Search results for: mobile grid computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3401

Search results for: mobile grid computing

3041 Role of Power Electronics in Grid Integration of Renewable Energy Systems

Authors: M. N. Tandjaoui, C. Banoudjafar, C. Benachaiba, O. Abdelkhalek, A. Kechich

Abstract:

Advanced power electronic systems are deemed to be an integral part of renewable, green, and efficient energy systems. Wind energy is one of the renewable means of electricity generation that is now the world’s fastest growing energy source can bring new challenges when it is connected to the power grid due to the fluctuation nature of the wind and the comparatively new types of its generators. The wind energy is part of the worldwide discussion on the future of energy generation and use and consequent effects on the environment. However, this paper will introduce some of the requirements and aspects of the power electronic involved with modern wind generation systems, including modern power electronics and converters, and the issues of integrating wind turbines into power systems.

Keywords: power electronics, renewable energy, smart grid, green energy, power technology

Procedia PDF Downloads 624
3040 Research Activity in Computational Science Using High Performance Computing: Co-Authorship Network Analysis

Authors: Sul-Ah Ahn, Youngim Jung

Abstract:

The research activities of the computational scientists using high-performance computing are analyzed using bibliometric approaches. This study aims at providing computational scientists using high-performance computing and relevant policy planners with useful bibliometric results for an assessment of research activities. In order to achieve this purpose, we carried out a co-authorship network analysis of journal articles to assess the research activities of computational scientists using high-performance computing as a case study. For this study, we used journal articles of the Scopus database from Elsevier covering the time period of 2006-2015. We extracted the author rank in the computational science field using high-performance computing by the number of papers published during ten years from 2006. Finally, we drew the co-authorship network for 50 top-authors and their coauthors and described some features of the co-authorship network in relation to the author rank. Suggestions for further studies are discussed.

Keywords: co-authorship network analysis, computational science, high performance computing, research activity

Procedia PDF Downloads 285
3039 Data-Driven Simulations Tools for Der and Battery Rich Power Grids

Authors: Ali Moradiamani, Samaneh Sadat Sajjadi, Mahdi Jalili

Abstract:

Power system analysis has been a major research topic in the generation and distribution sections, in both industry and academia, for a long time. Several load flow and fault analysis scenarios have been normally performed to study the performance of different parts of the grid in the context of, for example, voltage and frequency control. Software tools, such as PSCAD, PSSE, and PowerFactory DIgSILENT, have been developed to perform these analyses accurately. Distribution grid had been the passive part of the grid and had been known as the grid of consumers. However, a significant paradigm shift has happened with the emergence of Distributed Energy Resources (DERs) in the distribution level. It means that the concept of power system analysis needs to be extended to the distribution grid, especially considering self sufficient technologies such as microgrids. Compared to the generation and transmission levels, the distribution level includes significantly more generation/consumption nodes thanks to PV rooftop solar generation and battery energy storage systems. In addition, different consumption profile is expected from household residents resulting in a diverse set of scenarios. Emergence of electric vehicles will absolutely make the environment more complicated considering their charging (and possibly discharging) requirements. These complexities, as well as the large size of distribution grids, create challenges for the available power system analysis software. In this paper, we study the requirements of simulation tools in the distribution grid and how data-driven algorithms are required to increase the accuracy of the simulation results.

Keywords: smart grids, distributed energy resources, electric vehicles, battery storage systsms, simulation tools

Procedia PDF Downloads 68
3038 Mobile Mediated Learning and Teachers Education in Less Resourced Region

Authors: Abdul Rashid Ahmadi, Samiullah Paracha, Hamidullah Sokout, Mohammad Hanif Gharana

Abstract:

Conventional educational practices, do not offer all the required skills for teachers to successfully survive in today’s workplace. Due to poor professional training, a big gap exists across the curriculum plan and the teacher practices in the classroom. As such, raising the quality of teaching through ICT-enabled training and professional development of teachers should be an urgent priority. ‘Mobile Learning’, in that vein, is an increasingly growing field of educational research and practice across schools and work places. In this paper, we propose a novel Mobile learning system that allows the users to learn through an intelligent mobile learning in cooperatively every-time and every-where. The system will reduce the training cost and increase consistency, efficiency, and data reliability. To establish that our system will display neither functional nor performance failure, the evaluation strategy is based on formal observation of users interacting with system followed by questionnaires and structured interviews.

