Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 527

Search results for: turbo codes

527 Performance of VSAT MC-CDMA System Using LDPC and Turbo Codes over Multipath Channel

Authors: Hassan El Ghazi, Mohammed El Jourmi, Tayeb Sadiki, Esmail Ahouzi

Abstract:

The purpose of this paper is to model and analyze a geostationary satellite communication system based on VSAT network and Multicarrier CDMA system scheme which presents a combination of multicarrier modulation scheme and CDMA concepts. In this study the channel coding strategies (Turbo codes and LDPC codes) are adopted to achieve good performance due to iterative decoding. The envisaged system is examined for a transmission over Multipath channel with use of Ku band in the uplink case. The simulation results are obtained for each different case. The performance of the system is given in terms of Bit Error Rate (BER) and energy per bit to noise power spectral density ratio (Eb/N0). The performance results of designed system shown that the communication system coded with LDPC codes can achieve better error rate performance compared to VSAT MC-CDMA system coded with Turbo codes.

Keywords: satellite communication, VSAT Network, MC-CDMA, LDPC codes, turbo codes, uplink

Procedia PDF Downloads 387
526 Low Density Parity Check Codes

Authors: Kassoul Ilyes

Abstract:

The field of error correcting codes has been revolutionized by the introduction of iteratively decoded codes. Among these, LDPC codes are now a preferred solution thanks to their remarkable performance and low complexity. The binary version of LDPC codes showed even better performance, although it’s decoding introduced greater complexity. This thesis studies the performance of binary LDPC codes using simplified weighted decisions. Information is transported between a transmitter and a receiver by digital transmission systems, either by propagating over a radio channel or also by using a transmission medium such as the transmission line. The purpose of the transmission system is then to carry the information from the transmitter to the receiver as reliably as possible. These codes have not generated enough interest within the coding theory community. This forgetfulness will last until the introduction of Turbo-codes and the iterative principle. Then it was proposed to adopt Pearl's Belief Propagation (BP) algorithm for decoding these codes. Subsequently, Luby introduced irregular LDPC codes characterized by a parity check matrix. And finally, we study simplifications on binary LDPC codes. Thus, we propose a method to make the exact calculation of the APP simpler. This method leads to simplifying the implementation of the system.

Keywords: LDPC, parity check matrix, 5G, BER, SNR

Procedia PDF Downloads 58
525 Dynamic Analysis of Turbo Machinery Foundation for Different Rotating Speed

Authors: Sungyani Tripathy, Atul Desai

Abstract:

Turbo machinery Frame Foundation is very important for power generation, gas, steam, hydro, geothermal and nuclear power plants. The Turbo machinery Foundation system was simulated in SAP: 2000 software and dynamic response of foundation was analysed. In this paper, the detailed study of turbo machinery foundation with different running speed has considered. The different revolution per minute considered in this study is 4000 rpm, 6000 rpm, 8000 rpm, 1000 rpm and 12000 rpm. The above analysis has been carried out considering Winkler spring soil model, solid finite element modelling and dynamic analysis of Turbo machinery foundations. The comparison of frequency and time periods at various mode shapes are addressed in this study. Current work investigates the effect of damping on the response spectra curve at the foundation top deck, considering the dynamic machine load. It has been found that turbo generator foundation with haunches remains more elastic during seismic action for different running speeds.

Keywords: turbo machinery, SAP: 2000, response spectra, running speeds

Procedia PDF Downloads 184
524 Tailoring the Parameters of the Quantum MDS Codes Constructed from Constacyclic Codes

Authors: Jaskarn Singh Bhullar, Divya Taneja, Manish Gupta, Rajesh Kumar Narula

Abstract:

The existence conditions of dual containing constacyclic codes have opened a new path for finding quantum maximum distance separable (MDS) codes. Using these conditions parameters of length n=(q²+1)/2 quantum MDS codes were improved. A class of quantum MDS codes of length n=(q²+q+1)/h, where h>1 is an odd prime, have also been constructed having large minimum distance and these codes are new in the sense as these are not available in the literature.

