Search results for: tunnel installation control network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15081

Search results for: tunnel installation control network

14901 Endoscopic Versus Open Treatment of Carpal Tunnel Syndrome: Postoperative Complications in Patients with Diabetes Mellitus

Authors: Arman Kishan, Mark Haft, Steve Li, Duc Nguyen, Dawn Laporte

Abstract:

Objective: Patients with Type 2 diabetes (T2DM) often face higher postoperative complication rates. Limited data exist on outcomes in T2DM patients undergoing carpal tunnel release (CTR). This study aims to compare complication rates between endoscopic CTR (ECTR) and open CTR (OCTR) in patients with T2DM. Methods: This was a retrospective cohort study using the TriNetX database of 56741 patients with T2DM undergoing ECTR (N= 14,949) or OCTR (N= 41,792). Demographic data, medical comorbidities, and complication rates were analyzed. We used multivariable analysis to identify differences in postoperative complication rates between the two treatment methods in patients with T2DM. Results: Patients with T2DM undergoing ECTR had a significantly lower incidence of 90-day wound infection (p < 0.001), 90-day wound dehiscence (p < 0.001), and nerve injury (p < 0.001) when compared to patients who underwent OCTR. After matching, there was a significantly higher number of T2DM patients undergoing ECTR who had peripheral vascular disease (p = 0.045) and hypertension (p = 0.020) when compared to the OCTR group. These patients also had a lower incidence of fluid and electrolyte disorders (p = 0.002) and chronic blood loss anemia (p = 0.025). Conclusion: ECTR presents a superior choice for T2DM patients undergoing CTR, yielding significantly lower rates of wound infection, wound dehiscence, and nerve injury within 90 days post-surgery—reducing the risk by 31%, 48%, and 59%, respectively. These findings support the adoption of ECTR as the preferred method in this patient population, potentially leading to improved postoperative outcomes.

Keywords: endoscopic treatment of carpal tunnel syndrome, open treatment of carpal tunnel syndrome, carpal tunnel syndrome, postoperative complications in patients with diabetes mellitus

Procedia PDF Downloads 40
14900 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.

Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost

Procedia PDF Downloads 215
14899 An Experimental Study of Diffuser-Enhanced Propeller Hydrokinetic Turbines

Authors: Matheus Nunes, Rafael Mendes, Taygoara Felamingo Oliveira, Antonio Brasil Junior

Abstract:

Wind tunnel experiments of horizontal axis propeller hydrokinetic turbines model were carried out, in order to determine the performance behavior for different configurations and operational range. The present experiments introduce the use of two different geometries of rear diffusers to enhance the performance of the free flow machine. The present paper reports an increase of the power coefficient about 50%-80%. It represents an important feature that has to be taken into account in the design of this kind of machine.

Keywords: diffuser-enhanced turbines, hydrokinetic turbine, wind tunnel experiments, micro hydro

Procedia PDF Downloads 236
14898 Battery Energy Storage System Economic Benefits Assessment on a Network Frequency Control

Authors: Kréhi Serge Agbli, Samuel Portebos, Michaël Salomon

Abstract:

Here a methodology is considered aiming at evaluating the economic benefit of the provision of a primary frequency control unit using a Battery Energy Storage System (BESS). In this methodology, two control types (basic and hysteresis) are implemented and the corresponding minimum energy storage system power allowing to maintain the frequency drop inside a given threshold under a given contingency is identified and compared using DigSilent’s PowerFactory software. Following this step, the corresponding energy storage capacity (in MWh) is calculated. As PowerFactory is dedicated to dynamic simulation for transient analysis, a first order model related to the IEEE 9 bus grid used for the analysis under PowerFactory is characterized and implemented on MATLAB-Simulink. Primary frequency control is simulated using the two control types over one-month grid's frequency deviation data on this Simulink model. This simulation results in the energy throughput both basic and hysteresis BESSs. It emerges that the 15 minutes operation band of the battery capacity allocated to frequency control is sufficient under the considered disturbances. A sensitivity analysis on the width of the control deadband is then performed for the two control types. The deadband width variation leads to an identical sizing with the hysteresis control showing a better frequency control at the cost of a higher delivered throughput compared to the basic control. An economic analysis comparing the cost of the sized BESS to the potential revenues is then performed.