Keywords: computer assisted learning, intelligent tutoring system, learner centered design, mobile mediated learning and teacher education

Procedia PDF Downloads 261
3037 Exploiting Non-Uniform Utility of Computing: A Case Study

Authors: Arnab Sarkar, Michael Huang, Chuang Ren, Jun Li

Abstract:

The increasing importance of computing in modern society has brought substantial growth in the demand for more computational power. In some problem domains such as scientific simulations, available computational power still sets a limit on what can be practically explored in computation. For many types of code, there is non-uniformity in the utility of computation. That is not every piece of computation contributes equally to the quality of the result. If this non-uniformity is understood well and exploited effectively, we can much more effectively utilize available computing power. In this paper, we discuss a case study of exploring such non-uniformity in a particle-in-cell simulation platform. We find both the existence of significant non-uniformity and that it is generally straightforward to exploit it. We show the potential of order-of-magnitude effective performance gain while keeping the comparable quality of output. We also discuss some challenges in both the practical application of the idea and evaluation of its impact.

Keywords: approximate computing, landau damping, non uniform utility computing, particle-in-cell

Procedia PDF Downloads 231
3036 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 452
3035 The Relationship between Mobile Phone Usage and Secondary School Students’ Academic Performance: Work Experience at an International School

Authors: L. N. P. Wedikandage, Mohamed Razmi Zahir

Abstract:

Technology is a global imperative because of its contributions to human existence and because it has improved global socioeconomic relations. As a result, the mobile phone has become the most important mode of communication today. Smartphones, Internet-enabled devices with built-in computer software and applications, are one of the most significant inventions of the twenty-first century. Technology is advantageous to many people, especially those involved in education. It is an important learning tool for today's schoolchildren. It enables students to access online learning platforms and course resources and interact digitally. Senior secondary students, in particular, have some of the most expensive and sophisticated mobile phones, tablets, and iPads capable of connecting to the internet and various social media platforms, other websites, and so on. At present, the use of mobile phones' potential for effective teaching and learning is growing. This is due to the benefits of mobile learning, including the ability to share knowledge without any limits in space or Time and the capacity to facilitate the development of critical thinking, participatory learning, problem-solving, and the development of lifelong communication skills. However, it is yet unclear how mobile devices may affect education and how they may affect opportunities for learning. As a result, the purpose of this research was to ascertain the relationship between mobile phone usage and the academic Performance of secondary-level students at an international school in Sri Lanka. The study's sample consisted of 523 secondary-level students from an international school, ranging from Form 1 to Upper 6. For the study, a survey research design and questionnaires were used. Google Forms was used to create the students' survey. There were three hypotheses tested to find out the relationship between mobile phone usage and academic preference. The findings show that there is a positive relationship between mobile phone usage and academic performance among secondary school students (the number of students obtaining simple passes is significantly higher when mobile phones are being used for more than 7 hours), no relationship between mobile phone usage and academic performance among secondary school students of different parents' occupations, and a relationship between the frequency of mobile phone usage and academic performance among secondary school students.

Keywords: mobile phone, academic performance, secondary level, international schools

Procedia PDF Downloads 61
3034 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4

Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono

Abstract:

Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.

Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations

Procedia PDF Downloads 123
3033 Development of a Cost Effective Two Wheel Tractor Mounted Mobile Maize Sheller for Small Farmers in Bangladesh

Authors: M. Israil Hossain, T. P. Tiwari, Ashrafuzzaman Gulandaz, Nusrat Jahan

Abstract:

Two-wheel tractor (power tiller) is a common tillage tool in Bangladesh agriculture for easy access in fragmented land with affordable price of small farmers. Traditional maize sheller needs to be carried from place to place by hooking with two-wheel tractor (2WT) and set up again for shelling operation which takes longer time for preparation of maize shelling. The mobile maize sheller eliminates the transportation problem and can start shelling operation instantly any place as it is attached together with 2WT. It is counterclockwise rotating cylinder, axial flow type sheller, and grain separated with a frictional force between spike tooth and concave. The maize sheller is attached with nuts and bolts in front of the engine base of 2WT. The operating power of the sheller comes from the fly wheel of the engine of the tractor through ‘V” belt pulley arrangement. The average shelling capacity of the mobile sheller is 2.0 t/hr, broken kernel 2.2%, and shelling efficiency 97%. The average maize shelling cost is Tk. 0.22/kg and traditional custom hire rate is Tk.1.0/kg, respectively (1 US$=Tk.78.0). The service provider of the 2WT can transport the mobile maize sheller long distance in operator’s seating position. The manufacturers started the fabrication of mobile maize sheller. This mobile maize sheller is also compatible for the other countries where 2WT is available for farming operation.

Keywords: cost effective, mobile maize sheller, maize shelling capacity, small farmers, two wheel tractor

Procedia PDF Downloads 160
3032 Thermal and Acoustic Design of Mobile Hydraulic Vehicle Engine Room

Authors: Homin Kim, Hyungjo Byun, Jinyoung Do, Yongil Lee, Hyunho Shin, Seungbae Lee

Abstract:

Engine room of mobile hydraulic vehicle is densely packed with an engine and many hydraulic components mostly generating heat and sound. Though hydraulic oil cooler, ATF cooler, and axle oil cooler etc. are added to vehicle cooling system of mobile vehicle, the overheating may cause downgraded performance and frequent failures. In order to improve thermal and acoustic environment of engine room, the computational approaches by Computational Fluid Dynamics (CFD) and Boundary Element Method (BEM) are used together with necessary modal analysis of belt-driven system. The engine room design layout and process, which satisfies the design objectives of sound power level and temperature levels of radiator water, charged air cooler, transmission and hydraulic oil coolers, is discussed.

Keywords: acoustics, CFD, engine room design, mobile hydraulics

Procedia PDF Downloads 303
3031 Overcoming Usability Challenges of Educational Math Apps: Designing and Testing a Mobile Graphing Calculator

Authors: M. Tomaschko

Abstract:

The integration of technology in educational settings has gained a lot of interest. Especially the use of mobile devices and accompanying mobile applications can offer great potentials to complement traditional education with new technologies and enrich students’ learning in various ways. Nevertheless, the usability of the deployed mathematics application is an indicative factor to exploit the full potential of technology enhanced learning because directing cognitive load toward using an application will likely inhibit effective learning. For this reason, the purpose of this research study is the identification of possible usability issues of the mobile GeoGebra Graphing Calculator application. Therefore, eye tracking in combination with task scenarios, think aloud method, and a SUS questionnaire were used. Based on the revealed usability issues, the mobile application was iteratively redesigned and assessed in order to verify the success of the usability improvements. In this paper, the identified usability issues are presented, and recommendations on how to overcome these concerns are provided. The main findings relate to the conception of a mathematics keyboard and the interaction design in relation to an equation editor, as well as the representation of geometrical construction tools. In total, 12 recommendations were formed to improve the usability of a mobile graphing calculator application. The benefit to be gained from this research study is not only the improvement of the usability of the existing GeoGebra Graphing Calculator application but also to provide helpful hints that could be considered from designers and developers of mobile math applications.