Keywords: hermitian construction, constacyclic codes, cyclotomic cosets, quantum MDS codes, singleton bound

Procedia PDF Downloads 277
523 Performance Comparison of Non-Binary RA and QC-LDPC Codes

Authors: Ni Wenli, He Jing

Abstract:

Repeat–Accumulate (RA) codes are subclass of LDPC codes with fast encoder structures. In this paper, we consider a nonbinary extension of binary LDPC codes over GF(q) and construct a non-binary RA code and a non-binary QC-LDPC code over GF(2^4), we construct non-binary RA codes with linear encoding method and non-binary QC-LDPC codes with algebraic constructions method. And the BER performance of RA and QC-LDPC codes over GF(q) are compared with BP decoding and by simulation over the Additive White Gaussian Noise (AWGN) channels.

Keywords: non-binary RA codes, QC-LDPC codes, performance comparison, BP algorithm

Procedia PDF Downloads 282
522 Technical and Economic Analysis Effects of Various Parameters on the Performance of Heat Recovery System on Gas Complex Turbo Generators

Authors: Hefzollah Mohammadian, Mohammad Bagher Heidari

Abstract:

This paper deals with the technical and economic effects of various parameters on the performance of heat recovery system on gas complex turbo generator. Given the importance of this issue, that is the main goal of economic efficiency and reduces costs; this project has been implemented similar plans in which the target is the implementation of specific patterns. The project will also help us in the process of gas refineries and the actual efficiency of the process after adding a system to analyze the turbine and predict potential problems and fix them and take appropriate measures according to the results of simulation analysis and results of the process gain. The results of modeling and the effect of different parameters on this line, have been done using Thermo Flow.

Keywords: turbo compressor, turbo generator, heat recovery boiler, gas turbines

Procedia PDF Downloads 229
521 A Characterization of Skew Cyclic Code with Complementary Dual

Authors: Eusebio Jr. Lina, Ederlina Nocon

Abstract:

Cyclic codes are a fundamental subclass of linear codes that enjoy a very interesting algebraic structure. The class of skew cyclic codes (or θ-cyclic codes) is a generalization of the notion of cyclic codes. This a very large class of linear codes which can be used to systematically search for codes with good properties. A linear code with complementary dual (LCD code) is a linear code C satisfying C ∩ C^⊥ = {0}. This subclass of linear codes provides an optimum linear coding solution for a two-user binary adder channel and plays an important role in countermeasures to passive and active side-channel analyses on embedded cryptosystems. This paper aims to identify LCD codes from the class of skew cyclic codes. Let F_q be a finite field of order q, and θ be an automorphism of F_q. Some conditions for a skew cyclic code to be LCD were given. To this end, the properties of a noncommutative skew polynomial ring F_q[x, θ] of automorphism type were revisited, and the algebraic structure of skew cyclic code using its skew polynomial representation was examined. Using the result that skew cyclic codes are left ideals of the ring F_q[x, θ]/〈x^n-1〉, a characterization of a skew cyclic LCD code of length n was derived. A necessary condition for a skew cyclic code to be LCD was also given.

Keywords: LCD cyclic codes, skew cyclic LCD codes, skew cyclic complementary dual codes, theta-cyclic codes with complementary duals

Procedia PDF Downloads 198
520 Mitigation of Interference in Satellite Communications Systems via a Cross-Layer Coding Technique

Authors: Mario A. Blanco, Nicholas Burkhardt

Abstract:

An important problem in satellite communication systems which operate in the Ka and EHF frequency bands consists of the overall degradation in link performance of mobile terminals due to various types of degradations in the link/channel, such as fading, blockage of the link to the satellite (especially in urban environments), intentional as well as other types of interference, etc. In this paper, we focus primarily on the interference problem, and we develop a very efficient and cost-effective solution based on the use of fountain codes. We first introduce a satellite communications (SATCOM) terminal uplink interference channel model that is classically used against communication systems that use spread-spectrum waveforms. We then consider the use of fountain codes, with focus on Raptor codes, as our main mitigation technique to combat the degradation in link/receiver performance due to the interference signal. The performance of the receiver is obtained in terms of average probability of bit and message error rate as a function of bit energy-to-noise density ratio, Eb/N0, and other parameters of interest, via a combination of analysis and computer simulations, and we show that the use of fountain codes is extremely effective in overcoming the effects of intentional interference on the performance of the receiver and associated communication links. We then show this technique can be extended to mitigate other types of SATCOM channel degradations, such as those caused by channel fading, shadowing, and hard-blockage of the uplink signal.