Keywords: battery energy storage system, electrical network frequency stability, frequency control unit, PowerFactor

Procedia PDF Downloads 100
14897 Non-Destructive Inspection for Tunnel Lining Concrete with Small Void by Using Ultrasonic

Authors: Yasuyuki Nabeshima

Abstract:

Many tunnels which have been constructed since more than 50 years were existing in Japan. Lining concrete in these tunnels have many problems such as crack, flacking and void. Inner void between lining concrete and rock was very hard to find by outside visual check and hammering test. In this paper, non-destructive inspection by using ultrasonic was applied to investigate inner void. A model concrete with inner void was used as specimen and ultrasonic inspection was applied to specify the location and the size of void. As a result, ultrasonic inspection could accurately find the inner void.

Keywords: tunnel, lining concrete, void, non-destructive inspection, ultrasonic

Procedia PDF Downloads 172
14896 Projective Lag Synchronization in Drive-Response Dynamical Networks via Hybrid Feedback Control

Authors: Mohd Salmi Md Noorani, Ghada Al-Mahbashi, Sakhinah Abu Bakar

Abstract:

This paper investigates projective lag synchronization (PLS) behavior in drive response dynamical networks (DRDNs) model with identical nodes. A hybrid feedback control method is designed to achieve the PLS with mismatch and without mismatch terms. The stability of the error dynamics is proven theoretically using the Lyapunov stability theory. Finally, analytical results show that the states of the dynamical network with non-delayed coupling can be asymptotically synchronized onto a desired scaling factor under the designed controller. Moreover, the numerical simulations results demonstrate the validity of the proposed method.

Keywords: drive-response dynamical network, projective lag synchronization, hybrid feedback control, stability theory

Procedia PDF Downloads 363
14895 Construction Project Planning Using Fuzzy Critical Path Approach

Authors: Omar M. Aldenali

Abstract:

Planning is one of the most important phases of the management science and network planning, which represents the project activities relationship. Critical path is one of the project management techniques used to plan and control the execution of a project activities. The objective of this paper is to implement a fuzzy logic approach to arrange network planning on construction projects. This method is used to finding out critical path in the fuzzy construction project network. The trapezoidal fuzzy numbers are used to represent the activity construction project times. A numerical example that represents a house construction project is introduced. The critical path method is implemented on the fuzzy construction network activities, and the results showed that this method significantly affects the completion time of the construction projects.

Keywords: construction project, critical path, fuzzy network project, planning

Procedia PDF Downloads 109
14894 Control of Photovoltaic System Interfacing Grid

Authors: Zerzouri Nora

Abstract:

In this paper, author presented the generalities of a photovoltaic system study and simulation. Author inserted the DC-DC converter to raise the voltage level and improve the operation of the PV panel by continuing the operating point at maximum power by using the Perturb and Observe technique (P&O). The connection to the network is made by inserting a three-phase voltage inverter allowing synchronization with the network the inverter is controlled by a PWM control. The simulation results allow the author to visualize the operation of the different components of the system, as well as the behavior of the system during the variation of meteorological values.

Keywords: photovoltaic generator PV, boost converter, P&O MPPT, PWM inverter, three phase grid

Procedia PDF Downloads 91
14893 Hybrid Multipath Congestion Control

Authors: Akshit Singhal, Xuan Wang, Zhijun Wang, Hao Che, Hong Jiang

Abstract:

Multiple Path Transmission Control Protocols (MPTCPs) allow flows to explore path diversity to improve the throughput, reliability and network resource utilization. However, the existing solutions may discourage users to adopt the solutions in the face of multipath scenario where different paths are charged based on different pricing structures, e.g., WiFi vs cellular connections, widely available for mobile phones. In this paper, we propose a Hybrid MPTCP (H-MPTCP) with a built-in mechanism to incentivize users to use multiple paths with different pricing structures. In the meantime, H-MPTCP preserves the nice properties enjoyed by the state-of-the-art MPTCP solutions. Extensive real Linux implementation results verify that H-MPTCP can indeed achieve the design objectives.

