Search results for: boot
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14

Search results for: boot

14 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 139
13 Velma-ARC’s Rehabilitation of Repentant Cybercriminals in Nigeria

Authors: Umukoro Omonigho Simon, Ashaolu David ‘Diya, Aroyewun-Olaleye Temitope Folashade

Abstract:

The VELMA Action to Reduce Cybercrime (ARC) is an initiative, the first of its kind in Nigeria, designed to identify, rehabilitate and empower repentant cybercrime offenders popularly known as ‘yahoo boys’ in Nigerian parlance. Velma ARC provides social inclusion boot camps with the goal of rehabilitating cybercriminals via psychotherapeutic interventions, improving their IT skills, and empowering them to make constructive contributions to society. This report highlights the psychological interventions provided for participants of the maiden edition of the Velma ARC boot camp and presents the outcomes of these interventions. The boot camp was set up in a hotel premises which was booked solely for the 1 month event. The participants were selected and invited via the Velma online recruitment portal based on an objective double-blind selection process from a pool of potential participants who signified interest via the registration portal. The participants were first taken through psychological profiling (personality, symptomology and psychopathology) before the individual and group sessions began. They were profiled using the Minnesota Multiphasic Personality Inventory -2- Restructured Form (MMPI-2-RF), the latest version of its series. Individual psychotherapy sessions were conducted for all participants based on what was interpreted on their profiles. Focus group discussion was held later to discuss a movie titled ‘catch me if you can’ directed by Steven Spielberg, featuring Leonardo De Caprio and Tom Hanks. The movie was based on the true life story of Frank Abagnale, who was a notorious scammer and con artist in his youthful years. Emergent themes from the movie were discussed as psycho-educative parameters for the participants. The overall evaluation of outcomes from the VELMA ARC rehabilitation boot camp stemmed from a disaggregated assessment of observed changes which are summarized in the final report of the clinical psychologist and was detailed enough to infer genuine repentance and positive change in attitude towards cybercrime among the participants. Follow up services were incorporated to validate initial observations. This gives credence to the potency of the psycho-educative intervention provided during the Velma ARC boot camp. It was recommended that support and collaborations from the government and other agencies/individuals would assist the VELMA foundation in expanding the scope and quality of the Velma ARC initiative as an additional requirement for cybercrime offenders following incarceration.

Keywords: Velma-ARC, cybercrime offenders, rehabilitation, Nigeria

Procedia PDF Downloads 114
12 Finite Element Analysis of Ball-Joint Boots under Environmental and Endurance Tests

Authors: Young-Doo Kwon, Seong-Hwa Jun, Dong-Jin Lee, Hyung-Seok Lee

Abstract:

Ball joints support and guide certain automotive parts that move relative to the frame of the vehicle. Such ball joints are covered and protected from dust, mud, and other interfering materials by ball-joint boots made of rubber—a flexible and near-incompressible material. The boots may experience twisting and bending deformations because of the motion of the joint arm. Thus, environmental and endurance tests of ball-joint boots apply both bending and twisting deformations. In this study, environmental and endurance testing was simulated via the finite element method performed by using a commercial software package. The ranges of principal stress and principal strain values that are known to directly affect the fatigue lives of the parts were sought. By defining these ranges, the number of iterative tests and modifications of the materials and dimensions of the boot can be decreased. Therefore, instead of performing actual part tests, manufacturers can perform standard fatigue tests in trials of different materials by applying only the defined range of stress or strain values.

Keywords: boot, endurance tests, rubber, FEA

Procedia PDF Downloads 234
11 Effect of Positive Psychology (PP) Interventions on College Students’ Well-Being, Career Stress and Coronavirus Anxiety

Authors: Erva Kaygun

Abstract:

The purpose of this research is to investigate the effects of positive psychology interventions on college students' positive-negative emotions, coronavirus anxiety, and career stress. 4 groups of college students are compared in terms of the level of exposure to PP constructs ( Non-Psychology, Psychology, Positive Psychology Course, and Positive Psychology Boot Camp). In this research, Pearson Correlation, independent t-tests, ANOVA, and Post-Hoc tests are conducted. Without being significant, the groups exposed to PP constructs showed higher positive emotions and total PERMA scores, whereas negative emotions, career stress, and coronavirus stress remained similar. It is crucial to indicate that career stress is higher among all psychology students when compared to non-psychology students. The results showed that the highest exposure group (PP Boot Camp) showed no difference in negative emotions, whereas higher PERMA scores and positive emotion scores were on the Positive and Negative Affect Schedule (PANAS) scale.