Keywords: SATCOM, interference mitigation, fountain codes, turbo codes, cross-layer

Procedia PDF Downloads 258
519 Skew Cyclic Codes over Fq+uFq+…+uk-1Fq

Authors: Jing Li, Xiuli Li

Abstract:

This paper studies a special class of linear codes, called skew cyclic codes, over the ring R= Fq+uFq+…+uk-1Fq, where q is a prime power. A Gray map ɸ from R to Fq and a Gray map ɸ' from Rn to Fnq are defined, as well as an automorphism Θ over R. It is proved that the images of skew cyclic codes over R under map ɸ' and Θ are cyclic codes over Fq, and they still keep the dual relation.

Keywords: skew cyclic code, gray map, automorphism, cyclic code

Procedia PDF Downloads 148
518 A Novel Way to Create Qudit Quantum Error Correction Codes

Authors: Arun Moorthy

Abstract:

Quantum computing promises to provide algorithmic speedups for a number of tasks; however, similar to classical computing, effective error-correcting codes are needed. Current quantum computers require costly equipment to control each particle, so having fewer particles to control is ideal. Although traditional quantum computers are built using qubits (2-level systems), qudits (more than 2-levels) are appealing since they can have an equivalent computational space using fewer particles, meaning fewer particles need to be controlled. Currently, qudit quantum error-correction codes are available for different level qudit systems; however, these codes have sometimes overly specific constraints. When building a qudit system, it is important for researchers to have access to many codes to satisfy their requirements. This project addresses two methods to increase the number of quantum error correcting codes available to researchers. The first method is generating new codes for a given set of parameters. The second method is generating new error-correction codes by using existing codes as a starting point to generate codes for another level (i.e., a 5-level system code on a 2-level system). So, this project builds a website that researchers can use to generate new error-correction codes or codes based on existing codes.

Keywords: qudit, error correction, quantum, qubit

Procedia PDF Downloads 64
517 Upgrading of Old Large Turbo Generators

Authors: M. Shadmand, T. Enayaty Ahangar, S. Kazemi

Abstract:

Insulation system of electrical machineries is the most critical point for their durability. Depending on generator nominal voltage, its insulation system is designed. In this research, a new stator insulation system is designed by new type of mica tapes which will consequently enables us to decrease the nominal ground-wall insulation thickness for the same voltage level. By keeping constant the slot area, it will be possible to increase the copper value in stator bars which will consequently able us to increase the nominal output current of turbo-generator. This will affect the cooling capability of machinery to some extent. But by considering the thermal conductivity of new insulating system which is improved, it is possible to increase the output power of generator up to 6% more. This research is done practically on a 200 MVA and 15.75 kV turbo-generators which its insulating system is Resin Rich (RR).

Keywords: insulation system, resin rich, VPI, upgrading

Procedia PDF Downloads 425
516 On the Construction of Some Optimal Binary Linear Codes

Authors: Skezeer John B. Paz, Ederlina G. Nocon

Abstract:

Finding an optimal binary linear code is a central problem in coding theory. A binary linear code C = [n, k, d] is called optimal if there is no linear code with higher minimum distance d given the length n and the dimension k. There are bounds giving limits for the minimum distance d of a linear code of fixed length n and dimension k. The lower bound which can be taken by construction process tells that there is a known linear code having this minimum distance. The upper bound is given by theoretic results such as Griesmer bound. One way to find an optimal binary linear code is to make the lower bound of d equal to its higher bound. That is, to construct a binary linear code which achieves the highest possible value of its minimum distance d, given n and k. Some optimal binary linear codes were presented by Andries Brouwer in his published table on bounds of the minimum distance d of binary linear codes for 1 ≤ n ≤ 256 and k ≤ n. This was further improved by Markus Grassl by giving a detailed construction process for each code exhibiting the lower bound. In this paper, we construct new optimal binary linear codes by using some construction processes on existing binary linear codes. Particularly, we developed an algorithm applied to the codes already constructed to extend the list of optimal binary linear codes up to 257 ≤ n ≤ 300 for k ≤ 7.