Keywords: network, TCP, WiFi, cellular, congestion control

Procedia PDF Downloads 668
14892 The Effect of Increased Tip Area of Suction Caissons on the Penetration Resistance Coefficients

Authors: Ghaem Zamani, Farveh Aghaye Nezhad, Amin Barari

Abstract:

The installation process of caissons has usually been a challenging step in the design phase, especially in the case of suction-assisted installation. The engineering practice for estimating the caisson penetration resistance is primarily controlled by the resistance governed by inner and outer skirt friction and the tip resistance. Different methods have been proposed in the literature to evaluate the above components, while the CPT-based methodology has attained notable popularity among others. In this method, two empirical coefficients are suggested, k𝒻 and kp, which relate the frictional resistance and tip resistance to the cone penetration resistance (q𝒸), respectively. A series of jacking installation and uninstallation experiments for different soil densities were carried out in the offshore geotechnical laboratory of Aalborg University, Denmark. The main goal of these tests was to find appropriate values for empirical coefficients of the CPT-based method for the buckets with large embedment ratio (i.e., d/D=1, where d is the skirt length and D is the diameter) and increased tip area penetrated into dense sand deposits. The friction resistance effects were isolated during the pullout experiments; hence, the k𝒻 was back-measured from the tests in the absence of tip resistance. The actuator force during jacking installation equals the sum of frictional resistance and tip resistance. Therefore, the tip resistance of the bucket is calculated by subtracting the back-measured frictional resistance from penetration resistance; hence the relevant coefficient kp would be achieved. The cone penetration test was operated at different points before and after each installation attempt to measure the cone penetration resistance (q𝒸), and the average value of q𝒸 is used for calculations. The experimental results of the jacking installation tests indicated that a larger friction area considerably increased the penetration resistance; however, this effect was completely diminished when foundation suction-assisted penetration was used. Finally, the values measured for the empirical coefficient of the CPT-based method are compared with the highest expected and most probable values suggested by DNV(1992) for uniform thickness buckets.

Keywords: suction caisson, offshore geotechnics, cone penetration test, wind turbine foundation

Procedia PDF Downloads 53
14891 Flow Control Optimisation Using Vortex Generators in Turbine Blade

Authors: J. Karthik, G. Vinayagamurthy

Abstract:

Aerodynamic flow control is achieved by interaction of flowing medium with corresponding structure so that its natural flow state is disturbed to delay the transition point. This paper explains the aerodynamic effect and optimized design of Vortex Generators on the turbine blade to achieve maximum flow control. The airfoil is chosen from NREL [National Renewable Energy Laboratory] S-series airfoil as they are characterized with good lift characteristics and lower noise. Vortex generators typically chosen are Ogival, Rectangular, Triangular and Tapered Fin shapes attached near leading edge. Vortex generators are typically distributed from the primary to tip of the blade section. The design wind speed is taken as 6m/s and the computational analysis is executed. The blade surface is simulated using k- ɛ SST model and results are compared with X-FOIL results. The computational results are validated using Wind Tunnel Testing of the blade corresponding to the design speed. The effect of Vortex generators on the flow characteristics is studied from the results of analysis. By comparing the computational and test results of all shapes of Vortex generators; the optimized design is achieved for effective flow control corresponding to the blade.

Keywords: flow control, vortex generators, design optimisation, CFD

Procedia PDF Downloads 373
14890 Reactive Analysis of Different Protocol in Mobile Ad Hoc Network

Authors: Manoj Kumar

Abstract:

Routing protocols have a central role in any mobile ad hoc network (MANET). There are many routing protocols that exhibit different performance levels in different scenarios. In this paper, we compare AODV, DSDV, DSR, and ZRP routing protocol in mobile ad hoc networks to determine the best operational conditions for each protocol. We analyze these routing protocols by extensive simulations in OPNET simulator and show how to pause time and the number of nodes affect their performance. In this study, performance is measured in terms of control traffic received, control traffic sent, data traffic received, sent data traffic, throughput, retransmission attempts.