Keywords: GeoGebra, graphing calculator, math education, smartphone, usability

Procedia PDF Downloads 111
3030 Learning on the Go: Practicing Vocabulary with Mobile Apps

Authors: Shoba Bandi-Rao

Abstract:

The lack of college readiness is one of the major contributors to low graduation rates at community colleges, especially among educationally and financially disadvantaged students. About 45% of underprepared high school graduates are required to complete ‘remedial’ reading/writing courses before they can begin taking college-level courses. Mobile apps present ‘bite-size’ learning materials that can be useful for practicing certain literacy skills, such as vocabulary learning. The convenience of mobile phones is ideal for a majority of students at community colleges who hold full or part-time jobs. Mobile apps allow students to learn during small ‘chunks’ of time available to them outside of the class—during subway commute, between classes, etc. Learning with mobile apps is a relatively new area in research, and their effectiveness for learning new words has been inconclusive. Using Mishra & Koehler’s TPCK theoretical framework, this study explored the effectiveness of the mobile app (Quizlet) for learning one hundred common college-level words in ‘remedial’ writing class over one semester. Each week, before coming to class, students studied a list of 10-15 words presented in context within sentences. Students came across these words in the article they read in class making their learning more meaningful. A pre and post-test measured the number of words students knew, learned and remembered. Statistical analysis shows that students performed better by 41% on the post-test indicating that the mobile app was helpful for learning words. Students also completed a short survey each week that sought to determine the amount of time students spent on the vocabulary app. A positive correlation was found between the amount of time spent on the mobile app and the number of words learned. The goal of this research is to capitalize on the convenience of smartphones to (1) better prepare them for college-level course work, and (2) contribute to current literature on mobile learning.

Keywords: mobile learning, vocabulary learning, literacy skills, Quizlet

Procedia PDF Downloads 201
3029 OmniDrive Model of a Holonomic Mobile Robot

Authors: Hussein Altartouri

Abstract:

In this paper the kinematic and kinetic models of an omnidirectional holonomic mobile robot is presented. The kinematic and kinetic models form the OmniDrive model. Therefore, a mathematical model for the robot equipped with three- omnidirectional wheels is derived. This model which takes into consideration the kinematics and kinetics of the robot, is developed to state space representation. Relative analysis of the velocities and displacements is used for the kinematics of the robot. Lagrange’s approach is considered in this study for deriving the equation of motion. The drive train and the mechanical assembly only of the Festo Robotino® is considered in this model. Mainly the model is developed for motion control. Furthermore, the model can be used for simulation purposes in different virtual environments not only Robotino® View. Further use of the model is in the mechatronics research fields with the aim of teaching and learning the advanced control theories.

Keywords: mobile robot, omni-direction wheel, mathematical model, holonomic mobile robot

Procedia PDF Downloads 560
3028 Mobile Network Users Amidst Ultra-Dense Networks in 5G Using an Improved Coordinated Multipoint (CoMP) Technology

Authors: Johnson O. Adeogo, Ayodele S. Oluwole, O. Akinsanmi, Olawale J. Olaluyi

Abstract:

In this 5G network, very high traffic density in densely populated areas, most especially in densely populated areas, is one of the key requirements. Radiation reduction becomes one of the major concerns to secure the future life of mobile network users in ultra-dense network areas using an improved coordinated multipoint technology. Coordinated Multi-Point (CoMP) is based on transmission and/or reception at multiple separated points with improved coordination among them to actively manage the interference for the users. Small cells have two major objectives: one, they provide good coverage and/or performance. Network users can maintain a good quality signal network by directly connecting to the cell. Two is using CoMP, which involves the use of multiple base stations (MBS) to cooperate by transmitting and/or receiving at the same time in order to reduce the possibility of electromagnetic radiation increase. Therefore, the influence of the screen guard with rubber condom on the mobile transceivers as one major piece of equipment radiating electromagnetic radiation was investigated by mobile network users amidst ultra-dense networks in 5g. The results were compared with the same mobile transceivers without screen guards and rubber condoms under the same network conditions. The 5 cm distance from the mobile transceivers was measured with the help of a ruler, and the intensity of Radio Frequency (RF) radiation was measured using an RF meter. The results show that the intensity of radiation from various mobile transceivers without screen guides and condoms was higher than the mobile transceivers with screen guides and condoms when call conversation was on at both ends.