Keywords: bounds of linear codes, Griesmer bound, construction of linear codes, optimal binary linear codes

Procedia PDF Downloads 496
515 Maximum Distance Separable b-Symbol Repeated-Root γ-Constacylic Codes over a Finite Chain Ring of Length 2

Authors: Jamal Laaouine, Mohammed Elhassani Charkani

Abstract:

Let p be a prime and let b be an integer. MDS b-symbol codes are a direct generalization of MDS codes. The γ-constacyclic codes of length pˢ over the finite commutative chain ring Fₚm [u]/ < u² > had been classified into four distinct types, where is a nonzero element of the field Fₚm. Let C₃ be a code of Type 3. In this paper, we obtain the b-symbol distance db(C₃) of the code C₃. Using this result, necessary and sufficient conditions under which C₃ is an MDS b-symbol code are given.

Keywords: constacyclic code, repeated-root code, maximum distance separable, MDS codes, b-symbol distance, finite chain rings

Procedia PDF Downloads 47
514 Performance Evaluation of One and Two Dimensional Prime Codes for Optical Code Division Multiple Access Systems

Authors: Gurjit Kaur, Neena Gupta

Abstract:

In this paper, we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension, i.e. time slots, whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research, we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for Optical Code Division Multiple Access (OCDMA) system on a single platform. Analysis shows that 2D prime code supports lesser number of active users than 1D codes, but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 254
513 Performance Analysis and Comparison of Various 1-D and 2-D Prime Codes for OCDMA Systems

Authors: Gurjit Kaur, Shashank Johri, Arpit Mehrotra

Abstract:

In this paper we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension i.e. time slots whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for OCDMA system on a single platform. Results shows that 1D Extended Prime Code (EPC) can support more number of active users compared to other codes but at the expense of larger code length which further increases the complexity of the code. Modified Prime Code (MPC) supports lesser number of active users at λc=2 but it has a lesser code length as compared to 1D prime code. Analysis shows that 2D prime code supports lesser number of active users than 1D codes but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 385
512 Simulation Analysis of Wavelength/Time/Space Codes Using CSRZ and DPSK-RZ Formats for Fiber-Optic CDMA Systems

Authors: Jaswinder Singh

Abstract:

In this paper, comparative analysis is carried out to study the performance of wavelength/time/space optical CDMA codes using two well-known formats; those are CSRZ and DPSK-RZ using RSoft’s OptSIM. The analysis is carried out under the real-like scenario considering the presence of various non-linear effects such as XPM, SPM, SRS, SBS and FWM. Fiber dispersion and the multiple access interference are also considered. The codes used in this analysis are 3-D wavelength/time/space codes. These are converted into 2-D wavelength-time codes so that their requirement of space couplers and fiber ribbons is eliminated. Under the conditions simulated, this is found that CSRZ performs better than DPSK-RZ for fiber-optic CDMA applications.

Keywords: Optical CDMA, Multiple access interference (MAI), CSRZ, DPSK-RZ

Procedia PDF Downloads 563
511 Numerical Investigation into the Effect of Axial Fan Blade Angle on the Fan Performance

Authors: Shayan Arefi, Qadir Esmaili, Seyed Ali Jazayeri

Abstract:

The performance of cooling system affects on efficiency of turbo generators and temperature of winding. Fan blade is one of the most important components of cooling system which plays a significant role in ventilation of generators. Fan performance curve depends on the blade geometry and boundary condition. This paper calculates numerically the performance curve of axial flow fan mounted on turbo generator with 160 MW output power. The numerical calculation was implemented by Ansys-workbench software. The geometrical model of blade was created by bladegen, grid generation and configuration was made by turbogrid and finally, the simulation was implemented by CFX. For the first step, the performance curves consist of pressure rise and efficiency flow rate were calculated in the original angle of blade. Then, by changing the attack angle of blade, the related performance curves were calculated. CFD results for performance curve of each angle show a good agreement with experimental results. Additionally, the field velocity and pressure gradient of flow near the blade were investigated and simulated numerically with varying of angle.

