Search results for: Means of securing graves
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4492

Search results for: Means of securing graves

4282 Numerical investigation of Hydrodynamic and Parietal Heat Transfer to Bingham Fluid Agitated in a Vessel by Helical Ribbon Impeller

Authors: Mounir Baccar, Amel Gammoudi, Abdelhak Ayadi

Abstract:

The efficient mixing of highly viscous fluids is required for many industries such as food, polymers or paints production. The homogeneity is a challenging operation for this fluids type since they operate at low Reynolds number to reduce the required power of the used impellers. Particularly, close-clearance impellers, mainly helical ribbons, are chosen for highly viscous fluids agitated in laminar regime which is currently heated through vessel wall. Indeed, they are characterized by high shear strains closer to the vessel wall, which causes a disturbing thermal boundary layer and ensures the homogenization of the bulk volume by axial and radial vortices. The hydrodynamic and thermal behaviors of Newtonian fluids in vessels agitated by helical ribbon impellers, has been mostly studied by many researchers. However, rarely researchers investigated numerically the agitation of yield stress fluid by means of helical ribbon impellers. This paper aims to study the effect of the Double Helical Ribbon (DHR) stirrers on both the hydrodynamic and the thermal behaviors of yield stress fluids treated in a cylindrical vessel by means of numerical simulation approach. For this purpose, continuity, momentum, and thermal equations were solved by means of 3D finite volume technique. The effect of Oldroyd (Od) and Reynolds (Re) numbers on the power (Po) and Nusselt (Nu) numbers for the mentioned stirrer type have been studied. Also, the velocity and thermal fields, the dissipation function and the apparent viscosity have been presented in different (r-z) and (r-θ) planes.

Keywords: Bingham fluid, Hydrodynamic and thermal behavior, helical ribbon, mixing, numerical modelling

Procedia PDF Downloads 272
4281 The Conceptual Exploration of Comfort Zone by Using Content Analysis

Authors: Lilla Szabó Hangya, Szilvia Jambori

Abstract:

The comfort zone is less studied area in the field of psychology. One of the most important definitions is that comfort zone is a psychological state in which things feel familiar to a person with low level of anxiety and stress. But the validity of comfort zone does not confirm till now. The aim of our pilot research is to test which psychological factors could determine how young adults behave during their decision process to stay in one’s comfort zone or to leave it. Every person has a number of comfort zones, so we are not able to measure it directly, only those personality traits which predict if someone leaves his comfort zone easier or harder. In our study at first we wanted to clarify the meaning of comfort zone. 110 young adults (male: 37, female: 73; ages from 18 to 70, average age: 26,6) took part in the study. Beside their demographic datas we asked them what does the comfort zone mean for them. The results showed that the meaning of the comfort zone can be grouped in five dimensions: comfort (49,6 %), leaving it-change (8,1%), ambivalent feelings (10,6%), related to other people (10,6%), pursuit of self-realization (16,8%). Our results demonstrated age related characteristics. For young people at the age of 19 the comfort zone is related to other people, because during adolescents peer relationships become more important. Subjects at the age 20-30 answered that the comfort zone means comfort and stability for them. Their life becomes stable for a while, they are studying or working. But at the age of 25, when they finish university, most of them answered comfort zone means a changing process for them. On the other hand for subjects at the age of 27 the means of the comfort zone is pursuit of self-realization. After that period at the age of 31 when they have families and stable job the stability will also dominant. We saw that the comfort zone has much more meaning besides a pleasant psychological trait. Further we would like to determine which psychological factors relate to comfort zone, and what kind of personality traits could predict leaving or staying in one’s comfort zone. We want to observe the relationship between comfort zone and subjective well-being, life satisfaction self-efficacy or self-esteem.

Keywords: comfort zone, development, personality trait, young adults

Procedia PDF Downloads 313
4280 Knowledge Representation Based on Interval Type-2 CFCM Clustering

Authors: Lee Myung-Won, Kwak Keun-Chang

Abstract:

This paper is concerned with knowledge representation and extraction of fuzzy if-then rules using Interval Type-2 Context-based Fuzzy C-Means clustering (IT2-CFCM) with the aid of fuzzy granulation. This proposed clustering algorithm is based on information granulation in the form of IT2 based Fuzzy C-Means (IT2-FCM) clustering and estimates the cluster centers by preserving the homogeneity between the clustered patterns from the IT2 contexts produced in the output space. Furthermore, we can obtain the automatic knowledge representation in the design of Radial Basis Function Networks (RBFN), Linguistic Model (LM), and Adaptive Neuro-Fuzzy Networks (ANFN) from the numerical input-output data pairs. We shall focus on a design of ANFN in this paper. The experimental results on an estimation problem of energy performance reveal that the proposed method showed a good knowledge representation and performance in comparison with the previous works.