Keywords: ultra-dense networks, mobile network users, 5g, coordinated multi-point.

Procedia PDF Downloads 58
3027 Effective Governance through Mobile Phones: Cases Supporting the Introduction and Implementation

Authors: Mohd Mudasir Shafi, Zafrul Hasan, Talat Saleem

Abstract:

Information and communication Technology (ICT) services have been defined as a route to good governance. Introduction of ICT into Governance has given rise to the idea of e-governance which helps in enhancing transparency, generating accountability and responsiveness in the system in order to provide faster and quality service to the citizen. Advancement in ICT has provided governments all over the world to speed up the delivery of information and services to citizens and businesses and increase their participation in governance. There has been varying degree of success over the past decade into providing services to the citizens using internet and different web services. These e-government initiatives have been extensively researched. Our research is aimed at the transition from electronic government to mobile government (m-government) initiatives implementing the mobile services and concerned to understand the major factors which will aid to adoption and distribution of these services. There must be some amount of research done in the integration process between e-government and m-government. There must also be enough amount of investigation done all the factors that could affect the transition process. Such factors differ between different places and the advancement in information and technology available there. In this paper, we have discussed why mobile communication system can be used for effective e-governance and the areas where m-governance can be implemented. The paper will examine some of the reasons as well as the main opportunities for improving effective governance through mobile phones.

Keywords: e-governance, mobile phones, information technology, m-government

Procedia PDF Downloads 420
3026 Formulation of Corrector Methods from 3-Step Hybid Adams Type Methods for the Solution of First Order Ordinary Differential Equation

Authors: Y. A. Yahaya, Ahmad Tijjani Asabe

Abstract:

This paper focuses on the formulation of 3-step hybrid Adams type method for the solution of first order differential equation (ODE). The methods which was derived on both grid and off grid points using multistep collocation schemes and also evaluated at some points to produced Block Adams type method and Adams moulton method respectively. The method with the highest order was selected to serve as the corrector. The convergence was valid and efficient. The numerical experiments were carried out and reveal that hybrid Adams type methods performed better than the conventional Adams moulton method.

Keywords: adam-moulton type (amt), corrector method, off-grid, block method, convergence analysis

Procedia PDF Downloads 591
3025 Efficient Storage in Cloud Computing by Using Index Replica

Authors: Bharat Singh Deora, Sushma Satpute

Abstract:

Cloud computing is based on resource sharing. Like other resources which can be shareable, storage is a resource which can be shared. We can use collective resources of storage from different locations and maintain a central index table for storage details. The storage combining of different places can form a suitable data storage which is operated from one location and is very economical. Proper storage of data should improve data reliability & availability and bandwidth utilization. Also, we are moving the contents of one storage to other according to our need.

Keywords: cloud computing, cloud storage, Iaas, PaaS, SaaS

Procedia PDF Downloads 309
3024 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 304
3023 Use of Mobile Phone Applications in Teaching Precalculus

Authors: Jay-R. Hosana Leonidas, Jayson A. Lucilo

Abstract:

The K-12 Curriculum in the Philippines shed light to mathematics education as it recognizes the use of smartphones/mobile phones as appropriate tools necessary in teaching mathematics. However, there were limited pieces of evidence on the use of these devices in teaching and learning process. This descriptive study developed lessons integrating the use of mobile phone applications with basis on low-level competencies of students in Precalculus and determined its effects on students’ conceptual understanding, procedural skills, and attitudes towards Precalculus. Employing Bring Your Own Device (BYOD) scheme in the study, lessons developed were conducted among Grade 11 Science, Technology, Engineering, and Mathematics (STEM) students at Central Bicol State University of Agriculture for the academic year 2018-2019. This study found that there is a significant difference between the competency levels of students along conceptual understanding and procedural skills prior to and after the conduct of lessons developed. Also, it disclosed that the use of mobile phone applications had positive effects on students’ attitudes towards Precalculus. Thus, the use of mobile phone applications in teaching Precalculus can enrich students’ understanding of concepts and procedural skills (solving and graphing skills) and can increase students’ motivation, self-confidence, and enjoyment in dealing with Precalculus.

