school context in Hong Kong, as well as their suggested themes on teachers training on sexual prejudice reduction. This presentation specifically focuses on transcripts from sexual minority informants. Data analysis was carried out through NVivo, and followed the procedures spelt out in the qualitative research literature. Trustworthiness of the study was addressed through various strategies. Preliminary themes emerged from transcript content analysis: 1) A gap of knowledge between sexual minority informants and teachers; 2) Perception on sexual prejudice within cultural context; 3) Heterosexual hegemony and genderism within school system; 4) Needs for mandatory training: contents and strategies. The sexual minority informants found that teachers they encountered were predominantly adopted concepts of binary sex and dichotomous gender. Informants also indicated that the teachings of Confucianism cultural values, religiosity in Hong Kong might well be important cultural forces contributing to sexual prejudice manifested in school context. Although human rights and social justice concepts were embedded in professional code of practice of teachers and school helping professionals, informants found that teachers they encountered may face a dilemma when supporting sexual minority students navigating heterosexual hegemony and genderism in, as a consequence of their personal, institutional, cultural and religious backgrounds. Acknowledgments: The sexual prejudice project was funded by the Hong Kong Research Grant Council (ECS28401614), 2015 to 2017.

Keywords: sexual prejudice, Chinese teachers, Chinese sexual minorities, teacher training

Procedia PDF Downloads 257
893 Relevancy Measures of Errors in Displacements of Finite Elements Analysis Results

Authors: A. B. Bolkhir, A. Elshafie, T. K. Yousif

Abstract:

This paper highlights the methods of error estimation in finite element analysis (FEA) results. It indicates that the modeling error could be eliminated by performing finite element analysis with successively finer meshes or by extrapolating response predictions from an orderly sequence of relatively low degree of freedom analysis results. In addition, the paper eliminates the round-off error by running the code at a higher precision. The paper provides application in finite element analysis results. It draws a conclusion based on results of application of methods of error estimation.

Keywords: finite element analysis (FEA), discretization error, round-off error, mesh refinement, richardson extrapolation, monotonic convergence

Procedia PDF Downloads 460
892 Static Modeling of the Delamination of a Composite Material Laminate in Mode II

Authors: Y. Madani, H. Achache, B. Boutabout

Abstract:

The purpose of this paper is to analyze numerically by the three-dimensional finite element method, using ABAQUS calculation code, the mechanical behavior of a unidirectional and multidirectional delaminated stratified composite under mechanical loading in Mode II. This study consists of the determination of the energy release rate G in mode II as well as the distribution of equivalent von Mises stresses along the damaged zone by varying several parameters such as the applied load and the delamination length. It allowed us to deduce that the high energy release rate favors delamination at the free edges of a stratified plate subjected to bending.

Keywords: delamination, energy release rate, finite element method, stratified composite

Procedia PDF Downloads 149
891 The Risk of Ground Movements After Digging Two Parallel Vertical Tunnel in Urban

Authors: Djelloul Chafia, Demagh Rafik, Kareche Toufik

Abstract:

Human activities, made without precautions, accelerate the degradation of the soil structure and reduces its resistance. Operations, such as tunnel construction may exercise an influence more or less permanent on the grounds which surrounded them, these structures alter soil it is necessary to predict their impacts by suitable measures. This research is a numerical analysis that deals the risks and effects due to the weakening of the soil after digging two parallel vertical circular tunnels in urban areas, and suggests forecasting techniques based essentially on the organization of underground space. The simulations are performed using the finite-difference code FLAC in a two-dimensional case and with an elasto-plastic behavior of the soil.

Keywords: sol, weakening, degradation, prevention, tunnel

Procedia PDF Downloads 534
890 A Framework for SQL Learning: Linking Learning Taxonomy, Cognitive Model and Cross Cutting Factors

Authors: Huda Al Shuaily, Karen Renaud

Abstract:

Databases comprise the foundation of most software systems. System developers inevitably write code to query these databases. The de facto language for querying is SQL and this, consequently, is the default language taught by higher education institutions. There is evidence that learners find it hard to master SQL, harder than mastering other programming languages such as Java. Educators do not agree about explanations for this seeming anomaly. Further investigation may well reveal the reasons. In this paper, we report on our investigations into how novices learn SQL, the actual problems they experience when writing SQL, as well as the differences between expert and novice SQL query writers. We conclude by presenting a model of SQL learning that should inform the instructional material design process better to support the SQL learning process.

Keywords: pattern, SQL, learning, model

Procedia PDF Downloads 238
889 A Fault-Tolerant Full Adder in Double Pass CMOS Transistor

Authors: Abdelmonaem Ayachi, Belgacem Hamdi

Abstract:

This paper presents a fault-tolerant implementation for adder schemes using the dual duplication code. To prove the efficiency of the proposed method, the circuit is simulated in double pass transistor CMOS 32nm technology and some transient faults are voluntary injected in the Layout of the circuit. This fully differential implementation requires only 20 transistors which mean that the proposed design involves 28.57% saving in transistor count compared to standard CMOS technology.

Keywords: digital electronics, integrated circuits, full adder, 32nm CMOS tehnology, double pass transistor technology, fault toleance, self-checking

Procedia PDF Downloads 318
888 Developing API Economy: Associating Value to APIs and Microservices in an Enterprise

Authors: Mujahid Sultan

Abstract:

The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) methodologies and development approaches. SDLCs range from waterfall to agile, and the development approaches from monolith to microservices. Management, orchestration, and monetization of microservices have created an API economy in the modern enterprise. There are two approaches to API design, code first and design first. Design first is gaining popularity in the industry as this allows capturing the API needs from the stakeholders rather than the development teams guesstimating the needs and associating a monetary value with the APIs and microservices. In this publication, we describe an approach to organizing and creating stakeholder needs and requirements for designing microservices and APIs.