Keywords: AODV, DSDV, DSR, ZRP

Procedia PDF Downloads 487
14889 Rule Insertion Technique for Dynamic Cell Structure Neural Network

Authors: Osama Elsarrar, Marjorie Darrah, Richard Devin

Abstract:

This paper discusses the idea of capturing an expert’s knowledge in the form of human understandable rules and then inserting these rules into a dynamic cell structure (DCS) neural network. The DCS is a form of self-organizing map that can be used for many purposes, including classification and prediction. This particular neural network is considered to be a topology preserving network that starts with no pre-structure, but assumes a structure once trained. The DCS has been used in mission and safety-critical applications, including adaptive flight control and health-monitoring in aerial vehicles. The approach is to insert expert knowledge into the DCS before training. Rules are translated into a pre-structure and then training data are presented. This idea has been demonstrated using the well-known Iris data set and it has been shown that inserting the pre-structure results in better accuracy with the same training.

Keywords: neural network, self-organizing map, rule extraction, rule insertion

Procedia PDF Downloads 140
14888 Artificial Neural Network for Forecasting of Daily Reservoir Inflow: Case Study of the Kotmale Reservoir in Sri Lanka

Authors: E. U. Dampage, Ovindi D. Bandara, Vinushi S. Waraketiya, Samitha S. R. De Silva, Yasiru S. Gunarathne

Abstract:

The knowledge of water inflow figures is paramount in decision making on the allocation for consumption for numerous purposes; irrigation, hydropower, domestic and industrial usage, and flood control. The understanding of how reservoir inflows are affected by different climatic and hydrological conditions is crucial to enable effective water management and downstream flood control. In this research, we propose a method using a Long Short Term Memory (LSTM) Artificial Neural Network (ANN) to assist the aforesaid decision-making process. The Kotmale reservoir, which is the uppermost reservoir in the Mahaweli reservoir complex in Sri Lanka, was used as the test bed for this research. The ANN uses the runoff in the Kotmale reservoir catchment area and the effect of Sea Surface Temperatures (SST) to make a forecast for seven days ahead. Three types of ANN are tested; Multi-Layer Perceptron (MLP), Convolutional Neural Network (CNN), and LSTM. The extensive field trials and validation endeavors found that the LSTM ANN provides superior performance in the aspects of accuracy and latency.

Keywords: convolutional neural network, CNN, inflow, long short-term memory, LSTM, multi-layer perceptron, MLP, neural network

Procedia PDF Downloads 121
14887 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 337
14886 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 419
14885 Development of the Accelerator Applied to an Early Stage High-Strength Shotcrete

Authors: Ayanori Sugiyama, Takahisa Hanei, Yasuhide Higo

Abstract:

Domestic demand for the construction of tunnels has been increasing in recent years in Japan. To meet this demand, various construction materials and construction methods have been developed to attain higher strength, reduction of negative impact on the environment and improvement for working conditions. In this report, we would like to introduce the newly developed shotcrete with superior hardening properties which were tested through the actual machine scale and its workability and strength development were evaluated. As a result, this new tunnel construction method was found to achieve higher workability and quicker strength development in only a couple of minutes.

Keywords: accelerator, shotcrete, tunnel, high-strength

Procedia PDF Downloads 281
14884 A Parametric Study on Aerodynamic Performance of Tyre Using CFD

Authors: Sowntharya L.

Abstract:

Aerodynamics is the most important factor when it comes to resistive forces such as lift, drag and side forces acting on the vehicle. In passenger vehicles, reducing the drag will not only unlock the door for higher achievable speed but will also reduce the fuel consumption of the vehicle. Generally, tyre contributes significantly to the overall aerodynamics of the vehicle. Hence, understanding the air-flow behaviour around the tyre is vital to optimize the aerodynamic performance in the early stage of design process. Nowadays, aerodynamic simulation employing Computational Fluid Dynamics (CFD) is gaining more importance as it reduces the number of physical wind-tunnel experiments during vehicle development process. This research develops a methodology to predict aerodynamic drag of a standalone tyre using Numerical CFD Solver and to validate the same using a wind tunnel experiment. A parametric study was carried out on different tread pattern tyres such as slick, circumferential groove & patterned tyre in stationary and rotating boundary conditions. In order to represent wheel rotation contact with the ground, moving reference frame (MRF) approach was used in this study. Aerodynamic parameters such as drag lift & air flow behaviour around the tire were simulated and compared with experimental results.