Keywords: IT2-FCM, IT2-CFCM, context-based fuzzy clustering, adaptive neuro-fuzzy network, knowledge representation

Procedia PDF Downloads 295
4279 Unreliable Production Lines with Simultaneously Unbalanced Operation Time Means, Breakdown, and Repair Rates

Authors: Sabry Shaaban, Tom McNamara, Sarah Hudson

Abstract:

This paper investigates the benefits of deliberately unbalancing both operation time means (MTs) and unreliability (failure and repair rates) for non-automated production lines.The lines were simulated with various line lengths, buffer capacities, degrees of imbalance and patterns of MT and unreliability imbalance. Data on two performance measures, namely throughput (TR) and average buffer level (ABL) were gathered, analyzed and compared to a balanced line counterpart. A number of conclusions were made with respect to the ranking of configurations, as well as to the relationships among the independent design parameters and the dependent variables. It was found that the best configurations are a balanced line arrangement and a monotone decreasing MT order, coupled with either a decreasing or a bowl unreliability configuration, with the first generally resulting in a reduced TR and the second leading to a lower ABL than those of a balanced line.

Keywords: unreliable production lines, unequal mean operation times, unbalanced failure and repair rates, throughput, average buffer level

Procedia PDF Downloads 463
4278 A Study on the Effect of Rib Structure in Spoke-Type PMSM

Authors: Hyun-Soo Seol, In-Gun Kim, Hyun Seok Hong, Dong-Woo Kang, Ju Lee

Abstract:

Rotor of Spoke-Type PMSM is divided into permanent magnet and rotor core. Moreover, rotor core is composed of pole-piece, Bridge and rib. Piece between the permanent magnet N and S poles is pole-piece. Bridge and rib hold pole-piece. In the case of pole-piece and bridge, it is essential structure of Spoke-Type PMSM. However, Rib can be selected by the designer depending on the operating conditions and constraints. If rib is present in the rotor, rib which acts in the leak path generates a leakage flux. Although the leakage flux reduces the torque in low speed, it expands speed range in high speed. So, there is a relationship of trade off. Viewed from the standpoint of permanent magnet demagnetization, since the magnetic flux by the stator winding leaks to the rib, it is an advantage. In addition, rib affects the safety factor of the rotor. For application required high speed operation, since the securing the safety factor of the rotor is important, rib structure is advantageous. On the other hand, in the case of the application that does not require high speed operation, it is desirable to increase the output power by designing without rib. In this paper, Effects on rib structure is analyzed in detail and this paper provides designer with information about rotor design of spoke-type PMSM according to rib structure.

Keywords: spoke-Type PMSM, rotor shape, rib, operation range

Procedia PDF Downloads 400
4277 Finite Element Analysis of the Blanking and Stamping Processes of Nuclear Fuel Spacer Grids

Authors: Rafael Oliveira Santos, Luciano Pessanha Moreira, Marcelo Costa Cardoso

Abstract:

Spacer grid assembly supporting the nuclear fuel rods is an important concern in the design of structural components of a Pressurized Water Reactor (PWR). The spacer grid is composed by springs and dimples which are formed from a strip sheet by means of blanking and stamping processes. In this paper, the blanking process and tooling parameters are evaluated by means of a 2D plane-strain finite element model in order to evaluate the punch load and quality of the sheared edges of Inconel 718 strips used for nuclear spacer grids. A 3D finite element model is also proposed to predict the tooling loads resulting from the stamping process of a preformed Inconel 718 strip and to analyse the residual stress effects upon the spring and dimple design geometries of a nuclear spacer grid.

