Search results for: indoor wireless systems.
1352 Spatial Correlation of Channel State Information in Real LoRa Measurement
Authors: Ahmed Abdelghany, Bernard Uguen, Christophe Moy, Dominique Lemur
Abstract:
The Internet of Things (IoT) is developed to ensure monitoring and connectivity within different applications. Thus, it is critical to study the channel propagation characteristics in Low Power Wide Area Network (LPWAN), especially LoRaWAN. In this paper, an in-depth investigation of the reciprocity between the uplink and downlink Channel State Information (CSI) is done by performing an outdoor measurement campaign in the area of Campus Beaulieu in Rennes. At each different location, the CSI reciprocity is quantified using the Pearson Correlation Coefficient (PCC) which shows a very high linear correlation between the uplink and downlink CSI. This reciprocity feature could be utilized for the physical layer security between the node and the gateway. On the other hand, most of the CSI shapes from different locations are highly uncorrelated with each other. Hence, it can be anticipated that this could achieve significant localization gain by utilizing the frequency hopping in the LoRa systems to get access to a wider band.
Keywords: IoT, LPWAN, LoRa, RSSI, effective signal power, onsite measurement, smart city, channel reciprocity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4991351 A Software of Intrusion Detection Mechanism for Virtual Platforms
Authors: Ying-Chuan Chen, Shuen-Tai Wang
Abstract:
Security is an interesting and significance issue for popular virtual platforms, such as virtualization cluster and cloud platforms. Virtualization is the powerful technology for cloud computing services, there are a lot of benefits by using virtual machine tools which be called hypervisors, such as it can quickly deploy all kinds of virtual Operating Systems in single platform, able to control all virtual system resources effectively, cost down for system platform deployment, ability of customization, high elasticity and high reliability. However, some important security problems need to take care and resolved in virtual platforms that include terrible viruses, evil programs, illegal operations and intrusion behavior. In this paper, we present useful Intrusion Detection Mechanism (IDM) software that not only can auto to analyze all system-s operations with the accounting journal database, but also is able to monitor the system-s state for virtual platforms.Keywords: security, cluster, cloud, virtualization, virtual machine, virus, intrusion detection
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15451350 Student and Group Activity Level Assessment in the ELARS Recommender System
Authors: Martina Holenko Dlab, Natasa Hoic-Bozic
Abstract:
This paper presents an original approach to student and group activity level assessment that relies on certainty factors theory. Activity level is used to represent quantity and continuity of student’s contributions in individual and collaborative e‑learning activities (e‑tivities) and is calculated to assist teachers in assessing quantitative aspects of student's achievements. Calculated activity levels are also used to raise awareness and provide recommendations during the learning process. The proposed approach was implemented within the educational recommender system ELARS and validated using data obtained from e‑tivity realized during a blended learning course. The results showed that the proposed approach can be used to estimate activity level in the context of e-tivities realized using Web 2.0 tools as well as to facilitate the assessment of quantitative aspect of students’ participation in e‑tivities.
Keywords: Assessment, ELARS, e-learning, recommender systems, student model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10591349 Specifying Strict Serializability of Iterated Transactions in Propositional Temporal Logic
Authors: Walter Hussak
Abstract:
We present an operator for a propositional linear temporal logic over infinite schedules of iterated transactions, which, when applied to a formula, asserts that any schedule satisfying the formula is serializable. The resulting logic is suitable for specifying and verifying consistency properties of concurrent transaction management systems, that can be defined in terms of serializability, as well as other general safety and liveness properties. A strict form of serializability is used requiring that, whenever the read and write steps of a transaction occurrence precede the read and write steps of another transaction occurrence in a schedule, the first transaction must precede the second transaction in an equivalent serial schedule. This work improves on previous work in providing a propositional temporal logic with a serializability operator that is of the same PSPACE complete computational complexity as standard propositional linear temporal logic without a serializability operator.