Keywords: requirements engineering, enterprise architecture, APIs, microservices, DevOps, continuous delivery, continuous integration, stakeholder viewpoints

Procedia PDF Downloads 158
887 A Generalization of the Secret Sharing Scheme Codes Over Certain Ring

Authors: Ibrahim Özbek, Erdoğan Mehmet Özkan

Abstract:

In this study, we generalize (k,n) threshold secret sharing scheme on the study Ozbek and Siap to the codes over the ring Fq+ αFq. In this way, it is mentioned that the method obtained in that article can also be used on codes over rings, and new advantages to be obtained. The method of securely sharing the key in cryptography, which Shamir first systematized and Massey carried over to codes, became usable for all error-correcting codes. The firewall of this scheme is based on the hardness of the syndrome decoding problem. Also, an open study area is left for those working for other rings and code classes. All codes that correct errors with this method have been the working area of this method.

Keywords: secret sharing scheme, linear codes, algebra, finite rings

Procedia PDF Downloads 53
886 Variations of Testing Concrete Mechanical Properties by European Standard and American Code

Authors: Ahmed M. Seyam, Rita Nemes, Salem Georges Nehme

Abstract:

Europe and the United States have a worldwide significance in the field of concrete control and construction; according to that, a lot of countries adopted their standards and regulations in the concrete field, as proof of the Europe and US strong standards and due to lack of own regulations. The main controlled property of concrete are the compressive strength, flexure tensile strength, and modulus of elasticity as it relates both to its bearing capacity and to the durability of the elements built with it, so in this paper, ASTM standard and EN standards method of testing those properties were put under the microscope to compare the variations between them.

Keywords: concrete, ASTM, EU standards, compressive strength, flexural strength, modulus of elasticity

Procedia PDF Downloads 63
885 Private Coded Computation of Matrix Multiplication

Authors: Malihe Aliasgari, Yousef Nejatbakhsh

Abstract:

The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.

Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers

Procedia PDF Downloads 92
884 Wrinkling Prediction of Membrane Composite of Varying Orientation under In-Plane Shear

Authors: F. Sabri, J. Jamali

Abstract:

In this article, the wrinkling failure of orthotropic composite membranes due to in-plane shear deformation is investigated using nonlinear finite element analyses. A nonlinear post-buckling analysis is performed to show the evolution of shear-induced wrinkles. The method of investigation is based on the post-buckling finite element analysis adopted from commercial FEM code; ANSYS. The resulting wrinkling patterns, their amplitude and their wavelengths under the prescribed loads and boundary conditions were confirmed by experimental results. Our study reveals that wrinkles develop when both the magnitudes and coverage of the minimum principal stresses in the laminated composite laminates are sufficiently large to trigger wrinkling.

Keywords: composite, FEM, membrane, wrinkling

Procedia PDF Downloads 245
883 Investigation of Damage in Glass Subjected to Static Indentation Using Continuum Damage Mechanics

Authors: J. Ismail, F. Zaïri, M. Naït-Abdelaziz, Z. Azari

Abstract:

In this work, a combined approach of continuum damage mechanics (CDM) and fracture mechanics is applied to model a glass plate behavior under static indentation. A spherical indenter is used and a CDM based constitutive model with an anisotropic damage tensor was selected and implemented into a finite element code to study the damage of glass. Various regions with critical damage values were predicted in good agreement with the experimental observations in the literature. In these regions, the directions of crack propagation, including both cracks initiating on the surface as well as in the bulk, were predicted using the strain energy density factor.

Keywords: finite element modeling, continuum damage mechanics, indentation, cracks

Procedia PDF Downloads 393
882 Impact of Harmonic Resonance and V-THD in Sohar Industrial Port–C Substation

Authors: R. S. Al Abri, M. H. Albadi, M. H. Al Abri, U. K. Al Rasbi, M. H. Al Hasni, S. M. Al Shidi

Abstract:

This paper presents an analysis study on the impacts of the changes of the capacitor banks, the loss of a transformer, and the installation of distributed generation on the voltage total harmonic distortion and harmonic resonance. The study is applied in a real system in Oman, Sohar Industrial Port–C Substation Network. Frequency scan method and Fourier series analysis method are used with the help of EDSA software. Moreover, the results are compared with limits specified by national Oman distribution code.

Keywords: power quality, capacitor bank, voltage total harmonics distortion, harmonic resonance, frequency scan

Procedia PDF Downloads 590
881 Numerical Model Validation Using Durbin Method

Authors: H. Al-Hajeri

Abstract:

The computation of the effectiveness of turbulence enhancement surface features, such as ribs as means of promoting mixing and hence heat transfer, has attracted the continued attention of the engineering community. In this study, the simulation of a three-dimensional cooling passage is carried out employing a number of turbulence models including Durbin model. The cooling passage consists of a square section duct whose upper and lower surfaces feature staggered cuboid ribs. The main objective of this paper is to provide comparisons of the performance of the v2-f model against other established turbulence models as implemented in the commercial CFD code Ansys Fluent. The present study demonstrates that the v2-f model can successfully capture the isothermal air flow phenomena in flow over obstacles.

Keywords: CFD, cooling passage, Durbin model, turbulence model

Procedia PDF Downloads 486