Keywords: blanking process, damage model, finite element modelling, inconel 718, spacer grids, stamping process

Procedia PDF Downloads 314
4276 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 233
4275 The Comparison of Physical Fitness across Age and Gender in the Lithuanian Primary School Students: Population-Based Cross-Sectional Study

Authors: Arunas Emeljanovas, Brigita Mieziene, Vida Cesnaitiene, Ingunn Fjortoft, Lise Kjonniksen

Abstract:

Background: Gender differences in physical fitness were tracked in many studies with lower effect in preschool children and increasing difference among genders across age. In Lithuania, on a population level, secular trends in physical fitness were regularly observed each ten years for the last two decades for 11-18 years old students. However, there is apparently a lack of such epidemiological studies among primary school students. Assessing and monitoring physical fitness from an early age is of particular importance seeking to develop and strengthen physical abilities of youths for future health benefits. The goal of the current study was to indicate age and gender differences in anthropometric measures, musculoskeletal, motor and cardiorespiratory fitness in Lithuanian primary school children. Methods: The study included 3456 1-4th grade students from 6 to 10 years. The data reliably represents the population of primary school children in Lithuania. Among them, 1721 (49.8 percent) were boys. Physical fitness was measured by the 9-item test battery, developed by Fjørtoft and colleagues (2011). Height and weight were measured and body mass index was calculated. Student t test evaluated differences in physical fitness between boys and girls, ANOVA was performed to indicate differences across age. Results: All anthropometric and fitness means that were identified as significantly different were better in boys than in girls and in older than younger students (p < .05). Among anthropometric measures, height was higher in boys aged 7 through 9 years. Weight and BMI differed among boys and girls only at 8 years old. Means of height and weight increased significantly across all ages. Among musculoskeletal fitness tests, means of standing broad jump, throwing a tennis ball and pushing a medicine ball were different between genders within each age group and across all ages. Differences between genders were less likely in motor fitness than in musculoskeletal or cardiorespiratory fitness. Differences in means of shuttle run 10 x 5 test between genders occurred at age 6, 9 and 10 years; running 20 m at age 6 and 9 years, and climbing wall bars at age 9 and 10. Means of Reduced Cooper test representing cardiorespiratory fitness were different between genders within each age group but did not differ among age 6 and 8 as well as 7 and 8 years in boys, and among age 7 and 8 years in girls. Conclusion: In general, the current study confirms gender differences in musculoskeletal, motor and cardiorespiratory fitness found in other studies across the world in primary school and older children. Observed gender differences might be explained by higher physical activity in boys rather than girls. As it is explained by previous literature, older boys and girls had better performances than younger ones, because of the components of fitness change as a function of growth, maturation, development, and interactions among the three processes.

Keywords: primary school children, motor fitness, musculoskeletal fitness, cardiovascular fitness

Procedia PDF Downloads 179
4274 Transformation of Potato, Plantain, Banana to Flour in Order to Enhance Sustainable Development and Promote Local Consumption

Authors: Munu Fritz-Austin Ndam

Abstract:

Although the Cameroonian system of farming is considered as the first generation, the primary actors here involved have not yet understood the meaning of adding value to the product or produce they produce. The challenge here is for everyone who practices agriculture as an income generating activity in Cameroon to be able to understand the concept of value-added products and to know how to go about it. Recent studies have shown that these farmers who depend on agriculture as their main income generation activity make a great loss out of it because they don’t have the means to either transport their produce to the appropriate market, they don’t the knowledge on how to transform it, or they don’t have a means of conserving the product for a longer duration. It is important to note that after a thorough evaluation of the activity carried out, the final added value product sold is of great benefit not only to the producer but the buyer and the population at large. In my proposed prestation, I will discuss how the transformation activity will have a positive impact on the lives of farmers and the buyers and, most importantly, describe the methodology and procedure which is followed before the tubers (banana, Plantain, potato)is transformed into the finished or semi-finished product.

Keywords: transformation, sustainability, development, consumption

Procedia PDF Downloads 71
4273 Influence of Biological and Chemical Fertilizers on Quantitative Characteristics of Sweet Wormwood

Authors: Anahita Yarahmadi, Nazanin Mahboobi, Nahid Sadat Rahmatpour Nori, Mohammad Hossein Bijeh Keshavarzi, Mohammad Javad Shakori

Abstract:

This research aimed at considering biological fertilizer effect and chemical fertilizer on the quantitative characteristics of Sweet wormwood (Artemisia annua L.), an experiment was carried out in factorial design in completely randomized design with 4 replications in an experimental greenhouse which was located in Tehran. Experimental treatment involved chemical fertilizers (Nitrogen, Phosphorus) in4 levels and biological fertilizers in 4 levels (control, Nitroxin, Bio-phosphorus and Vemricompost). Results showed that using biological fertilizers and increasing different levels of chemical fertilizers (N, P) had significant effects on all the characteristics. Considering means comparison showed that biological fertilizers lead to significant enhancement on all the characteristics and among biological fertilizers, Vermicompost treatment has the most effect. Considering means comparison tables of different levels of chemical fertilizer have been found that (N80P80) had the most increase on characteristics.