Keywords: Temporal logic, iterated transactions, serializability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15651348 Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
Authors: Soon-Tai Park, Jong-Whoi Shin, Bog-Ki Min, Ik-Sub Lee, Gang-Shin Lee, Jae-Il Lee
Abstract:
As the information age matures, major social infrastructures such as communication, finance, military and energy, have become ever more dependent on information communication systems. And since these infrastructures are connected to the Internet, electronic intrusions such as hacking and viruses have become a new security threat. Especially, disturbance or neutralization of a major social infrastructure can result in extensive material damage and social disorder. To address this issue, many nations around the world are researching and developing various techniques and information security policies as a government-wide effort to protect their infrastructures from newly emerging threats. This paper proposes an evaluation method for information security levels of CIIP (Critical Information Infrastructure Protection), which can enhance the security level of critical information infrastructure by checking the current security status and establish security measures accordingly to protect infrastructures effectively.Keywords: Information Security Evaluation Methodology, Critical Information Infrastructure Protection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17821347 Implementation of Feed-in Tariffs into Multi-Energy Systems
Authors: M. Schulze, P. Crespo Del Granado
Abstract:
This paper considers the influence of promotion instruments for renewable energy sources (RES) on a multi-energy modeling framework. In Europe, so called Feed-in Tariffs are successfully used as incentive structures to increase the amount of energy produced by RES. Because of the stochastic nature of large scale integration of distributed generation, many problems have occurred regarding the quality and stability of supply. Hence, a macroscopic model was developed in order to optimize the power supply of the local energy infrastructure, which includes electricity, natural gas, fuel oil and district heating as energy carriers. Unique features of the model are the integration of RES and the adoption of Feed-in Tariffs into one optimization stage. Sensitivity studies are carried out to examine the system behavior under changing profits for the feed-in of RES. With a setup of three energy exchanging regions and a multi-period optimization, the impact of costs and profits are determined.Keywords: Distributed generation, optimization methods, power system modeling, renewable energy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16321346 A Real-Time Image Change Detection System
Authors: Madina Hamiane, Amina Khunji
Abstract:
Detecting changes in multiple images of the same scene has recently seen increased interest due to the many contemporary applications including smart security systems, smart homes, remote sensing, surveillance, medical diagnosis, weather forecasting, speed and distance measurement, post-disaster forensics and much more. These applications differ in the scale, nature, and speed of change. This paper presents an application of image processing techniques to implement a real-time change detection system. Change is identified by comparing the RGB representation of two consecutive frames captured in real-time. The detection threshold can be controlled to account for various luminance levels. The comparison result is passed through a filter before decision making to reduce false positives, especially at lower luminance conditions. The system is implemented with a MATLAB Graphical User interface with several controls to manage its operation and performance.Keywords: Image change detection, Image processing, image filtering, thresholding, B/W quantization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25621345 Concept Abduction in Description Logics with Cardinality Restrictions
Authors: Viet-Hoang Vu, Nhan Le-Thanh
Abstract:
Recently the usefulness of Concept Abduction, a novel non-monotonic inference service for Description Logics (DLs), has been argued in the context of ontology-based applications such as semantic matchmaking and resource retrieval. Based on tableau calculus, a method has been proposed to realize this reasoning task in ALN, a description logic that supports simple cardinality restrictions as well as other basic constructors. However, in many ontology-based systems, the representation of ontology would require expressive formalisms for capturing domain-specific constraints, this language is not sufficient. In order to increase the applicability of the abductive reasoning method in such contexts, we would like to present in the scope of this paper an extension of the tableaux-based algorithm for dealing with concepts represented inALCQ, the description logic that extends ALN with full concept negation and quantified number restrictions.
Keywords: Abductive reasoning, description logics, semantic matchmaking, non-monotonic inference, tableaux-based method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15541344 Islamic Banking: An Ultimate Source of Financial Inclusion
Authors: Tasawar Nawaz
Abstract:
Promotion of socioeconomic justice through redistribution of wealth is one of the most salient features of Islamic economic system. Islamic financial institutions known as Islamic banks are used to implement this in practice under the guidelines of Islamic Shariah law. Islamic banking systems strive to promote and achieve financial inclusion among the society by offering interest-free banking and risk-sharing financing solutions. Shariah-compliant micro finance is one of the most popular financial instruments used by Islamic banks to enhance access to finance. Benevolent loan (or Qard-al-Hassanah) is one of the popular financial tools used by the Islamic banks to promote financial inclusion. This aspect of Islamic banking is empirically examined in this paper with specific reference to firm’s resources, largely defined here as intellectual capital. The paper finds that Islamic banks promote financial inclusion by exploiting available resources especially, the human intellectual capital.