Keywords: positive psychology, college students, well being, anxiety

Procedia PDF Downloads 160
10 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 186
9 Malware Detection in Mobile Devices by Analyzing Sequences of System Calls

Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes.

Keywords: android, information security, intrusion detection systems, malware, mobile devices

Procedia PDF Downloads 266
8 Analysis of Latest Fitness Trends in India

Authors: Amita Rana

Abstract:

From the ancient to modern times, the nature of fitness activities has varied. We can choose any form of exercise that is suitable for our particular need. Watchers of fitness trends say that the road to better health is paved with new possibilities along with some old ones that are poised to make a comeback. Educated, certified and experienced fitness professionals; strength training; fitness programmes for older adults; exercise and weight loss; children and obesity; personal training; core training; group personal training; Zumba and other dance workouts; functional fitness; yoga; comprehensive health promotion programmes at worksite; boot-camp; outdoor activities; reaching new markets; spinning; sport-specific training; worker incentive programmes; wellness coaching; and physician referrals are among the fitness trends included in worldwide surveys. However, trends related to fitness in India could be the same or different. Hence, the present paper makes an attempt to analyze the latest fitness trends in India. A total of eighteen (18) surveys were shortlisted on the basis of their relevance to the present topic of study and were arranged in descending order of their chronology. Content analysis was done after the preliminary set of data collection, which formed the basis of a group of data. Further, frequency and percentage were used to statistically represent the data. It can be concluded from the analysis of data regarding recent fitness trends in India that yoga dominates the fitness activity list, followed by numerous other activities including running, Zumba and sh’bam, boot camp, boxing, kickboxing, cycling, swimming, TRX, ass-pocalypse, ballet, biking, bokwa fitness, dance-iso-bic, masala bhangra, outdoor activities, pilates, planks, push-ups, sofa workouts, stairs Workouts, tabata training, and twerking. The body weight/ gym-specified/ strength training as well as high intensity interval training dominate the preferred workouts; followed by mixed work-outs, cross training work-outs, express work-outs, functional fitness, natural body movements, personalized training, and stay-at-home workouts. General areas that featured in the latest fitness trends in India demonstrates that the fitness is making an impact on all sections of the society be it children, women, older adults, senior citizens, worksite fitness. Fitness is becoming the lifestyle of the masses. People are doing exercise for weight-loss, combining diet with exercising; prefer sweating, making groups participate in fitness activities and wellness programmes. Technology is another area which has a high impact on the lives of people. They are using wearable technology for workout tracking and following numerous mobile friendly apps.

Keywords: fitness, India, survey, trend

Procedia PDF Downloads 285
7 CPU Architecture Based on Static Hardware Scheduler Engine and Multiple Pipeline Registers

Authors: Ionel Zagan, Vasile Gheorghita Gaitan

Abstract:

The development of CPUs and of real-time systems based on them made it possible to use time at increasingly low resolutions. Together with the scheduling methods and algorithms, time organizing has been improved so as to respond positively to the need for optimization and to the way in which the CPU is used. This presentation contains both a detailed theoretical description and the results obtained from research on improving the performances of the nMPRA (Multi Pipeline Register Architecture) processor by implementing specific functions in hardware. The proposed CPU architecture has been developed, simulated and validated by using the FPGA Virtex-7 circuit, via a SoC project. Although the nMPRA processor hardware structure with five pipeline stages is very complex, the present paper presents and analyzes the tests dedicated to the implementation of the CPU and of the memory on-chip for instructions and data. In order to practically implement and test the entire SoC project, various tests have been performed. These tests have been performed in order to verify the drivers for peripherals and the boot module named Bootloader.

Keywords: hardware scheduler, nMPRA processor, real-time systems, scheduling methods

Procedia PDF Downloads 237
6 An Extra-Curricular Program to Enhance Student Outcome of a Class

Authors: Dong Jin Kang

Abstract:

Application of single board microcontrollers is an important skill even for non-electronic engineering major students. Arduino board is widely utilized in engineering classes of the Yeungnam University of South Korea. In those classes, students are subjected to learn how to use various sensor components related to motion, sound, light, and so on as well as physical quantities. Students are grouped into several teams, and each team consists of 4~5 students. Many students are not motivated enough to learn those skills. An extracurricular program was planned to improve this problem. The extracurricular program was held as an international boot camp where students from three different countries were invited to participate. 10 students groups were formed, and each team was consisted of students having different nationality. The camp was 4 days long and wrapped up with competitions. During the camp, every student was assigned to design and make a two wheel robot. The competition was carried out in two different areas; individual and group performances. As most skills dealt in the class are used to build the robot, students are much motivated to review the whole subjects of the class. All students were surveyed after the program. The survey shows that the skills studied in the class are greatly improved, and practically understood. Staying at the dormitory and teaming with international students are help students improve communication skills. Competition at the camp was found as a key element to inspire and attract students for voluntary participation.