Keywords: Artemisia annua L, bio-fertilizer, chemical fertilizer, vermicompost

Procedia PDF Downloads 423
4272 The Application of Video Segmentation Methods for the Purpose of Action Detection in Videos

Authors: Nassima Noufail, Sara Bouhali

Abstract:

In this work, we develop a semi-supervised solution for the purpose of action detection in videos and propose an efficient algorithm for video segmentation. The approach is divided into video segmentation, feature extraction, and classification. In the first part, a video is segmented into clips, and we used the K-means algorithm for this segmentation; our goal is to find groups based on similarity in the video. The application of k-means clustering into all the frames is time-consuming; therefore, we started by the identification of transition frames where the scene in the video changes significantly, and then we applied K-means clustering into these transition frames. We used two image filters, the gaussian filter and the Laplacian of Gaussian. Each filter extracts a set of features from the frames. The Gaussian filter blurs the image and omits the higher frequencies, and the Laplacian of gaussian detects regions of rapid intensity changes; we then used this vector of filter responses as an input to our k-means algorithm. The output is a set of cluster centers. Each video frame pixel is then mapped to the nearest cluster center and painted with a corresponding color to form a visual map. The resulting visual map had similar pixels grouped. We then computed a cluster score indicating how clusters are near each other and plotted a signal representing frame number vs. clustering score. Our hypothesis was that the evolution of the signal would not change if semantically related events were happening in the scene. We marked the breakpoints at which the root mean square level of the signal changes significantly, and each breakpoint is an indication of the beginning of a new video segment. In the second part, for each segment from part 1, we randomly selected a 16-frame clip, then we extracted spatiotemporal features using convolutional 3D network C3D for every 16 frames using a pre-trained model. The C3D final output is a 512-feature vector dimension; hence we used principal component analysis (PCA) for dimensionality reduction. The final part is the classification. The C3D feature vectors are used as input to a multi-class linear support vector machine (SVM) for the training model, and we used a multi-classifier to detect the action. We evaluated our experiment on the UCF101 dataset, which consists of 101 human action categories, and we achieved an accuracy that outperforms the state of art by 1.2%.

Keywords: video segmentation, action detection, classification, Kmeans, C3D

Procedia PDF Downloads 51
4271 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability

Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi

Abstract:

There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitization

Keywords: cybersecurity, supply chain methodology, secure substation, digitization

Procedia PDF Downloads 43
4270 Nonlinear Finite Element Analysis of Composite Cantilever Beam with External Prestressing

Authors: R. I. Liban, N. Tayşi

Abstract:

This paper deals with a nonlinear finite element analysis to examine the behavior up to failure of cantilever composite steel-concrete beams which are prestressed externally. 'Pre-' means stressing the high strength external tendons in the steel beam section before the concrete slab is added. The composite beam contains a concrete slab which is connected together with steel I-beam by means of perfect shear connectors between the concrete slab and the steel beam which is subjected to static loading. A finite element analysis will be done to study the effects of external prestressed tendons on the composite steel-concrete beams by locating the tendons in different locations (profiles). ANSYS version 12.1 computer program is being used to analyze the represented three-dimensional model of the cantilever composite beam. This model gives all these outputs, mainly load-displacement behavior of the cantilever end and in the middle span of the simple support part.

Keywords: composite steel-concrete beams, external prestressing, finite element analysis, ANSYS

Procedia PDF Downloads 289
4269 Artificial Intelligent Methodology for Liquid Propellant Engine Design Optimization

Authors: Hassan Naseh, Javad Roozgard

Abstract:

This paper represents the methodology based on Artificial Intelligent (AI) applied to Liquid Propellant Engine (LPE) optimization. The AI methodology utilized from Adaptive neural Fuzzy Inference System (ANFIS). In this methodology, the optimum objective function means to achieve maximum performance (specific impulse). The independent design variables in ANFIS modeling are combustion chamber pressure and temperature and oxidizer to fuel ratio and output of this modeling are specific impulse that can be applied with other objective functions in LPE design optimization. To this end, the LPE’s parameter has been modeled in ANFIS methodology based on generating fuzzy inference system structure by using grid partitioning, subtractive clustering and Fuzzy C-Means (FCM) clustering for both inferences (Mamdani and Sugeno) and various types of membership functions. The final comparing optimization results shown accuracy and processing run time of the Gaussian ANFIS Methodology between all methods.

