Search results for: network load
991 Effects and Mechanization of a High Gradient Magnetic Separation Process for Particulate and Microbe Removal from Ballast Water
Authors: Zhijun Ren, Zhang Lin, Zhao Ye, Zuo Xiangyu, Mei Dongxing
Abstract:
As a pretreatment process of ballast water treatment, the performance of high gradient magnetic separation (HGMS) technology for the removal of particulates and microorganisms was studied. The results showed that HGMS process could effectively remove suspended particles larger than 5 µm and had ability to resist impact load. Microorganism could also be effectively removed by HGMS process, and the removal effect increased with increasing magnetic field strength. The maximum removal rates for Escherichia coli (E. coli) and Staphylococcus aureus (S. aureus) were 4016.1% and 9675.3% higher, respectively, than without the magnetic field. In addition, the superoxide dismutase (SOD) activity of the microbes decreased by 32.2% when the magnetic field strength was 15.4 mT for 72 min. The microstructure of the stainless steel wool was investigated, and the results showed that particle removal by HGMS has common function by the magnetic force of the high-strength, high-gradient magnetic field on weakly magnetic particles in the water, and on the stainless steel wool.Keywords: HGMS, particulates, superoxide dismutase activity, steel wool magnetic medium.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 927990 A Case Study of Key-Dependent Permutations in Feistel Ciphers
Authors: Hani Almimi, Ola Osabi, Azman Samsudin
Abstract:
Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposals is the key- dependent S-box which was implemented in some of the high-profile ciphers. In this paper a key-dependent permutation box is proposed and implemented on DES as a case study. The new modified DES, MDES, was tested against Diehard Tests, avalanche test, and performance test. The results showed that in general MDES is more resistible to attacks than DES with negligible overhead. Therefore, it is believed that the proposed key-dependent permutation should be considered as a valuable primitive that can help strengthen the security of Substitution-Permutation Network which is a core design in many Feistel based block ciphers.
Keywords: Block Cipher, Feistel Structure, DES, Diehard Tests, Avalanche Effect.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2010989 Expelling Policy Based Buffer Control during Congestion in Differentiated Service Routers
Authors: Kumar Padmanabh, Rajarshi Roy
Abstract:
In this paper a special kind of buffer management policy is studied where the packet are preempted even when sufficient space is available in the buffer for incoming packets. This is done to congestion for future incoming packets to improve QoS for certain type of packets. This type of study has been done in past for ATM type of scenario. We extend the same for heterogeneous traffic where data rate and size of the packets are very versatile in nature. Typical example of this scenario is the buffer management in Differentiated Service Router. There are two aspects that are of interest. First is the packet size: whether all packets have same or different sizes. Second aspect is the value or space priority of the packets, do all packets have the same space priority or different packets have different space priorities. We present two types of policies to achieve QoS goals for packets with different priorities: the push out scheme and the expelling scheme. For this work the scenario of packets of variable length is considered with two space priorities and main goal is to minimize the total weighted packet loss. Simulation and analytical studies show that, expelling policies can outperform the push out policies when it comes to offering variable QoS for packets of two different priorities and expelling policies also help improve the amount of admissible load. Some other comparisons of push out and expelling policies are also presented using simulations.
Keywords: Buffer Management Policy, Diffserv, ATM, Pushout Policy, Expeling Policy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1395988 Impact of Normative Institutional Factors on Sustainability Reporting
Authors: L. Dagilienė
Abstract:
The article explores the impact of normative institutional factors on the development of sustainability reporting. The vast majority of research in the scientific literature focuses on mandatory institutional factors, i.e. how public institutions and market regulators affect sustainability reporting. Meanwhile, there is lack of empirical data for the impact of normative institutional factors. The effect of normative factors in this paper is based on the role of non-governmental organizations (NGO) and institutional theory. The case of Global Compact Local Network in the developing country was examined. The research results revealed that in the absence of regulated factors, companies were not active with regard to social disclosures; they presented non-systemized social information of a descriptive nature. Only 10% of sustainability reports were prepared using the GRI methodology. None of the reports were assured by third parties.