Keywords: bring your own device, mathematics education, mobile phone applications, senior high school

Procedia PDF Downloads 131
3022 The Potential of M-Government towards Successful Implementation of E-Government in Saudi Arabia

Authors: Majed Ahmed Alfayad

Abstract:

Technology is now present in almost all areas and practices globally, and this has led governments around the world to adopt technology in the public sector. Therefore, electronic government has been introduced as a means of the automation of government services. New technologies and trends appear every single day, and governments need to meet the citizen’s requirements and expectations in order to succeed in the E-Government program. This research investigates the potential of mobile government as an enhancement force for the E-Government project in the Kingdom of Saudi Arabia, where the usage of mobile technology is coming to be favoured by citizens. Qualitative methodology has been adopted in this study for the data collection and analysis, and in particular the grounded theory approach.

Keywords: e-government, e-participation, m-government, mobile technology

Procedia PDF Downloads 307
3021 Malware Detection in Mobile Devices by Analyzing Sequences of System Calls

Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes.

Keywords: android, information security, intrusion detection systems, malware, mobile devices

Procedia PDF Downloads 271
3020 Use of Improved Genetic Algorithm in Cloud Computing to Reduce Energy Consumption in Migration of Virtual Machines

Authors: Marziyeh Bahrami, Hamed Pahlevan Hsseini, Behnam Ghamami, Arman Alvanpour, Hamed Ezzati, Amir Salar Sadeghi

Abstract:

One of the ways to increase the efficiency of services in the system of agents and, of course, in the world of cloud computing, is to use virtualization techniques. The aim of this research is to create changes in cloud computing services that will reduce as much as possible the energy consumption related to the migration of virtual machines and, in some way, the energy related to the allocation of resources and reduce the amount of pollution. So far, several methods have been proposed to increase the efficiency of cloud computing services in order to save energy in the cloud environment. The method presented in this article tries to prevent energy consumption by data centers and the subsequent production of carbon and biological pollutants as much as possible by increasing the efficiency of cloud computing services. The results show that the proposed algorithm, using the improvement in virtualization techniques and with the help of a genetic algorithm, improves the efficiency of cloud services in the matter of migrating virtual machines and finally saves consumption. becomes energy.

Keywords: consumption reduction, cloud computing, genetic algorithm, live migration, virtual Machine

Procedia PDF Downloads 27
3019 Design and Analysis of Highly Efficient and Reliable Single-Phase Transformerless Inverter for PV Systems

Authors: L. Ashok Kumar, N. Sujith Kumar

Abstract:

Most of the PV systems are designed with transformer for safety purpose with galvanic isolation. However, the transformer is big, heavy and expensive. Also, it reduces the overall frequency of the conversion stage. Generally PV inverter with transformer is having efficiency around 92%–94% only. To overcome these problems, transformerless PV system is introduced. It is smaller, lighter, cheaper and higher in efficiency. However, dangerous leakage current will flow between PV array and the grid due to the stray capacitance. There are different types of configurations available for transformerless inverters like H5, H6, HERIC, oH5, and Dual paralleled buck inverter. But each configuration is suffering from its own disadvantages like high conduction losses, shoot-through issues of switches, dead-time requirements at zero crossing instants of grid voltage to avoid grid shoot-through faults and MOSFET reverse recovery issues. The main objective of the proposed transformerless inverter is to address two key issues: One key issue for a transformerless inverter is that it is necessary to achieve high efficiency compared to other existing inverter topologies. Another key issue is that the inverter configuration should not have any shoot-through issues for higher reliability.