Keywords: ANFIS methodology, artificial intelligent, liquid propellant engine, optimization

Procedia PDF Downloads 544
4268 ANA Negative but FANA Positive Patients with Clinical Symptoms of Rheumatic Disease: The Suggestion for Clinicians

Authors: Abdolreza Esmaeilzadeh, Mehri Mirzaei

Abstract:

Objective: Rheumatic disease is a chronic disease that causes pain, stiffness, swelling and limited motion and function of many joints. RA is the most common form of autoimmune arthritis, affecting more than 1.3 million Americans. Of these, about 75% are women. Materials and Methods: This study was formed due to the misconception about ANA test, which is frequently performed with methods based upon solid phase as ELISA. This experiment was conducted on 430 patients, with clinical symptoms that are likely affected with rheumatic diseases, simultaneously by means of ANA and FANA. Results: 36 cases (8.37%) of patients, despite positive ANA, have demonstrated negative results via Indirect Immunofluorescence Assay (IIFA), (false positive). 116 cases (27%) have demonstrated negative ANA results, by means of the ELISA technique, although they had positive IIFA results. Conclusion: Other advantages of IIFA are antibody titration and specific pattern detection that have the capability of distinguishing positive dsDNA results. According to the restrictions and false negative cases, in patients, IIFA test is highly recommended for these disease's diagnosis.

Keywords: autoimmune disease, IIFA, EIA, rheumatic disease

Procedia PDF Downloads 477
4267 Non-Local Simultaneous Sparse Unmixing for Hyperspectral Data

Authors: Fanqiang Kong, Chending Bian

Abstract:

Sparse unmixing is a promising approach in a semisupervised fashion by assuming that the observed pixels of a hyperspectral image can be expressed in the form of linear combination of only a few pure spectral signatures (end members) in an available spectral library. However, the sparse unmixing problem still remains a great challenge at finding the optimal subset of endmembers for the observed data from a large standard spectral library, without considering the spatial information. Under such circumstances, a sparse unmixing algorithm termed as non-local simultaneous sparse unmixing (NLSSU) is presented. In NLSSU, the non-local simultaneous sparse representation method for endmember selection of sparse unmixing, is used to finding the optimal subset of endmembers for the similar image patch set in the hyperspectral image. And then, the non-local means method, as a regularizer for abundance estimation of sparse unmixing, is used to exploit the abundance image non-local self-similarity. Experimental results on both simulated and real data demonstrate that NLSSU outperforms the other algorithms, with a better spectral unmixing accuracy.

Keywords: hyperspectral unmixing, simultaneous sparse representation, sparse regression, non-local means

Procedia PDF Downloads 215
4266 Emerging Challenges Related to Digital Pedagogy: A Practitioners’ Case

Authors: Petronella Jonck, Martin Chanza, Anna-Marie Pelser

Abstract:

Ascribed to the global pandemic most higher education institutions responded by relocating content presented by means of contact sessions to an online platform giving rise to digital pedagogy. The purpose of the research reported on was to explore emerging challenges linked to digital pedagogy from a practitioner stance. Digital pedagogy has emerged as a powerful tool to compliment traditional methods. However, stumbling blocks should be identified and addressed for future utilization. A qualitative research design was implemented by means of a semi-structured interview schedule distributed to practitioners during the COVID-19 pandemic. Results revealed that institutional type influenced the implementation of digital pedagogy. Other challenges relate to the increased cost of education, decreased access, limited knowledge about digital pedagogy, behavioral intent to adopt a multi-modal approach, lack of ICT infrastructure to mention a few. Higher education institutions should address challenges towards the optimal use of digital pedagogy in future.

Keywords: COVID-19, digital pedagogy, higher education institutions, information communication technology

Procedia PDF Downloads 97
4265 Personal Characteristics Related to Hasty Behaviour in Korea

Authors: Sun Jin Park, Kyung-Ja Cho

Abstract:

This study focused on characteristics related to hasty behaviour. To investigate the relation between personal characteristics and hasty behaviour, 601 data were collected, 335 males and 256 females answered their own 'social avoidance and distress’, ‘anxiety’, ‘sensation seeking', 'hope', and ' hasty behaviour. And then 591 data were used for the analysis. The factor analysis resulted hasty behaviour consisted of 5 factors, time pressure, isolation, uncomfortable situation, boring condition, and expectation of reward. The result showed anxiety, sensation seeking, and hope related to hasty behaviour. Specifically, anxiety was involved in every hasty behaviour. This result means that psychological tension and worry are related to hasty behaviour in common. 'Social avoidance and distress', 'sensation seeking' and 'hope' influenced on hasty behaviour under time pressure, in isolation, in expectation of rewards respectively. This means that each factor of hasty behaviour has anxiety as its basis, expressed through a varied nature.