Keywords: turbo generator, axial fan, Ansys, performance

Procedia PDF Downloads 299
510 Optimization and Analysis of Heat Recovery System on Gas Complex Turbo Generators

Authors: Ensieh Hajeb, Hefzollah Mohammadiyan, Mohamad Baqer Heidari

Abstract:

In this paper layout plans and determine the best place to install a heat recovery boilers , gas turbines , and simulation models built to evaluate the performance of the design and operating conditions, heat recovery boiler design using model built on the basis of operating conditions , the effect of various parameters on the performance of the designed heat recovery boiler , heat recovery boiler installation was designed to evaluate the technical and economic impact on performance would be Turbo generator. Given the importance of this issue, that is the main goal of economic efficiency and reduces costs; this project has been implemented similar plans in which the target is implementation specific patterns. The project will also help us in the process of gas refineries and the actual efficiency of the process after adding a system to analyze the turbine and predict potential problems and how to fix them and appropriate measures according to the results of simulation analysis and results of the process gain. The results of modeling and the effect of different parameters on this line, the software has been ThermoFlow.

Keywords: boiler, gas turbine, turbo generator, power flow

Procedia PDF Downloads 336
509 Usage of Channel Coding Techniques for Peak-to-Average Power Ratio Reduction in Visible Light Communications Systems

Authors: P. L. D. N. M. de Silva, S. G. Edirisinghe, R. Weerasuriya

Abstract:

High peak-to-average power ratio (PAPR) is a concern of orthogonal frequency division multiplexing (OFDM) based visible light communication (VLC) systems. Discrete Fourier Transform spread (DFT-s) OFDM is an alternative single carrier modulation scheme which would address this concern. Employing channel coding techniques is another mechanism to reduce the PAPR. Previous research has been conducted to study the impact of these techniques separately. However, to the best of the knowledge of the authors, no study has been done so far to identify the improvement which can be harnessed by hybridizing these two techniques for VLC systems. Therefore, this is a novel study area under this research. In addition, channel coding techniques such as Polar codes and Turbo codes have been tested in the VLC domain. However, other efficient techniques such as Hamming coding and Convolutional coding have not been studied too. Therefore, the authors present the impact of the hybrid of DFT-s OFDM and Channel coding (Hamming coding and Convolutional coding) on PAPR in VLC systems using Matlab simulations.

Keywords: convolutional coding, discrete Fourier transform spread orthogonal frequency division multiplexing, hamming coding, peak-to-average power ratio, visible light communications

Procedia PDF Downloads 31
508 Constructions of Linear and Robust Codes Based on Wavelet Decompositions

Authors: Alla Levina, Sergey Taranov

Abstract:

The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.

Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability

Procedia PDF Downloads 359
507 Corporate Codes of Ethics and Earnings Discretion: International Evidence

Authors: Chu Chen, Giorgio Gotti, Tony Kang, Michael Wolfe

Abstract:

This study examines the role of codes of ethics in reducing the extent to which managers’ act opportunistically in reporting earnings. Corporate codes of ethics, by clarifying the boundaries of ethical corporate behaviors and making relevant social norms more salient, have the potential to deter managers from engaging in opportunistic financial reporting practices. In a sample of international companies, we find that the quality of corporate codes of ethics is associated with higher earnings quality, i.e., lower discretionary accruals. Our results are confirmed for a subsample of firms more likely to be engaging in opportunistic reporting behavior, i.e., firms that just meet or beat analysts’ forecasts. Further, codes of ethics play a greater role in reducing earnings management for firms in countries with weaker investor protection mechanisms. Our results suggest that corporate codes of ethics can be a viable alternative to country-level investor protection mechanisms in curbing aggressive reporting behaviors.