Keywords: Institutional theory, normative, sustainability reporting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3246987 Cycle Embedding in Folded Hypercubes with More Faulty Elements
Authors: Wen-Yin Huang, Jia-Jie Liu, Jou-Ming Chang
Abstract:
Faults in a network may take various forms such as hardware/software errors, vertex/edge faults, etc. Folded hypercube is a well-known variation of the hypercube structure and can be constructed from a hypercube by adding a link to every pair of nodes with complementary addresses. Let FFv (respectively, FFe) be the set of faulty nodes (respectively, faulty links) in an n-dimensional folded hypercube FQn. Hsieh et al. have shown that FQn - FFv - FFe for n ≥ 3 contains a fault-free cycle of length at least 2n -2|FFv|, under the constraints that (1) |FFv| + |FFe| ≤ 2n - 4 and (2) every node in FQn is incident to at least two fault-free links. In this paper, we further consider the constraints |FFv| + |FFe| ≤ 2n - 3. We prove that FQn - FFv - FFe for n ≥ 5 still has a fault-free cycle of length at least 2n - 2|FFv|, under the constraints : (1) |FFv| + |FFe| ≤ 2n - 3, (2) |FFe| ≥ n + 2, and (3) every vertex is still incident with at least two links.
Keywords: Folded hypercubes, interconnection networks, cycle embedding, faulty elements.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1485986 The Use of Social Networking Sites in eLearning
Authors: Clifford De Raffaele, Luana Bugeja, Serengul Smith
Abstract:
The adaptation of social networking sites within higher education has garnered significant interest in the recent years with numerous researches considering it as a possible shift from the traditional classroom based learning paradigm. Notwithstanding this increase in research and conducted studies however, the adaption of SNS based modules have failed to proliferate within Universities. This paper commences its contribution by analyzing the various models and theories proposed in literature and amalgamate together various effective aspects for the inclusion of social technology within e-Learning. A three phased framework is further proposed which details the necessary considerations for the successful adaptation of SNS in enhancing the students learning experience. This proposal outlines the theoretical foundations which will be analyzed in practical implementation across international university campuses.
Keywords: eLearning, higher education, social network sites, student learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2177985 An Efficient Data Collection Approach for Wireless Sensor Networks
Authors: Hanieh Alipour, Alireza Nemaney Pour
Abstract:
One of the most important applications of wireless sensor networks is data collection. This paper proposes as efficient approach for data collection in wireless sensor networks by introducing Member Forward List. This list includes the nodes with highest priority for forwarding the data. When a node fails or dies, this list is used to select the next node with higher priority. The benefit of this node is that it prevents the algorithm from repeating when a node fails or dies. The results show that Member Forward List decreases power consumption and latency in wireless sensor networks.Keywords: Data Collection, Wireless Sensor Network, SensorNode, Tree-Based
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2409984 Seismic Behavior of Suction Caisson Foundations
Authors: Mohsen Saleh Asheghabadi, Alireza Jafari Jebeli
Abstract:
Increasing population growth requires more sustainable development of energy. This non-contaminated energy has an inexhaustible energy source. One of the vital parameters in such structures is the choice of foundation type. Suction caissons are now used extensively worldwide for offshore wind turbine. Considering the presence of a number of offshore wind farms in earthquake areas, the study of the seismic behavior of suction caisson is necessary for better design. In this paper, the results obtained from three suction caisson models with different diameter (D) and skirt length (L) in saturated sand were compared with centrifuge test results. All models are analyzed using 3D finite element (FE) method taking account of elasto-plastic Mohr–Coulomb constitutive model for soil which is available in the ABAQUS library. The earthquake load applied to the base of models with a maximum acceleration of 0.65g. The results showed that numerical method is in relative good agreement with centrifuge results. The settlement and rotation of foundation decrease by increasing the skirt length and foundation diameter. The sand soil outside the caisson is prone to liquefaction due to its low confinement.