Keywords: hasty behaviour, social avoidance and distress, anxiety, sensation seeking, hope

Procedia PDF Downloads 291
4264 Testing of Small Local Zones by Means of Small Punch Test at Room and Creep Temperatures

Authors: Vaclav Mentl, Josef Volak

Abstract:

In many industrial applications, materials are subjected to degradation of mechanical properties as a result of real service conditions, temperature, cyclic loading, humidity or other corrosive media, irradiation, their combination etc. The assessment of the remaining lifetime of components and structures is commonly based on correlated procedures including numerous destructive, non-destructive and mathematical techniques that should guarantee reasonably precise assessment of the current damage extent of materials in question and the remaining lifetime evaluation of the component under consideration. The answers to demands of customers to extend the lifetime of existing components beyond their original design life must be based on detailed assessment of the current degradation extent, what can be rarely realised by means of traditional mechanical (standardised) tests that need relatively large volumes of representative material for the test specimen manufacturing. This fact accelerated the research of miniaturised test specimen that can be sampled non-invasively from the component.

Keywords: small punch test, correlation, creep, mechanical properties

Procedia PDF Downloads 252
4263 Site Suitability Analysis for Multipurpose Dams Using Geospatial Technologies

Authors: Saima Iftikhar Rida Shabbir, Zeeshan Hassan

Abstract:

Water shortage, energy crisis and natural misfortunes are the glitches which reduce the efficacy of agricultural ecosystems especially in Pakistan where these are more frequent besides being intense. Accordingly, the agricultural water resources, food security and country’s economy are at risk. To address this, we have used Geospatial techniques incorporating ASTER Global DEM, Geological map, rainfall data, discharge data, Landsat 5 image of Swat valley in order to assess the viability of selected sites. The sites have been studied via GIS tools, Hydrological investigation and multiparametric analysis for their potentialities of collecting and securing the rain water; regulating floods by storing the surplus water bulks by check dams and developing them for power generation. Our results showed that Siat1-1 was very useful for low-cost dam with main objective of as Debris dam; Site-2 and Site 3 were check dams sites having adequate storing reservoir so as to arrest the inconsistent flow accompanied by catering the sedimentation effects and the debris flows; Site 4 had a huge reservoir capacity but it entails enormous edifice cost over very great flood plain. Thus, there is necessity of active Hydrological developments to estimate the flooded area using advanced and multifarious GIS and remote sensing approaches so that the sites could be developed for harnessing those sites for agricultural and energy drives.

Keywords: site suitability, check dams, SHP, terrain analysis, volume estimation

Procedia PDF Downloads 287
4262 Forecasting Unusual Infection of Patient Used by Irregular Weighted Point Set

Authors: Seema Vaidya

Abstract:

Mining association rule is a key issue in data mining. In any case, the standard models ignore the distinction among the exchanges, and the weighted association rule mining does not transform on databases with just binary attributes. This paper proposes a novel continuous example and executes a tree (FP-tree) structure, which is an increased prefix-tree structure for securing compacted, discriminating data about examples, and makes a fit FP-tree-based mining system, FP enhanced capacity algorithm is used, for mining the complete game plan of examples by illustration incessant development. Here, this paper handles the motivation behind making remarkable and weighted item sets, i.e. rare weighted item set mining issue. The two novel brightness measures are proposed for figuring the infrequent weighted item set mining issue. Also, the algorithm are handled which perform IWI which is more insignificant IWI mining. Moreover we utilized the rare item set for choice based structure. The general issue of the start of reliable definite rules is troublesome for the grounds that hypothetically no inciting technique with no other person can promise the rightness of influenced theories. In this way, this framework expects the disorder with the uncommon signs. Usage study demonstrates that proposed algorithm upgrades the structure which is successful and versatile for mining both long and short diagnostics rules. Structure upgrades aftereffects of foreseeing rare diseases of patient.

Keywords: association rule, data mining, IWI mining, infrequent item set, frequent pattern growth

Procedia PDF Downloads 380
4261 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis

Authors: Sarthak Mishra, Astha Sinha

Abstract:

There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.

Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats

Procedia PDF Downloads 199
4260 A Segmentation Method for Grayscale Images Based on the Firefly Algorithm and the Gaussian Mixture Model

Authors: Donatella Giuliani

Abstract:

In this research, we propose an unsupervised grayscale image segmentation method based on a combination of the Firefly Algorithm and the Gaussian Mixture Model. Firstly, the Firefly Algorithm has been applied in a histogram-based research of cluster means. The Firefly Algorithm is a stochastic global optimization technique, centered on the flashing characteristics of fireflies. In this context it has been performed to determine the number of clusters and the related cluster means in a histogram-based segmentation approach. Successively these means are used in the initialization step for the parameter estimation of a Gaussian Mixture Model. The parametric probability density function of a Gaussian Mixture Model is represented as a weighted sum of Gaussian component densities, whose parameters are evaluated applying the iterative Expectation-Maximization technique. The coefficients of the linear super-position of Gaussians can be thought as prior probabilities of each component. Applying the Bayes rule, the posterior probabilities of the grayscale intensities have been evaluated, therefore their maxima are used to assign each pixel to the clusters, according to their gray-level values. The proposed approach appears fairly solid and reliable when applied even to complex grayscale images. The validation has been performed by using different standard measures, more precisely: the Root Mean Square Error (RMSE), the Structural Content (SC), the Normalized Correlation Coefficient (NK) and the Davies-Bouldin (DB) index. The achieved results have strongly confirmed the robustness of this gray scale segmentation method based on a metaheuristic algorithm. Another noteworthy advantage of this methodology is due to the use of maxima of responsibilities for the pixel assignment that implies a consistent reduction of the computational costs.

Keywords: clustering images, firefly algorithm, Gaussian mixture model, meta heuristic algorithm, image segmentation

Procedia PDF Downloads 192
4259 Switched System Diagnosis Based on Intelligent State Filtering with Unknown Models

Authors: Nada Slimane, Foued Theljani, Faouzi Bouani

Abstract:

The paper addresses the problem of fault diagnosis for systems operating in several modes (normal or faulty) based on states assessment. We use, for this purpose, a methodology consisting of three main processes: 1) sequential data clustering, 2) linear model regression and 3) state filtering. Typically, Kalman Filter (KF) is an algorithm that provides estimation of unknown states using a sequence of I/O measurements. Inevitably, although it is an efficient technique for state estimation, it presents two main weaknesses. First, it merely predicts states without being able to isolate/classify them according to their different operating modes, whether normal or faulty modes. To deal with this dilemma, the KF is endowed with an extra clustering step based fully on sequential version of the k-means algorithm. Second, to provide state estimation, KF requires state space models, which can be unknown. A linear regularized regression is used to identify the required models. To prove its effectiveness, the proposed approach is assessed on a simulated benchmark.

Keywords: clustering, diagnosis, Kalman Filtering, k-means, regularized regression

Procedia PDF Downloads 152
4258 Fixing the Identity Gap in Fashion: Magazines' Role in Consumption of Clothes

Authors: Kateryna Pilyarchuk

Abstract:

A dress has, since times immemorial, been used to communicate the wearer’s identity. When a new trend is born, fashionistas buy it not only with the purpose to beautify themselves, but also to acquire the collective identity. Fashion has become a means of narrating one’s stance and status. Thus, when one spends money on a brand, one pays for some unmaterial components associated with it. This paper will present some ways in which fashion magazines promote consumerism by drawing on women’s craving for collective identity and need to fill in their identity gap by means of a purchase. By applying the method of critical discursive psychology, it will present layers of ideology and positions that become visible in framing of the message in U.S. Harper’s Bazaar. In this context, fashion decisions that are presented to its readers will be critically evaluated from the gender perspective. It will be demonstrated that what is presented as a postfeminist choice in the neoliberal society is still, to a considerable extent, oppressive and driven by the male gaze. As the findings show, the contemporary female identities in fashion are still built on the principles of traditional femininity. Magazines and fashion discourse train women that they should fear being left out of fashion and, by extension, out of the category of the sexually appealing (from the male perspective).