Keywords: corporate ethics policy, code of ethics, business ethics, earnings discretion, accruals

Procedia PDF Downloads 204
506 A Simple Recursive Framework to Generate Gray Codes for Weak Orders in Constant Amortized Time

Authors: Marsden Jacques, Dennis Wong

Abstract:

A weak order is a way to rank n objects where ties are allowed. In this talk, we present a recursive framework to generate Gray codes for weak orders. We then describe a simple algorithm based on the framework that generates 2-Gray codes for weak orders in constant amortized time per string. This framework can easily be modified to generate other Gray codes for weak orders. We provide an example on using the framework to generate the first Shift Gray code for weak orders, also in constant amortized time, where consecutive strings differ by a shift or a symbol change.

Keywords: weak order, Cayley permutation, Gray code, shift Gray code

Procedia PDF Downloads 57
505 A Morphological Analysis of Swardspeak in the Philippines

Authors: Carlo Gadingan

Abstract:

Swardspeak, as a language, highlights the exclusive identity of the Filipino gay men and the oppression they are confronted in the society. This paper presents a morphological analysis of swardspeak in the Philippines. Specifically, it aims to find out the common morphological processes involved in the construction of codes that may unmask the nature of swardspeak as a language. 30 purposively selected expert users of swardspeak from Luzon, Visayas, and Mindanao were asked to codify 30 natural words through the Facebook Messenger application. The results of the structural analysis affirm that swardspeak follows no specific rules revealing complicated combinations of clipping/stylized clipping, borrowing, connotation through images, connotation through actions, connotation through sounds, affixation, repetition, substitution, and simple reversal. Moreover, it was also found out that most of these word formation processes occur in all word classes which indicate that swardspeak is very unpredictable. Although different codes are used for the same words, there are still codes that are really common to all homosexuals and these are Chaka (ugly), Crayola (cry), and Aida (referring to a person with AIDS). Hence, the prevailing word formation processes explored may be termed as observed time-specific patterns because the codes documented in this study may turn obsolete and may be replaced with novel ones in a matter of weeks to month, knowing the creativity of homosexuals and the multiplicity of societal resources which can be used to make the codes more opaque and more confusing for non-homosexuals.

Keywords: codes, homosexuals, morphological processes, swardspeak

Procedia PDF Downloads 59
504 Evaluating of Design Codes for Circular High Strength Concrete-Filled Steel Tube Columns

Authors: Soner Guler, Eylem Guzel, Mustafa Gülen

Abstract:

Recently, concrete-filled steel tube columns are highly popular in high-rise buildings. The main aim of this study is to evaluate the axial load capacities of circular high strength concrete-filled steel tube columns according to Eurocode 4 (EC4) and American Concrete Institute (ACI) design codes. The axial load capacities of fifteen concrete-filled steel tubes stub columns were compared with design codes EU4 and ACI. The results showed that the EC4 overestimate the axial load capacity for all the specimens.

Keywords: concrete-filled steel tube column, axial load capacity, Eurocode 4, ACI design codes

Procedia PDF Downloads 215
503 Analysis of Possible Equipment in the Reduction Unit of a Low Tonnage Liquefied Natural Gas Production Plant

Authors: Pavel E. Mikriukov

Abstract:

The demand for natural gas (NG) is increasing every year around the world, so it is necessary to produce and transport NG in large quantities. To solve this problem, liquefied natural gas (LNG) plants are used, using different equipment and different technologies to achieve the required LNG quality. To determine the best efficiency of the LNG liquefaction plant, it is necessary to analyze the equipment used in this process and identify other technological solutions for LNG production using more productive and energy-efficient equipment. Based on this, mathematical models of the technological process of the LNG plant were created, which are based on a two-circuit system of heat exchange equipment and a nitrogen isolated cycle for NG cooling. The final liquefaction of natural gas is performed on the construction of the basic principle of the Joule-Thompson effect. The pressure and temperature drop are considered on different types of equipment such as throttle valve, which was used in the basic scheme; turbo expander and supersonic separator, which act as new equipment, to be compared with the efficiency of the basic scheme of the unit. New configurations of LNG plants are suggested, which can be used in almost all LNG facilities. As a result of the analysis, it turned out that the turbo expander and the supersonic separator have comparatively equal potential in comparison with the baseline scheme execution on the throttle valve. A more rational method of selecting the technology and the equipment used for natural gas liquefaction can improve the efficiency of low-tonnage plants and reduce the cost of gas for own needs.