Keywords: Liquefaction, suction caisson foundation, offshore wind turbine, numerical analysis, seismic behavior.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1193983 Titania and Cu-Titania Composite Layer on Graphite Substrate as Negative Electrode for Li-Ion Battery
Authors: Fitria Rahmawati, Nuryani, Liviana Wijayanti
Abstract:
This research study the application of the immobilized TiO2 layer and Cu-TiO2 layer on graphite substrate as a negative electrode or anode for Li-ion battery. The titania layer was produced through chemical bath deposition method, meanwhile Cu particles were deposited electrochemically. A material can be used as an electrode as it has capability to intercalates Li ions into its crystal structure. The Li intercalation into TiO2/Graphite and Cu- TiO2/Graphite were analyzed from the changes of its XRD pattern after it was used as electrode during discharging process. The XRD patterns were refined by Le Bail method in order to determine the crystal structure of the prepared materials. A specific capacity and the cycle ability measurement were carried out to study the performance of the prepared materials as negative electrode of the Li-ion battery. The specific capacity was measured during discharging process from fully charged until the cut off voltage. A 300 was used as a load. The result shows that the specific capacity of Li-ion battery with TiO2/Graphite as negative electrode is 230.87 ± 1.70mAh.g-1 which is higher than the specific capacity of Li-ion battery with pure graphite as negative electrode, i.e 140.75 ±0.46mAh.g-1. Meanwhile deposition of Cu onto TiO2 layer does not increase the specific capacity, and the value even lower than the battery with TiO2/Graphite as electrode. The cycle ability of the prepared battery is only two cycles, due to the Li ribbon which was used as cathode became fragile and easily broken.Keywords: Cu-TiO2, electrode, graphite substrate, Li-ion battery, TiO2 layer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1955982 Three-dimensional Finite Element Analysis of the Front Cross Member of the Peugeot 405
Authors: Kh.Farhangdoust, H.Kamankesh
Abstract:
Undoubtedly, chassis is one of the most important parts of a vehicle. Chassis that today are produced for vehicles are made up of four parts. These parts are jointed together by screwing. Transverse parts are called cross member. This study reviews the stress generated by cyclic laboratory loads in front cross member of Peugeot 405. In this paper the finite element method is used to simulate the welding process and to determine the physical response of the spot-welded joints. Analysis is done by the Abaqus software. The Stresses generated in cross member structure are generally classified into two groups: The stresses remained in form of residual stresses after welding process and the mechanical stress generated by cyclic load. Accordingly the total stress must be obtained by determining residual stress and mechanical stress separately and then sum them according to the superposition principle. In order to improve accuracy, material properties including physical, thermal and mechanical properties were supposed to be temperature-dependent. Simulation shows that maximum Von Misses stresses are located at special points. The model results are then compared to the experimental results which are reported by producing factory and good agreement is observed.Keywords: Chassis, cross member, residual stress, resistancespot weld.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1610981 Repairing and Strengthening Earthquake Damaged RC Beams with Composites
Authors: H. Murat Tanarslan
Abstract:
The dominant judgment for earthquake damaged reinforced concrete (RC) structures is to rebuild them with the new ones. Consequently, this paper estimates if there is chance to repair earthquake RC beams and obtain economical contribution to modern day society. Therefore, the totally damaged (damaged in shear under cyclic load) reinforced concrete (RC) beams repaired and strengthened by externally bonded carbon fibre reinforced polymer (CFRP) strips in this study. Four specimens, apart from the reference beam, were separated into two distinct groups. Two experimental beams in the first group primarily tested up to failure then appropriately repaired and strengthened with CFRP strips. Two undamaged specimens from the second group were not repaired but strengthened by the identical strengthening scheme as the first group for comparison. This study studies whether earthquake damaged RC beams that have been repaired and strengthened will validate similar strength and behavior to equally strengthened, undamaged RC beams. Accordingly, a strength correspondence according to strengthened specimens was acquired for the repaired and strengthened specimens. Test results confirmed that repair and strengthening, which were estimated in the experimental program, were effective for the specimens with the cracking patterns considered in the experimental program.