Keywords: collective identity, critical discursive psychology, fashion discourse, identity gap

Procedia PDF Downloads 126
4257 Mineral Deposits in Spatial Planning Systems – Review of European Practices

Authors: Alicja Kot-Niewiadomska

Abstract:

Securing sustainable access to raw materials is vital for the growth of the European economy and for the goals laid down in Strategy Europe 2020. One of the most important sources of mineral raw materials are primary deposits. The efficient management of them, including extraction, will ensure competitiveness of the European economy. A critical element of this approach is mineral deposits safeguarding and the most important tool - spatial planning. The safeguarding of deposits should be understood as safeguarding of land access, and safeguarding of area against development, which may (potential) prevent the use of the deposit and the necessary mining activities. Many European Union countries successfully integrated their mineral policy and spatial policy, which has ensured the proper place of mineral deposits in their spatial planning systems. These, in turn, are widely recognized as the most important mineral deposit safeguarding tool, the essence of which is to ensure long-term access to its resources. The examples of Austria, Portugal, Slovakia, Czech Republic, Sweden, and the United Kingdom, discussed in the paper, are often mentioned as examples of good practices in this area. Although none of these countries managed to avoid cases of social and environmental conflicts related to mining activities, the solutions they implement certainly deserve special attention. And for many countries, including Poland, they can be a potential source of solutions aimed at improving the protection of mineral deposits.

Keywords: mineral deposits, land use planning, mineral deposit safeguarding, European practices

Procedia PDF Downloads 147
4256 Markov Characteristics of the Power Line Communication Channels in China

Authors: Ming-Yue Zhai

Abstract:

Due to the multipath and pulse noise nature, power line communications(PLC) channel can be modelled as a memory one with the finite states Markov model(FSMC). As the most important parameter modelling a Markov channel,the memory order in an FSMC is not solved in PLC systems yet. In the paper, the mutual information is used as a measure of the dependence between the different symbols, treated as the received SNA or amplitude of the current channel symbol or that of previous symbols. The joint distribution probabilities of the envelopes in PLC systems are computed based on the multi-path channel model, which is commonly used in PLC. we confirm that given the information of the symbol immediately preceding the current one, any other previous symbol is independent of the current one in PLC systems, which means the PLC channels is a Markov chain with the first-order. The field test is also performed to model the received OFDM signals with the help of AR model. The results show that the first-order AR model is enough to model the fading channel in PLC systems, which means the amount of uncertainty remaining in the current symbol should be negligible, given the information corresponding to the immediately preceding one.

Keywords: power line communication, channel model, markovian, information theory, first-order

Procedia PDF Downloads 383
4255 High-Fidelity 1D Dynamic Model of a Hydraulic Servo Valve Using 3D Computational Fluid Dynamics and Electromagnetic Finite Element Analysis

Authors: D. Henninger, A. Zopey, T. Ihde, C. Mehring

Abstract:

The dynamic performance of a 4-way solenoid operated hydraulic spool valve has been analyzed by means of a one-dimensional modeling approach capturing flow, magnetic and fluid forces, valve inertia forces, fluid compressibility, and damping. Increased model accuracy was achieved by analyzing the detailed three-dimensional electromagnetic behavior of the solenoids and flow behavior through the spool valve body for a set of relevant operating conditions, thereby allowing the accurate mapping of flow and magnetic forces on the moving valve body, in lieu of representing the respective forces by lower-order models or by means of simplistic textbook correlations. The resulting high-fidelity one-dimensional model provided the basis for specific and timely design modification eliminating experimentally observed valve oscillations.

Keywords: dynamic performance model, high-fidelity model, 1D-3D decoupled analysis, solenoid-operated hydraulic servo valve, CFD and electromagnetic FEA

Procedia PDF Downloads 152
4254 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 79
4253 Transfer of Information Heritage between Algerian Veterinarians and Breeders: Assessment of Information and Communication Technology Using Mobile Phone

Authors: R. Bernaoui, P. Ohly

Abstract:

Our research shows the use of the mobile phone that consolidates the relationship between veterinarians, and that between breeders and veterinarians. On the other hand it asserts that the tool in question is a means of economic development. The results of our survey reveal a positive return to the veterinary community, which shows that the mobile phone has become an effective means of sustainable development through the transfer of a rapid and punctual information inheritance via social networks; including many Internet applications. Our results show that almost all veterinarians use the mobile phone for interprofessional communication. We therefore believe that the use of the mobile phone by livestock operators has greatly improved the working conditions, just as the use of this tool contributes to a better management of the exploitation as long as it allows limit travel but also save time. These results show that we are witnessing a growth in the use of mobile telephony technologies that impact is as much in terms of sustainable development. Allowing access to information, especially technical information, the mobile phone, and Information and Communication of Technology (ICT) in general, give livestock sector players not only security, by limiting losses, but also an efficiency that allows them a better production and productivity.

Keywords: algeria, breeder-veterinarian, digital heritage, networking

Procedia PDF Downloads 99