Keywords: aerodynamics, CFD, drag, MRF, wind-tunnel

Procedia PDF Downloads 165
14883 The Role of Speed Reduction Model in Urban Highways Tunnels Accidents

Authors: Khashayar Kazemzadeh, Mohammad Hanif Dasoomi

Abstract:

According to the increasing travel demand in cities, bridges and tunnels are viewed as one of the fundamental components of cities transportation systems. Normally, due to geometric constraints forms in the tunnels, the considered speed in the tunnels is lower than the speed in connected highways. Therefore, drivers tend to reduce the speed near the entrance of the tunnels. In this paper, the effect of speed reduction on accident happened in the entrance of the tunnels has been discussed. The relation between accidents frequency and the parameters of speed, traffic volume and time of the accident in the mentioned tunnel has been analyzed and the mathematical model has been proposed.

Keywords: urban highway, accident, tunnel, mathematical model

Procedia PDF Downloads 442
14882 Magnetic Levitation Control: A Comparative Analysis of Two-Position and Tuned PID Methods Using Arduino Microcontrollers

Authors: Charles Anthony S. Santillan, Jude Noel P. Jarina, Patricia Mae A. Cuevas, Julito B. Añora Jr.

Abstract:

The research examines the effectiveness of Two-Position and Tuned PID controllers in magnetic levitation systems. Magnetic levitation, a crucial technology in diverse industries, depends on meticulous control mechanisms for stability and performance. The study seeks to compare these two control strategies to ascertain their efficacy in practical applications. The paper explores the theoretical foundations of the controllers, presents an experimental methodology emphasizing setup and installation, and examines the results about stability, response time, and susceptibility to disturbances. By interpreting and discussing the findings, the research provides valuable perspectives on the practical ramifications of utilizing Two-Position and Tuned PID controllers in magnetic levitation systems. The conclusion encapsulates significant outcomes and proposes avenues for future research, thereby contributing to the progress of control strategies in magnetic levitation technology.

Keywords: arduino, comparative analysis, magnetic levitation, tuned PID controller, two-position controller

Procedia PDF Downloads 29
14881 Cost Analysis of Optimized Fast Network Mobility in IEEE 802.16e Networks

Authors: Seyyed Masoud Seyyedoshohadaei, Borhanuddin Mohd Ali

Abstract:

To support group mobility, the NEMO Basic Support Protocol has been standardized as an extension of Mobile IP that enables an entire network to change its point of attachment to the Internet. Using NEMO in IEEE 802.16e (WiMax) networks causes latency in handover procedure and affects seamless communication of real-time applications. To decrease handover latency and service disruption time, an integrated scheme named Optimized Fast NEMO (OFNEMO) was introduced by authors of this paper. In OFNEMO a pre-establish multi tunnels concept, cross function optimization and cross layer design are used. In this paper, an analytical model is developed to evaluate total cost consisting of signaling and packet delivery costs of the OFNEMO compared with RFC3963. Results show that OFNEMO increases probability of predictive mode compared with RFC3963 due to smaller handover latency. Even though OFNEMO needs extra signalling to pre-establish multi tunnel, it has less total cost thanks to its optimized algorithm. OFNEMO can minimize handover latency for supporting real time application in moving networks.

Keywords: fast mobile IPv6, handover latency, IEEE802.16e, network mobility

Procedia PDF Downloads 162
14880 Case Study: Geomat Installation against Slope Erosion

Authors: Serap Kaymakci, Dogan Gundogdu, M. Bugra Yagcioglu

Abstract:

Erosion (soil erosion) is a phenomenon in which the soil on the slope surface is exposed to natural influences such as wind, rainfall, etc. in open areas. The most natural solution to prevent erosion is to plant surfaces exposed to erosion. However, proper ground and natural conditions must be provided in order for planting to occur. Erosion is prevented in a fast and natural way and the loss of soil is reduced mostly. Lead to allowing plants to hold onto the soil with its three-dimensional and hollow structure are as follows: The types of geomat called MacMat that is used in a case study in Turkey in order to prevent water carry over due to rainfall. The geosynthetic combined with double twisted steel wire mesh. That consists of 95% Zn–5% Al alloy coated double twisted steel wire based that is a reinforced MacMat (geosynthetic three-dimensional erosion control mat) obtained by a polypropylene consisted (mesh type 8x10-Wire diam. 2.70 mm–95% Zn–5% Al alloy coated). That is developed by the progress of the technology. When using reinforced MacMat on top clay liners, fixing pins should not be used as they will rupture the mats. Mats are simply anchored (J Type) in the top trench and, if necessary, in intermediate berm trenches. If the slope angle greater than 20°, it is necessary to use additional rebar depending soil properties also. These applications may have specific technical and installation requirements. In that project, the main purpose is erosion control after that is greening. There is a slope area around the factory which is located in Gebze, İstanbul.