Keywords: Shear Strengthening, Repairing, CFRP Strips.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2000980 Stabilizing Voltage for Sheens with Motor Loading due to Starting Inductive Motor by using STATCOM
Authors: Mohammad Reza Askari, Mohsen Kazemi, Ali Asghar Baziar
Abstract:
In this treatise we will study the capability of static compensator for reactive power to stabilize sheen voltage with motor loading on power networks system. We also explain the structure and main function of STATCOM and the method to control it using STATCOM transformer current to simultaneously predict after telling about the necessity of FACTS tools to compensate in power networks. Then we study topology and controlling system to stabilize voltage during start of inductive motor. The outcome of stimulat by MATLAB software supports presented controlling idea and system in the treatise.Keywords: Power network, inductive motor, reactive power, stability of voltage, STATCOM, FACTS
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1463979 Sedimentation and its Challenges for Operation and Maintenance of Hydraulic Structures using SHARC Software- A Case Study of Eastern Intake in Dez Diversion Dam in Iran
Authors: M.R. Mansoujian, N. Hedayat, M. Mashal, H, Kiamanesh
Abstract:
Analytical investigation of the sedimentation processes in the river engineering and hydraulic structures is of vital importance as this can affect water supply for the cultivating lands in the command area. The reason being that gradual sediment formation behind the reservoir can reduce the nominal capacity of these dams. The aim of the present paper is to analytically investigate sedimentation process along the river course and behind the storage reservoirs in general and the Eastern Intake of the Dez Diversion weir in particular using the SHARC software. Results of the model indicated the water level at 115.97m whereas the real time measurement from the river cross section was 115.98 m which suggests a significantly close relation between them. The average transported sediment load in the river was measured at 0.25mm , from which it can be concluded that nearly 100% of the suspended loads in river are moving which suggests no sediment settling but indicates that almost all sediment loads enters into the intake. It was further showed the average sediment diameter entering the intake to be 0.293 mm which in turn suggests that about 85% of suspended sediments in the river entre the intake. Comparison of the results from the SHARC model with those obtained form the SSIIM software suggests quite similar outputs but distinguishing the SHARC model as more appropriate for the analysis of simpler problems than other model.Keywords: SHARC, Eastern Intake, Dez Diversion Weir.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1596978 Quality of Service in Multioperator GPON Access Networks with Triple-Play Services
Authors: Germán Santos-Boada, Jordi Domingo-Pascual
Abstract:
Recently, in some places, optical-fibre access networks have been used with GPON technology belonging to organizations (in most cases public bodies) that act as neutral operators. These operators simultaneously provide network services to various telecommunications operators that offer integrated voice, data and television services. This situation creates new problems related to quality of service, since the interests of the users are intermingled with the interests of the operators. In this paper, we analyse this problem and consider solutions that make it possible to provide guaranteed quality of service for voice over IP, data services and interactive digital television.Keywords: GPON networks, multioperator, quality of service, triple-play services.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3433977 Measuring Science and Technology Innovation Capacity in Developing Countries: From a National Innovation System
Authors: Haeng A. Seo, Changseok Oh, Seung Jun Yoo
Abstract:
This study attempts to examine the disparities in S&T innovation capacity from 14 developing countries to discuss how to support specific features in national innovation systems. It includes East-Asian, Middle-Asian, Central American and African countries. Here, we particularly focus on five dimensions- resources, activities, network, environment and performance- with 37 indicators. They were derived as structuring components of the relevant diagnostic model, which encompasses the whole process of S&T innovation from the input of resources to the output of economically valuable results. For many developing nations, economic industries remain weaker than actual S&T capabilities, and relevant regulatory authorities may not exist. This paper will be helpful to provide basic evidence and to set directions for better national S&T Innovation capacities and toward national competitiveness.
Keywords: Developing countries, measurement, NIS, S&T innovation capacity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1455976 Using Radio Frequency Identification Technology in Supply Chain Management
Authors: Eleonora Tudora, Adriana Alexandru
Abstract:
The radio frequency identification (RFID) is a technology for automatic identification of items, particularly in supply chain, but it is becoming increasingly important for industrial applications. Unlike barcode technology that detects the optical signals reflected from barcode labels, RFID uses radio waves to transmit the information from an RFID tag affixed to the physical object. In contrast to today most often use of this technology in warehouse inventory and supply chain, the focus of this paper is an overview of the structure of RFID systems used by RFID technology and it also presents a solution based on the application of RFID for brand authentication, traceability and tracking, by implementing a production management system and extending its use to traders.Keywords: RFID, RFID Tag, Electronic Product Code (EPC), EPC network, Object Naming Service (ONS), Authentication, Traceability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1702975 Review for Identifying Online Opinion Leaders
Authors: Yu Wang
Abstract:
Nowadays, Internet enables its users to share the information online and to interact with others. Facing with numerous information, these Internet users are confused and begin to rely on the opinion leaders’ recommendations. The online opinion leaders are the individuals who have professional knowledge, who utilize the online channels to spread word-of-mouth information and who can affect the attitudes or even the behavior of their followers to some degree. Because utilizing the online opinion leaders is seen as an important approach to affect the potential consumers, how to identify them has become one of the hottest topics in the related field. Hence, in this article, the concepts and characteristics are introduced, and the researches related to identifying opinion leaders are collected and divided into three categories. Finally, the implications for future studies are provided.