Keywords: grid-connected, photovoltaic (PV) systems, transformerless inverter, stray capacitance, common-mode, leakage current, pulse width modulation (PWM)

Procedia PDF Downloads 473
3018 Toward a Risk Assessment Model Based on Multi-Agent System for Cloud Consumer

Authors: Saadia Drissi

Abstract:

The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.

Keywords: cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer

Procedia PDF Downloads 518
3017 Crack Growth Life Prediction of a Fighter Aircraft Wing Splice Joint Under Spectrum Loading Using Random Forest Regression and Artificial Neural Networks with Hyperparameter Optimization

Authors: Zafer Yüce, Paşa Yayla, Alev Taşkın

Abstract:

There are heaps of analytical methods to estimate the crack growth life of a component. Soft computing methods have an increasing trend in predicting fatigue life. Their ability to build complex relationships and capability to handle huge amounts of data are motivating researchers and industry professionals to employ them for challenging problems. This study focuses on soft computing methods, especially random forest regressors and artificial neural networks with hyperparameter optimization algorithms such as grid search and random grid search, to estimate the crack growth life of an aircraft wing splice joint under variable amplitude loading. TensorFlow and Scikit-learn libraries of Python are used to build the machine learning models for this study. The material considered in this work is 7050-T7451 aluminum, which is commonly preferred as a structural element in the aerospace industry, and regarding the crack type; corner crack is used. A finite element model is built for the joint to calculate fastener loads and stresses on the structure. Since finite element model results are validated with analytical calculations, findings of the finite element model are fed to AFGROW software to calculate analytical crack growth lives. Based on Fighter Aircraft Loading Standard for Fatigue (FALSTAFF), 90 unique fatigue loading spectra are developed for various load levels, and then, these spectrums are utilized as inputs to the artificial neural network and random forest regression models for predicting crack growth life. Finally, the crack growth life predictions of the machine learning models are compared with analytical calculations. According to the findings, a good correlation is observed between analytical and predicted crack growth lives.

Keywords: aircraft, fatigue, joint, life, optimization, prediction.

Procedia PDF Downloads 142
3016 New Knowledge Co-Creation in Mobile Learning: A Classroom Action Research with Multiple Case Studies Using Mobile Instant Messaging

Authors: Genevieve Lim, Arthur Shelley, Dongcheol Heo

Abstract:

Abstract—Mobile technologies can enhance the learning process as it enables social engagement around concepts beyond the classroom and the curriculum. Early results in this ongoing research is showing that when learning interventions are designed specifically to generate new insights, mobile devices support regulated learning and encourage learners to collaborate, socialize and co-create new knowledge. As students navigate across the space and time boundaries, the fundamental social nature of learning transforms into mobile computer supported collaborative learning (mCSCL). The metacognitive interaction in mCSCL via mobile applications reflects the regulation of learning among the students. These metacognitive experiences whether self-, co- or shared-regulated are significant to the learning outcomes. Despite some insightful empirical studies, there has not yet been significant research that investigates the actual practice and processes of the new knowledge co-creation. This leads to question as to whether mobile learning provides a new channel to leverage learning? Alternatively, does mobile interaction create new types of learning experiences and how do these experiences co-create new knowledge. The purpose of this research is to explore these questions and seek evidence to support one or the other. This paper addresses these questions from the students’ perspective to understand how students interact when constructing knowledge in mCSCL and how students’ self-regulated learning (SRL) strategies support the co-creation of new knowledge in mCSCL. A pilot study has been conducted among international undergraduates to understand students’ perspective of mobile learning and concurrently develops a definition in an appropriate context. Using classroom action research (CAR) with multiple case studies, this study is being carried out in a private university in Thailand to narrow the research gaps in mCSCL and SRL. The findings will allow teachers to see the importance of social interaction for meaningful student engagement and envisage learning outcomes from a knowledge management perspective and what role mobile devices can play in these. The findings will signify important indicators for academics to rethink what is to be learned and how it should be learned. Ultimately, the study will bring new light into the co-creation of new knowledge in a social interactive learning environment and challenges teachers to embrace the 21st century of learning with mobile technologies to deepen and extend learning opportunities.