Keywords: extracurricular program, robot, Arduino board, international camp, competition

Procedia PDF Downloads 185
5 Dietary Vitamin D Intake and the Bladder Cancer Risk: A Pooled Analysis of Prospective Cohort Studies

Authors: Iris W. A. Boot, Anke Wesselius, Maurice P. Zeegers

Abstract:

Diet may play an essential role in the aetiology of bladder cancer (BC). Vitamin D is involved in various biological functions which have the potential to prevent BC development. Besides, vitamin D also influences the uptake of calcium and phosphorus , thereby possibly indirectly influencing the risk of BC. The aim of the present study was to investigate the relation between vitamin D intake and BC risk. Individual dietary data were pooled from three cohort studies. Food item intake was converted to daily intakes of vitamin D, calcium and phosphorus. Pooled multivariate hazard ratios (HRs), with corresponding 95% confidence intervals (CIs) were obtained using Cox-regression models. Analyses were adjusted for gender, age and smoking status (Model 1), and additionally for the food groups fruit, vegetables and meat (Model 2). Dose–response relationships (Model 1) were examined using a nonparametric test for trend. In total, 2,871 cases and 522,364 non-cases were included in the analyses. The present study showed an overall increased BC risk for high dietary vitamin D intake (HR: 1.14, 95% CI: 1.03-1.26). A similar increase BC risk with high vitamin D intake was observed among women and for the non-muscle invasive BC subtype, (HR: 1.41, 95% CI: 1.15-1.72, HR: 1.13, 95% CI: 1.01-1.27, respectively). High calcium intake decreased the BC risk among women (HR: 0.81, 95% CI: 0.67-0.97). A combined inverse effect on BC risk was observed for low vitamin D intake and high calcium intake (HR: 0.67, 95% CI: 0.48-0.93), while a positive effect was observed for high vitamin D intake in combination with low, moderate and high phosphorus (HR: 1.31, 95% CI: 1.09-1.59, HR: 1.17, 95% CI: 1.01-1.36, HR: 1.16, 95% CI: 1.03-1.31, respectively). Combining all nutrients showed a decreased BC risk for low vitamin D intake, high calcium and moderate phosphor intake (HR: 0.37, 95% CI: 0.18-0.75), and an increased BC risk for moderate intake of all the nutrients (HR: 1.18, 95% CI: 1.02-1.38), for high vitamin D and low calcium and phosphor intake (HR: 1.28, 95% CI: 1.01-1.62), and for moderate vitamin D and calcium and high phosphorus intake (HR: 1.27, 95% CI: 1.01-1.59). No significant dose-response analyses were observed. The findings of this study show an increased BC risk for high dietary vitamin D intake and a decreased risk for high calcium intake. Besides, the study highlights the importance of examining the effect of a nutrient in combination with complementary nutrients for risk assessment. Future research should focus on nutrients in a wider context and in nutritional patterns.

Keywords: bladder cancer, nutritional oncology, pooled cohort analysis, vitamin D

Procedia PDF Downloads 52
4 Characterization of Practices among Pig Smallholders in Cambodia and Implications for Disease Risk

Authors: Phalla Miech, William Leung, Ty Chhay, Sina Vor, Arata Hidano

Abstract:

Smallholder pig farms (SPFs) are prevalent in Cambodia but are vulnerable to disease impacts, as evidenced by the recent incursion of African swine fever into the region. As part of the ‘PigFluCam+’ project, we sought to provide an updated picture of pig husbandry and biosecurity practices among SPFs in south-central Cambodia. A multi-stage sampling design was adopted to select study districts and villages within four provinces: Phnom Penh, Kandal, Takeo, and Kampong Speu. Structured interviews were conductedbetween October 2020 - May 2021 among all consenting households keeping pigs in 16 target villages. Recruited SPFs (n=176) kept 6.8 pigs on average (s.d.=7.7), with most (88%) keeping cross-bred varieties of sows (77%), growers/finishers (39%), piglets/weaners (22%), and few keeping boars (5%). Chickens (83%) and waterfowl (56%) were commonly raised and could usually contact pigs directly (79%). Pigs were the primary source of household income for 28% of participants. While pigs tended to be housed individually (40%) or in groups (33%), 13% kept pigs free-ranging/tethered. Pigs were commonly fed agricultural by-products (80%), commercial feed (60%), and, notably, household waste (59%). Under half of SPFs vaccinated their pigs (e.g., against classical swine fever, Aujesky’s, and pasteurellosis, although the target disease was often unknown). Among 20 SPFs who experienced pig morbidities/mortalities within the past 6 months, only 3 (15%) reported to animal health workers, and disease etiology was rarely known. Common biosecurity measures included nets covering pig pens (62%) and restricting access to the site/pens (46%). Boot dips (0.6%) and PPE (1.2%) were rarely used. Pig smallholdings remain an important contributor to rural livelihoods. Current practices and biosecurity challenges increase risk pathways for a range of disease threats of both local and global concern. Ethnographic studies are needed to better understand local determinants and develop context-appropriate strategies.