Keywords: Online opinion leaders, user attributes analysis, text mining analysis, network structure analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1824974 Biosignal Measurement System Based On Ultra-Wide Band Human Body Communication
Authors: Jonghoon Kim, Gilwon Yoon
Abstract:
A wrist-band type biosignal measurement system and its data transfer through human body communication (HBC) were investigated. An HBC method based on pulses of ultra-wide band instead of using frequency or amplitude modulations was studied and implemented since the system became very compact and it was more suited for personal or mobile health monitoring. Our system measured photo-plethysmogram (PPG) and measured PPG signals were transmitted through a finger to a monitoring PC system. The device was compact and low-power consuming. HBC communication has very strongsecurity measures since it does not use wireless network.Furthermore, biosignal monitoring system becomes handy because it does not need to have wire connections.
Keywords: Biosignal, human body communication, mobile health, PPG, ultrawide band.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2415973 Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes
Authors: Marjan Kuchaki Rafsanjani, Ali Movaghar, Faroukh Koroupi
Abstract:
As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Therefore intrusion detection is one of the possible ways in recognizing a possible attack before the system could be penetrated. All in all, techniques for intrusion detection in old wireless networks are not suitable for MANET. In this paper, we classify the architecture for Intrusion detection systems that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANET presented and compared. We then indicate important future research directions.Keywords: Intrusion Detection System(IDS), Misbehavingnodes, Mobile Ad Hoc Network(MANET), Security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2025972 A Convolutional Deep Neural Network Approach for Skin Cancer Detection Using Skin Lesion Images
Authors: Firas Gerges, Frank Y. Shih
Abstract:
Malignant Melanoma, known simply as Melanoma, is a type of skin cancer that appears as a mole on the skin. It is critical to detect this cancer at an early stage because it can spread across the body and may lead to the patient death. When detected early, Melanoma is curable. In this paper we propose a deep learning model (Convolutional Neural Networks) in order to automatically classify skin lesion images as Malignant or Benign. Images underwent certain pre-processing steps to diminish the effect of the normal skin region on the model. The result of the proposed model showed a significant improvement over previous work, achieving an accuracy of 97%.
Keywords: Deep learning, skin cancer, image processing, melanoma.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1544971 Preliminary Tests on the Buffer Tank for the Vented Liquid Nitrogen Flow of an SRF Module
Authors: Ming-Hsun Tsai, Ming-Chyuan Lin, Fu-Tsai Chung, Ling-Jhen Chen, Yu-Hang Lin, Meng-Shu Yeh, Lee-Long Han
Abstract:
Since 2005, an SRF module of CESR type serves as the accelerating cavity at the Taiwan Light Source in the National Synchrotron Radiation Research Center. A 500-MHz niobium cavity is immersed in liquid helium inside this SRF module. To reduce heat load, the liquid helium vessel is thermally shielded by liquid-nitrogen-cooled copper layer, and the beam chambers are also anchored with pipes of the liquid nitrogen flow in middle of the liquid helium vessel and the vacuum vessel. A strong correlation of the movement of the cavity-s frequency tuner with the temperature variation of parts cooled with liquid nitrogen was observed. A previous study on a spare SRF module with the niobium cavity cooled by liquid nitrogen instead of liquid helium, satisfactory suppression of the thermal oscillation was achieved by attaching a temporary buffer tank for the vented shielding nitrogen flow from the SRF module. In this study, a home-made buffer tank is designed and integrated to the spare SRF module with cavity cooled by liquid helium. Design, construction, integration, and preliminary test results of this buffer tank are presented.Keywords: Cryogenics, flow control, oscillation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1945970 A High-Frequency Low-Power Low-Pass-Filter-Based All-Current-Mirror Sinusoidal Quadrature Oscillator
Authors: A. Leelasantitham, B. Srisuchinwong
Abstract:
A high-frequency low-power sinusoidal quadrature oscillator is presented through the use of two 2nd-order low-pass current-mirror (CM)-based filters, a 1st-order CM low-pass filter and a CM bilinear transfer function. The technique is relatively simple based on (i) inherent time constants of current mirrors, i.e. the internal capacitances and the transconductance of a diode-connected NMOS, (ii) a simple negative resistance RN formed by a resistor load RL of a current mirror. Neither external capacitances nor inductances are required. As a particular example, a 1.9-GHz, 0.45-mW, 2-V CMOS low-pass-filter-based all-current-mirror sinusoidal quadrature oscillator is demonstrated. The oscillation frequency (f0) is 1.9 GHz and is current-tunable over a range of 370 MHz or 21.6 %. The power consumption is at approximately 0.45 mW. The amplitude matching and the quadrature phase matching are better than 0.05 dB and 0.15°, respectively. Total harmonic distortions (THD) are less than 0.3 %. At 2 MHz offset from the 1.9 GHz, the carrier to noise ratio (CNR) is 90.01 dBc/Hz whilst the figure of merit called a normalized carrier-to-noise ratio (CNRnorm) is 153.03 dBc/Hz. The ratio of the oscillation frequency (f0) to the unity-gain frequency (fT) of a transistor is 0.25. Comparisons to other approaches are also included.Keywords: Sinusoidal quadrature oscillator, low-pass-filterbased, current-mirror bilinear transfer function, all-current-mirror, negative resistance, low power, high frequency, low distortion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2070969 Comparison of Different Discontinuous PWM Technique for Switching Losses Reduction in Modular Multilevel Converters
Authors: Kaumil B. Shah, Hina Chandwani
Abstract:
The modular multilevel converter (MMC) is one of the advanced topologies for medium and high-voltage applications. In high-power, high-voltage MMC, a large number of switching power devices are required. These switching power devices (IGBT) considerable switching losses. This paper analyzes the performance of different discontinuous pulse width modulation (DPWM) techniques and compares the results against a conventional carrier based pulse width modulation method, in order to reduce the switching losses of an MMC. The DPWM reference wave can be generated by adding the zero-sequence component to the original (sine) reference modulation signal. The result of the addition gives the reference signal of DPWM techniques. To minimize the switching losses of the MMC, the clamping period is controlled according to the absolute value of the output load current. No switching is generated in the clamping period so overall switching of the power device is reduced. The simulation result of the different DPWM techniques is compared with conventional carrier-based pulse-width modulation technique.Keywords: Modular multilevel converter, discontinuous pulse width modulation, switching losses, zero-sequence voltage.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 919968 An HCI Template for Distributed Applications
Authors: Xizhi Li
Abstract:
Both software applications and their development environment are becoming more and more distributed. This trend impacts not only the way software computes, but also how it looks. This article proposes a Human Computer Interface (HCI) template from three representative applications we have developed. These applications include a Multi-Agent System based software, a 3D Internet computer game with distributed game world logic, and a programming language environment used in constructing distributed neural network and its visualizations. HCI concepts that are common to these applications are described in abstract terms in the template. These include off-line presentation of global entities, entities inside a hierarchical namespace, communication and languages, reconfiguration of entity references in a graph, impersonation and access right, etc. We believe the metaphor that underlies an HCI concept as well as the relationships between a bunch of HCI concepts are crucial to the design of software systems and vice versa.
Keywords: HCI, MAS, computer game, programming language
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1534967 Educational Plan and Program of the Subject Maintenance of Electric Power Equipment
Authors: Rade Ciric, Sasa Mandic
Abstract:
Students of Higher Education Technical School of Professional Studies in Novi Sad follow the subject ‘Maintenance of Electric Power Equipment’ at the Electrotechnical Department. This paper presents educational plan and program of the subject Maintenance of Electric Power Equipment. The course deals with the problems of preventive and investing maintenance of transformer stations (TS), performing and maintenance of grounding of TS and pillars, as well as tracing and detection the location of the cables failure. There is a special elaborated subject concerning the safe work conditions for the electrician during network maintenance, as well as the basics of making and keeping technical documentation of the equipment.
Keywords: Educational plan and program, electric power equipment, maintenance, technical documentation, safe work.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1370966 Fault Tolerance in Wireless Sensor Networks – A Survey
Authors: B. R. Tapas Bapu, K. Thanigaivelu, A. Rajkumar
Abstract:
Wireless Sensor Networks (WSNs) have wide variety of applications and provide limitless future potentials. Nodes in WSNs are prone to failure due to energy depletion, hardware failure, communication link errors, malicious attacks, and so on. Therefore, fault tolerance is one of the critical issues in WSNs. We study how fault tolerance is addressed in different applications of WSNs. Fault tolerant routing is a critical task for sensor networks operating in dynamic environments. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The focus, however, has been given to the routing protocols which might differ depending on the application and network architecture.