Keywords: gas liquefaction, gas, Joule-Thompson effect, LNG, low-tonnage LNG, supersonic separator, Throttle valve, turbo expander

Procedia PDF Downloads 9
502 The Non-Existence of Perfect 2-Error Correcting Lee Codes of Word Length 7 over Z

Authors: Catarina Cruz, Ana Breda

Abstract:

Tiling problems have been capturing the attention of many mathematicians due to their real-life applications. In this study, we deal with tilings of Zⁿ by Lee spheres, where n is a positive integer number, being these tilings related with error correcting codes on the transmission of information over a noisy channel. We focus our attention on the question ‘for what values of n and r does the n-dimensional Lee sphere of radius r tile Zⁿ?’. It seems that the n-dimensional Lee sphere of radius r does not tile Zⁿ for n ≥ 3 and r ≥ 2. Here, we prove that is not possible to tile Z⁷ with Lee spheres of radius 2 presenting a proof based on a combinatorial method and faithful to the geometric idea of the problem. The non-existence of such tilings has been studied by several authors being considered the most difficult cases those in which the radius of the Lee spheres is equal to 2. The relation between these tilings and error correcting codes is established considering the center of a Lee sphere as a codeword and the other elements of the sphere as words which are decoded by the central codeword. When the Lee spheres of radius r centered at elements of a set M ⊂ Zⁿ tile Zⁿ, M is a perfect r-error correcting Lee code of word length n over Z, denoted by PL(n, r). Our strategy to prove the non-existence of PL(7, 2) codes are based on the assumption of the existence of such code M. Without loss of generality, we suppose that O ∈ M, where O = (0, ..., 0). In this sense and taking into account that we are dealing with Lee spheres of radius 2, O covers all words which are distant two or fewer units from it. By the definition of PL(7, 2) code, each word which is distant three units from O must be covered by a unique codeword of M. These words have to be covered by codewords which dist five units from O. We prove the non-existence of PL(7, 2) codes showing that it is not possible to cover all the referred words without superposition of Lee spheres whose centers are distant five units from O, contradicting the definition of PL(7, 2) code. We achieve this contradiction by combining the cardinality of particular subsets of codewords which are distant five units from O. There exists an extensive literature on codes in the Lee metric. Here, we present a new approach to prove the non-existence of PL(7, 2) codes.

Keywords: Golomb-Welch conjecture, Lee metric, perfect Lee codes, tilings

Procedia PDF Downloads 78
501 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 345
500 Better Defined WHO International Classification of Disease Codes for Relapsing Fever Borreliosis, and Lyme Disease Education Aiding Diagnosis, Treatment Improving Human Right to Health

Authors: Mualla McManus, Jenna Luche Thaye

Abstract:

World Health Organisation International Classification of Disease codes were created to define disease including infections in order to guide and educate diagnosticians. Most infectious diseases such as syphilis are clearly defined by their ICD 10 codes and aid/help to educate the clinicians in syphilis diagnosis and treatment globally. However, current ICD 10 codes for relapsing fever Borreliosis and Lyme disease are less clearly defined and can impede appropriate diagnosis especially if the clinician is not familiar with the symptoms of these infectious diseases. This is despite substantial number of scientific articles published in peer-reviewed journals about relapsing fever and Lyme disease. In the USA there are estimated 380,000 people annually contacting Lyme disease, more cases than breast cancer and 6x HIV/AIDS cases. This represents estimated 0.09% of the USA population. If extrapolated to the global population (7billion), 0.09% equates to 63 million people contracting relapsing fever or Lyme disease. In many regions, the rate of contracting some form of infection from tick bite may be even higher. Without accurate and appropriate diagnostic codes, physicians are impeded in their ability to properly care for their patients, leaving those patients invisible and marginalized within the medical system and to those guiding public policy. This results in great personal hardship, pain, disability, and expense. This unnecessarily burdens health care systems, governments, families, and society as a whole. With accurate diagnostic codes in place, robust data can guide medical and public health research, health policy, track mortality and save health care dollars. Better defined ICD codes are the way forward in educating the diagnosticians about relapsing fever and Lyme diseases.