Keywords: smallholder production, swine, biosecurity practices, Cambodia, African swine fever

Procedia PDF Downloads 137
3 From Preoccupied Attachment Pattern to Depression: Serial Mediation Model on the Female Sample

Authors: Tatjana Stefanovic Stanojevic, Milica Tosic Radev, Aleksandra Bogdanovic

Abstract:

Depression is considered to be a leading cause of death and disability in the female population, and that is the reason why understanding the dynamics of the onset of depressive symptomatology is important. A review of the literature indicates the relationship between depressive symptoms and insecure attachment patterns, but very few studies have examined the mechanism underlying this relation. The aim of the study was to examine the pathway from the preoccupied attachment pattern to depressive symptomatology, as well as to test the mediation effect of mentalization, social anxiety and rumination in this relationship using a serial mediation model. The research was carried out on a geographical cluster sample from the general population of Serbia included within the project ‘Indicators and models of family and work roles harmonization’ funded by the Ministry of Education, Science and Technological Development of the Republic of Serbia. This research was carried out on a subsample of 791 working-age female adults from 37 urban and rural locations distributed through 20 administrative districts of Serbia. The respondents filled in a battery of instruments, including Relationship Questionnaire - Clinical Version (RQ - CV), The Mentalization Scale (MentS), Scale of Social Anxiety (SA), Patient Ruminative Thought Style Questionnaire (RTSQ), Health Questionnaire (PHQ-9). The results confirm our assumption that the total indirect effect of the preoccupied attachment pattern to depressive symptoms is significant across all mediators separately. More importantly, this effect is still present in a model with a sequential mediator relationship, where social anxiety, rumination, and mentalization were perceived as serial mediators of a relationship between preoccupied attachment and depressive symptoms (estimated indirect effect=0.004, boot-strapped 95% CI=0.002 to 0.007). Our findings suggest that there is a significant specific indirect effect of the preoccupied attachment pattern to depressive symptoms, occurring through mentalization, social anxiety and rumination, indicating that preoccupied attachment cause decrease of a self related mentalization, which in turn causes increasing of social anxiety and rumination, concluding in depressive symptoms as a final consequence. The finding that the path from the preoccupied attachment pattern to depressive symptoms is typical in women is understandable from the perspective of both evolutionary and culturally conditioned gender differences. The practical implications of the study are reflected in the recommendations for the prevention and forehand psychotherapy response among preoccupied women with depressive symptomatology. Treatment of this specific group of depressed patients should be focused on strengthening mentalization, learning to accept and to understand herself better, reducing anxiety in situations where mistakes are visible to others, and replacing the rumination strategy with more constructive coping strategies.

Keywords: preoccupied attachment, depression, serial mediation model, mentalization, rumination

Procedia PDF Downloads 111
2 Quick off the Mark with Achilles Tendon Rupture

Authors: Emily Moore, Andrew Gaukroger, Matthew Solan, Lucy Bailey, Alexandra Boxall, Andrew Carne, Chintu Gadamsetty, Charlotte Morley, Katy Western, Iwona Kolodziejczyk

Abstract:

Introduction: Rupture of the Achilles tendon is common and has a long recovery period. Most cases are managed non-operatively. Foot and Ankle Surgeons advise an ultrasound scan to check the gap between the torn ends. A large gap (with the ankle in equinus) is a relative indication for surgery. The definitive decision regarding surgical versus non-operative management can only be made once an ultrasound scan is undertaken and the patient is subsequently reviewed by a Foot and Ankle surgeon. To get to this point, the patient journey involves several hospital departments. In nearby trusts, patients reattend for a scan and go to the plaster room both before and after the ultrasound for removal and re-application of the cast. At a third visit to the hospital, the surgeon and patient discuss options for definitive treatment. It may take 2-3 weeks from the initial Emergency Department visit before the final treatment decision is made. This “wasted time” is ultimately added to the recovery period for the patient. In this hospital, Achilles rupture patients are seen in a weekly multidisciplinary OneStop Heel Pain clinic. This pathway was already efficient but subject to occasional frustrating delays if a key staff member was absent. A new pathway was introduced with the goal to reduce delays to a definitive treatment plan. Method: A retrospective series of Achilles tendon ruptures managed according to the 2019 protocol was identified. Time taken from the Emergency Department to have both an ultrasound scan and specialist Foot and Ankle surgical review were calculated. 30 consecutive patients were treated with our new pathway and prospectively followed. The time taken for a scan and for specialist review were compared to the 30 consecutive cases from the 2019 (pre-COVID) cohort. The new pathway includes 1. A new contoured splint applied to the front of the injured limb held with a bandage. This can be removed and replaced (unlike a plaster cast) in the ultrasound department, removing the need for plaster room visits. 2. Urgent triage to a Foot and Ankle specialist. 3. Ultrasound scan for assessment of rupture gap and deep vein thrombosis check. 4. Early decision regarding surgery. Transfer to weight bearing in a prosthetic boot in equinuswithout waiting for the once-a-week clinic. 5. Extended oral VTE prophylaxis. Results: The time taken for a patient to have both an ultrasound scan and specialist review fell > 50%. All patients in the new pathway reached a definitive treatment decision within one week. There were no significant differences in patient demographics or rates of surgical vs non-operative treatment. The mean time from Emergency Department visit to specialist review and ultrasound scan fell from 8.7 days (old protocol) to 2.9 days (new pathway). The maximum time for this fell from 23 days (old protocol) to 6 days (new pathway). Conclusion: Teamwork and innovation have improved the experience for patients with an Achilles tendon rupture. The new pathway brings many advantages - reduced time in the Emergency Department, fewer hospital visits, less time using crutches and reduced overall recovery time.

Keywords: orthopaedics, achilles rupture, ultrasound, innovation

Procedia PDF Downloads 87
1 Probability Modeling and Genetic Algorithms in Small Wind Turbine Design Optimization: Mentored Interdisciplinary Undergraduate Research at LaGuardia Community College

Authors: Marina Nechayeva, Malgorzata Marciniak, Vladimir Przhebelskiy, A. Dragutan, S. Lamichhane, S. Oikawa

Abstract:

This presentation is a progress report on a faculty-student research collaboration at CUNY LaGuardia Community College (LaGCC) aimed at designing a small horizontal axis wind turbine optimized for the wind patterns on the roof of our campus. Our project combines statistical and engineering research. Our wind modeling protocol is based upon a recent wind study by a faculty-student research group at MIT, and some of our blade design methods are adopted from a senior engineering project at CUNY City College. Our use of genetic algorithms has been inspired by the work on small wind turbines’ design by David Wood. We combine these diverse approaches in our interdisciplinary project in a way that has not been done before and improve upon certain techniques used by our predecessors. We employ several estimation methods to determine the best fitting parametric probability distribution model for the local wind speed data obtained through correlating short-term on-site measurements with a long-term time series at the nearby airport. The model serves as a foundation for engineering research that focuses on adapting and implementing genetic algorithms (GAs) to engineering optimization of the wind turbine design using Blade Element Momentum Theory. GAs are used to create new airfoils with desirable aerodynamic specifications. Small scale models of best performing designs are 3D printed and tested in the wind tunnel to verify the accuracy of relevant calculations. Genetic algorithms are applied to selected airfoils to determine the blade design (radial cord and pitch distribution) that would optimize the coefficient of power profile of the turbine. Our approach improves upon the traditional blade design methods in that it lets us dispense with assumptions necessary to simplify the system of Blade Element Momentum Theory equations, thus resulting in more accurate aerodynamic performance calculations. Furthermore, it enables us to design blades optimized for a whole range of wind speeds rather than a single value. Lastly, we improve upon known GA-based methods in that our algorithms are constructed to work with XFoil generated airfoils data which enables us to optimize blades using our own high glide ratio airfoil designs, without having to rely upon available empirical data from existing airfoils, such as NACA series. Beyond its immediate goal, this ongoing project serves as a training and selection platform for CUNY Research Scholars Program (CRSP) through its annual Aerodynamics and Wind Energy Research Seminar (AWERS), an undergraduate summer research boot camp, designed to introduce prospective researchers to the relevant theoretical background and methodology, get them up to speed with the current state of our research, and test their abilities and commitment to the program. Furthermore, several aspects of the research (e.g., writing code for 3D printing of airfoils) are adapted in the form of classroom research activities to enhance Calculus sequence instruction at LaGCC.

Keywords: engineering design optimization, genetic algorithms, horizontal axis wind turbine, wind modeling

Procedia PDF Downloads 188