Keywords: erosion, GeoMat, geosynthetic, slope

Procedia PDF Downloads 152
14879 Simulation and Hardware Implementation of Data Communication Between CAN Controllers for Automotive Applications

Authors: R. M. Kalayappan, N. Kathiravan

Abstract:

In automobile industries, Controller Area Network (CAN) is widely used to reduce the system complexity and inter-task communication. Therefore, this paper proposes the hardware implementation of data frame communication between one controller to other. The CAN data frames and protocols will be explained deeply, here. The data frames are transferred without any collision or corruption. The simulation is made in the KEIL vision software to display the data transfer between transmitter and receiver in CAN. ARM7 micro-controller is used to transfer data’s between the controllers in real time. Data transfer is verified using the CRO.

Keywords: control area network (CAN), automotive electronic control unit, CAN 2.0, industry

Procedia PDF Downloads 369
14878 Effect of Channel Variation of Two-Dimensional Water Tunnel to Study Fluid Dynamics Phenomenon

Authors: Rizka Yunita, Mas Aji Rizki Wijayanto

Abstract:

Computational fluid dynamics (CFD) is the solution to explain how fluid dynamics behavior. In this work, we obtain the effect of channel width of two-dimensional fluid visualization. Using a horizontal water tunnel and flowing soap film, we got a visualization of continuous film that can be observe a graphical overview of the flow that occurs on a space or field in which the fluid flow. The horizontal water tunnel we used, divided into three parts, expansion area, parallel area that used to test the data, and contraction area. The width of channel is the boundary of parallel area with the originally width of 7.2 cm, and the variation of channel width we observed is about 1 cm and its times. To compute the velocity, vortex shedding, and other physical parameters of fluid, we used the cyclinder circular as an obstacle to create a von Karman vortex in fluid and analyzed that phenomenon by using Particle Imaging Velocimetry (PIV) method and comparing Reynolds number and Strouhal number from the visualization we got. More than width the channel, the film is more turbulent and have a separation zones that occurs of uncontinuous flowing fluid.

Keywords: flow visualization, width of channel, vortex, Reynolds number, Strouhal number

Procedia PDF Downloads 341
14877 Developing New Algorithm and Its Application on Optimal Control of Pumps in Water Distribution Network

Authors: R. Rajabpour, N. Talebbeydokhti, M. H. Ahmadi

Abstract:

In recent years, new techniques for solving complex problems in engineering are proposed. One of these techniques is JPSO algorithm. With innovative changes in the nature of the jump algorithm JPSO, it is possible to construct a graph-based solution with a new algorithm called G-JPSO. In this paper, a new algorithm to solve the optimal control problem Fletcher-Powell and optimal control of pumps in water distribution network was evaluated. Optimal control of pumps comprise of optimum timetable operation (status on and off) for each of the pumps at the desired time interval. Maximum number of status on and off for each pumps imposed to the objective function as another constraint. To determine the optimal operation of pumps, a model-based optimization-simulation algorithm was developed based on G-JPSO and JPSO algorithms. The proposed algorithm results were compared well with the ant colony algorithm, genetic and JPSO results. This shows the robustness of proposed algorithm in finding near optimum solutions with reasonable computational cost.

Keywords: G-JPSO, operation, optimization, pumping station, water distribution networks

Procedia PDF Downloads 372
14876 Ulnar Nerve Changes Associated with Carpal Tunnel Syndrome Not Affecting Median versus Ulnar Comparative Studies

Authors: Emmanuel Kamal Aziz Saba, Sarah Sayed El-Tawab

Abstract:

The present study was conducted to assess the involvement of ulnar sensory and/or motor nerve fibers in patients with carpal tunnel syndrome (CTS) and whether this affects the accuracy of the median versus ulnar comparative tests. The present study included 145 CTS hands and 71 asymptomatic control hands. Clinical examination was done. The following tests were done: Sensory conduction studies: median, ulnar and dorsal ulnar cutaneous nerves; and median versus ulnar digit (D) four sensory comparative study; and motor conduction studies: median nerve, ulnar nerve and median versus ulnar motor comparative study. It was found that 17 CTS hands (11.7%) had ulnar sensory abnormalities in 17 different patients. The median versus ulnar sensory and motor comparative studies were abnormal among all these 17 CTS hands. There were significant negative correlations between median motor latency and both ulnar sensory amplitudes recording D5 and D4. In conclusion, there is ulnar sensory nerve abnormality among CTS patients. This abnormality affects the amplitude of ulnar sensory nerve action potential. This does not affect the median versus ulnar sensory and motor comparative tests accuracy for use in CTS.

Keywords: median nerve, motor comparative study, sensory comparative study, ulnar nerve

Procedia PDF Downloads 404
14875 Transmit Power Optimization for Cooperative Beamforming in Reverse-Link MIMO Ad-Hoc Networks

Authors: Younghyun Jeon, Seungjoo Maeng

Abstract:

In the Ad-hoc network, the great interests regarding MIMO scheme leads to their combination, which is also utilized into its applicable network. We manage the field of the problem into Reverse-link MIMO Ad-hoc Network (RMAN) and propose the methodology to maximize the data rate with its power consumption using Node-Cooperative beamforming technique. Based on the result of mathematical optimization formulation, we design the algorithm to construct optimal orthogonal weight vector according to channel feedback and control its transmission power according to QoS-pricing value level. In simulation results, we show the validity of the proposed mathematical optimization result and algorithm which mean that the sum-rate of each link is converged into some point.

Keywords: ad-hoc network, MIMO, cooperative beamforming, transmit power

Procedia PDF Downloads 361
14874 Evaluation of the Performance of ACTIFLO® Clarifier in the Treatment of Mining Wastewaters: Case Study of Costerfield Mining Operations, Victoria, Australia

Authors: Seyed Mohsen Samaei, Shirley Gato-Trinidad

Abstract:

A pre-treatment stage prior to reverse osmosis (RO) is very important to ensure the long-term performance of the RO membranes in any wastewater treatment using RO. This study aims to evaluate the application of the Actiflo® clarifier as part of a pre-treatment unit in mining operations. It involves performing analytical testing on RO feed water before and after installation of Actiflo® unit. Water samples prior to RO plant stage were obtained on different dates from Costerfield mining operations in Victoria, Australia. Tests were conducted in an independent laboratory to determine the concentration of various compounds in RO feed water before and after installation of Actiflo® unit during the entire evaluated period from December 2015 to June 2018. Water quality analysis shows that the quality of RO feed water has remarkably improved since installation of Actiflo® clarifier. Suspended solids (SS) and turbidity removal efficiencies has been improved by 91 and 85 percent respectively in pre-treatment system since the installation of Actiflo®. The Actiflo® clarifier proved to be a valuable part of pre-treatment system prior to RO. It has the potential to conveniently condition the mining wastewater prior to RO unit, and reduce the risk of RO physical failure and irreversible fouling. Consequently, reliable and durable operation of RO unit with minimum requirement for RO membrane replacement is expected with Actiflo® in use.

Keywords: ACTIFLO ® clarifier, mining wastewater, reverse osmosis, water treatment

Procedia PDF Downloads 173
14873 Analysis of the IEEE 802.15.4 MAC Parameters to Achive Lower Packet Loss Rates

Authors: Imen Bouazzi

Abstract:

The IEEE-802.15.4 standard utilizes the CSMA-CA mechanism to control nodes access to the shared wireless communication medium. It is becoming the popular choice for various applications of surveillance and control used in wireless sensor network (WSN). The benefit of this standard is evaluated regarding of the packet loss probability who depends on the configuration of IEEE 802.15.4 MAC parameters and the traffic load. Our exigency is to evaluate the effects of various configurable MAC parameters on the performance of beaconless IEEE 802.15.4 networks under different traffic loads, static values of IEEE 802.15.4 MAC parameters (macMinBE, macMaxCSMABackoffs, and macMaxFrame Retries) will be evaluated. To performance analysis, we use ns-2[2] network simulator.

Keywords: WSN, packet loss, CSMA/CA, IEEE-802.15.4

Procedia PDF Downloads 303
14872 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 64