Keywords: WHO ICD codes, relapsing fever, Lyme diseases, World Health Organisation

Procedia PDF Downloads 109
499 Behavior of the RC Slab Subjected to Impact Loading According to the DIF

Authors: Yong Jae Yu, Jae-Yeol Cho

Abstract:

In the design of structural concrete for impact loading, design or model codes often employ a dynamic increase factor (DIF) to impose dynamic effect on static response. Dynamic increase factors that are obtained from laboratory material test results and that are commonly given as a function of strain rate only are quite different from each other depending on the design concept of design codes like ACI 349M-06, fib Model Code 2010 and ACI 370R-14. Because the dynamic increase factors currently adopted in the codes are too simple and limited to consider a variety of strength of materials, their application in practical design is questionable. In this study, the dynamic increase factors used in the three codes were validated through the finite element analysis of reinforced concrete slab elements which were tested and reported by other researcher. The test was intended to simulate a wall element of the containment building in nuclear power plants that is assumed to be subject to impact scenario that the Pentagon experienced on September 11, 2001. The finite element analysis was performed using the ABAQAUS 6.10 and the plasticity models were employed for the concrete, reinforcement. The dynamic increase factors given in the three codes were applied to the stress-strain curves of the materials. To estimate the dynamic increase factors, strain rate was adopted as a parameter. Comparison of the test and analysis was done with regard to perforation depth, maximum deflection, and surface crack area of the slab. Consequently, it was found that DIF has so great an effect on the behavior of the reinforced concrete structures that selection of DIF should be very careful. The result implies that DIF should be provided in design codes in more delicate format considering various influence factors.

Keywords: impact, strain rate, DIF, slab elements

Procedia PDF Downloads 223
498 Treaties-Fulfilled or Breached: A Study for Peacefulness of Religions

Authors: Syed A. Alam, Arifa Bilal

Abstract:

A propagated wave of barbaric and injustice Muslims has been popularized by the International powers in the recent past to divert the winning force of Muslims in the Afghan war against Russia. It is a tactic to demolish the power of Jihaad and the religious image of Islam. The propaganda picturized that Muslims were not peaceful or trustworthy people by displaying some brutal actions of a little number of funded people. The word ‘Islam’ is titled as ‘complete codes of life’ because of the peacefulness and trustworthiness of these codes for whole lives. These codes help the whole of humanity beyond the boundaries of any religion, sect, creed, color, geography, or race to lead their lives peacefully and trustfully. The human beings who act upon these codes of life, Islam, can be called Muslims. Those people are not Muslims who do not act upon these codes of life. History is evident that the Muslims proved themselves, collectively, that they are acting upon these codes of life. In this article, an analytical study was conducted regarding popular treaties signed between Muslims and non-Muslim communities in different times and regions on different matters. The study included the treaties of Hudabiyah Treaty, Mithaq-e-Madinah, Lucknow Pact, Indus Water Pact, Air Space Violation Treaty, Gallipoli Treaty, Amity Treaty, US-Russia Peace Treaty, and Wadi Arab Peace Treaty. After critical analysis of these treaties, it can be clearly concluded that Muslims fulfilled these treatises, but non-Muslim stakeholders of these treaties broke these treaties in one aspect or many and in the start or later. It can be concluded that the history of treaties between Muslim and non-Muslim communities declared that Muslims had fulfilled these treaties and pacts, so they are more trustworthy and peaceful people.

Keywords: fulfilled treaties, Muslim and non-muslim pacts, Islam and peacefulness, Islam and treaties

Procedia PDF Downloads 60