Keywords: mobile computer supported collaborative learning, mobile instant messaging, mobile learning, new knowledge co-creation, self-regulated learning

Procedia PDF Downloads 208
3015 About Multi-Resolution Techniques for Large Eddy Simulation of Reactive Multi-Phase Flows

Authors: Giacomo Rossi, Bernardo Favini, Eugenio Giacomazzi, Franca Rita Picchia, Nunzio Maria Salvatore Arcidiacono

Abstract:

A numerical technique for mesh refinement in the HeaRT (Heat Release and Transfer) numerical code is presented. In the CFD framework, Large Eddy Simulation (LES) approach is gaining in importance as a tool for simulating turbulent combustion processes, also if this approach has an high computational cost due to the complexity of the turbulent modeling and the high number of grid points necessary to obtain a good numerical solution. In particular, when a numerical simulation of a big domain is performed with a structured grid, the number of grid points can increase so much that the simulation becomes impossible: this problem can be overcame with a mesh refinement technique. Mesh refinement technique developed for HeaRT numerical code (a staggered finite difference code) is based on an high order reconstruction of the variables at the grid interfaces by means of a least square quasi-ENO interpolation: numerical code is written in modern Fortran (2003 standard of newer) and is parallelized using domain decomposition and message passing interface (MPI) standard.

Keywords: LES, multi-resolution, ENO, fortran

Procedia PDF Downloads 339
3014 Optimal Power Distribution and Power Trading Control among Loads in a Smart Grid Operated Industry

Authors: Vivek Upadhayay, Siddharth Deshmukh

Abstract:

In recent years utilization of renewable energy sources has increased majorly because of the increase in global warming concerns. Organization these days are generally operated by Micro grid or smart grid on a small level. Power optimization and optimal load tripping is possible in a smart grid based industry. In any plant or industry loads can be divided into different categories based on their importance to the plant and power requirement pattern in the working days. Coming up with an idea to divide loads in different such categories and providing different power management algorithm to each category of load can reduce the power cost and can come handy in balancing stability and reliability of power. An objective function is defined which is subjected to a variable that we are supposed to minimize. Constraint equations are formed taking difference between the power usages pattern of present day and same day of previous week. By considering the objectives of minimal load tripping and optimal power distribution the proposed problem formulation is a multi-object optimization problem. Through normalization of each objective function, the multi-objective optimization is transformed to single-objective optimization. As a result we are getting the optimized values of power required to each load for present day by use of the past values of the required power for the same day of last week. It is quite a demand response scheduling of power. These minimized values then will be distributed to each load through an algorithm used to optimize the power distribution at a greater depth. In case of power storage exceeding the power requirement, profit can be made by selling exceeding power to the main grid.

Keywords: power flow optimization, power trading enhancement, smart grid, multi-object optimization

Procedia PDF Downloads 504
3013 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 451
3012 The Potential of Cloud Computing in Overcoming the Problems of Collective Learning

Authors: Hussah M. AlShayea

Abstract:

This study aimed to identify the potential of cloud computing, "Google Drive" in overcoming the problems of collective learning from the viewpoint of Princess Noura University students. The study included (92) students from the College of Education. To achieve the goal of the study, several steps have been taken. First, the most important problems of collective learning were identified from the viewpoint of the students. After that, a survey identifying the potential of cloud computing "Google Drive" in overcoming the problems of collective learning was distributed among the students. The study results showed that the students believe that the use of Google Drive contributed to overcoming these problems. In the light of those results, the researcher presented a set of recommendations and proposals, including: encouraging teachers and learners to employ cloud computing to overcome the problems and constraints of collective learning.

Keywords: cloud computing, collective learning, Google drive, Princess Noura University

Procedia PDF Downloads 452