Keywords: Resiliency, Self-diagnosis, Smart Grid, TinyOS, WSANs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2729965 Static Voltage Stability Assessment Considering the Power System Contingencies using Continuation Power Flow Method
Authors: Mostafa Alinezhad, Mehrdad Ahmadi Kamarposhti
Abstract:
According to the increasing utilization in power system, the transmission lines and power plants often operate in stability boundary and system probably lose its stable condition by over loading or occurring disturbance. According to the reasons that are mentioned, the prediction and recognition of voltage instability in power system has particular importance and it makes the network security stronger.This paper, by considering of power system contingencies based on the effects of them on Mega Watt Margin (MWM) and maximum loading point is focused in order to analyse the static voltage stability using continuation power flow method. The study has been carried out on IEEE 14-Bus Test System using Matlab and Psat softwares and results are presented.
Keywords: Contingency, Continuation Power Flow, Static Voltage Stability, Voltage Collapse.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2214964 Improved Back Propagation Algorithm to Avoid Local Minima in Multiplicative Neuron Model
Authors: Kavita Burse, Manish Manoria, Vishnu P. S. Kirar
Abstract:
The back propagation algorithm calculates the weight changes of artificial neural networks, and a common approach is to use a training algorithm consisting of a learning rate and a momentum factor. The major drawbacks of above learning algorithm are the problems of local minima and slow convergence speeds. The addition of an extra term, called a proportional factor reduces the convergence of the back propagation algorithm. We have applied the three term back propagation to multiplicative neural network learning. The algorithm is tested on XOR and parity problem and compared with the standard back propagation training algorithm.Keywords: Three term back propagation, multiplicative neuralnetwork, proportional factor, local minima.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2816963 Tuning for a Small Engine with a Supercharger
Authors: Shinji Kajiwara, Tadamasa Fukuoka
Abstract:
The formula project of Kinki University has been involved in the student Formula SAE of Japan (JSAE) since the second year the competition was held. The vehicle developed in the project uses a ZX-6R engine, which has been manufactured by Kawasaki Heavy Industries for the JSAE competition for the eighth time. The limited performance of the concept vehicle was improved through the development of a power train. The supercharger loading, engine dry sump, and engine cooling management of the vehicle were also enhanced. The supercharger loading enabled the vehicle to achieve a maximum output of 59.6 kW (80.6 PS)/9000 rpm and a maximum torque of 70.6 Nm (7.2 kgf m)/8000 rpm. We successfully achieved 90% of the engine’s torque band (4000–10000 rpm) with 50% of the revolutions in regular engine use (2000–12000 rpm). Using a dry sump system, we periodically managed hydraulic pressure during engine operation. A system that controls engine stoppage when hydraulic pressure falls was also constructed. Using the dry sump system at 80 mm reduced the required engine load and the vehicle’s center of gravity. Even when engine motion was suspended by the electromotive force exerted by the water pump, the circulation of cooling water was still possible. These findings enabled us to create a cooling system in accordance with the requirements of the competition.
Keywords: Engine, combustion, cooling system, dry sump system, numerical simulation, power, torque, mechanical supercharger.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2128962 Prediction of Location of High Energy Shower Cores using Artificial Neural Networks
Authors: Gitanjali Devi, Kandarpa Kumar Sarma, Pranayee Datta, Anjana Kakoti Mahanta
Abstract:
Artificial Neural Network (ANN)s can be modeled for High Energy Particle analysis with special emphasis on shower core location. The work describes the use of an ANN based system which has been configured to predict locations of cores of showers in the range 1010.5 to 1020.5 eV. The system receives density values as inputs and generates coordinates of shower events recorded for values captured by 20 core positions and 80 detectors in an area of 100 meters. Twenty ANNs are trained for the purpose and the positions of shower events optimized by using cooperative ANN learning. The results derived with variations of input upto 50% show success rates in the range of 90s.Keywords: EAS, Shower, Core, ANN, Location.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1306