Keywords: Financial inclusion, intellectual capital, Qard-al-Hassanah, Islamic banking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13791343 Vision Based Hand Gesture Recognition
Authors: Pragati Garg, Naveen Aggarwal, Sanjeev Sofat
Abstract:
With the development of ubiquitous computing, current user interaction approaches with keyboard, mouse and pen are not sufficient. Due to the limitation of these devices the useable command set is also limited. Direct use of hands as an input device is an attractive method for providing natural Human Computer Interaction which has evolved from text-based interfaces through 2D graphical-based interfaces, multimedia-supported interfaces, to fully fledged multi-participant Virtual Environment (VE) systems. Imagine the human-computer interaction of the future: A 3Dapplication where you can move and rotate objects simply by moving and rotating your hand - all without touching any input device. In this paper a review of vision based hand gesture recognition is presented. The existing approaches are categorized into 3D model based approaches and appearance based approaches, highlighting their advantages and shortcomings and identifying the open issues.Keywords: Computer Vision, Hand Gesture, Hand Posture, Human Computer Interface.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 63391342 Exact Solution of the Ising Model on the 15 X 15 Square Lattice with Free Boundary Conditions
Authors: Seung-Yeon Kim
Abstract:
The square-lattice Ising model is the simplest system showing phase transitions (the transition between the paramagnetic phase and the ferromagnetic phase and the transition between the paramagnetic phase and the antiferromagnetic phase) and critical phenomena at finite temperatures. The exact solution of the squarelattice Ising model with free boundary conditions is not known for systems of arbitrary size. For the first time, the exact solution of the Ising model on the square lattice with free boundary conditions is obtained after classifying all ) spin configurations with the microcanonical transfer matrix. Also, the phase transitions and critical phenomena of the square-lattice Ising model are discussed using the exact solution on the square lattice with free boundary conditions.Keywords: Phase transition, Ising magnet, Square lattice, Freeboundary conditions, Exact solution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18421341 Analysis of a Population of Diabetic Patients Databases with Classifiers
Authors: Murat Koklu, Yavuz Unal
Abstract:
Data mining can be called as a technique to extract information from data. It is the process of obtaining hidden information and then turning it into qualified knowledge by statistical and artificial intelligence technique. One of its application areas is medical area to form decision support systems for diagnosis just by inventing meaningful information from given medical data. In this study a decision support system for diagnosis of illness that make use of data mining and three different artificial intelligence classifier algorithms namely Multilayer Perceptron, Naive Bayes Classifier and J.48. Pima Indian dataset of UCI Machine Learning Repository was used. This dataset includes urinary and blood test results of 768 patients. These test results consist of 8 different feature vectors. Obtained classifying results were compared with the previous studies. The suggestions for future studies were presented.
Keywords: Artificial Intelligence, Classifiers, Data Mining, Diabetic Patients.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 54301340 Reduction of Differential Column Shortening in Tall Buildings
Authors: Hansoo Kim, Seunghak Shin
Abstract:
The differential column shortening in tall buildings can be reduced by improving material and structural characteristics of the structural systems. This paper proposes structural methods to reduce differential column shortening in reinforced concrete tall buildings; connecting columns with rigidly jointed horizontal members, using outriggers, and placing additional reinforcement at the columns. The rigidly connected horizontal members including outriggers reduce the differential shortening between adjacent vertical members. The axial stiffness of columns with greater shortening can be effectively increased by placing additional reinforcement at the columns, thus the differential column shortening can be reduced in the design stage. The optimum distribution of additional reinforcement can be determined by applying a gradient based optimization technique.
Keywords: Column shortening, long-term behavior, optimization, tall building.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40101339 Opinion Mining and Sentiment Analysis on DEFT
Authors: Najiba Ouled Omar, Azza Harbaoui, Henda Ben Ghezala
Abstract:
Current research practices sentiment analysis with a focus on social networks, DEfi Fouille de Texte (DEFT) (Text Mining Challenge) evaluation campaign focuses on opinion mining and sentiment analysis on social networks, especially social network Twitter. It aims to confront the systems produced by several teams from public and private research laboratories. DEFT offers participants the opportunity to work on regularly renewed themes and proposes to work on opinion mining in several editions. The purpose of this article is to scrutinize and analyze the works relating to opinions mining and sentiment analysis in the Twitter social network realized by DEFT. It examines the tasks proposed by the organizers of the challenge and the methods used by the participants.
Keywords: Opinion mining, sentiment analysis, emotion, polarity, annotation, OSEE, figurative language, DEFT, Twitter, Tweet.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8201338 3A Distributed Method Algorithm for Exact Side Load Managing Smart Grid Using LABVIEW
Authors: N. Ravi Kumar, R. Kamalakannan
Abstract:
The advancement of hybrid energy resources such as solar and wind power leading to the emergence of customer owned grid. It provides an opportunity to regulars to obtain low energy costs as well as enabling the power supplier to regulate the utility grid. There is a need to develop smart systems that will automatically submit energy demand schedule and monitors energy price signals in real-time without the prompt of customers. In this paper, a demand side energy management for a grid connected household and also smart preparation of electrical appliance have been presented. It also reduces electricity bill for the consumers in the grid. In addition to this, when production is high, the surplus energy fashioned in the customer owned grid is given to main grid or neighboring micro grids. The simulation of the entire system is presented using LabVIEW software.
Keywords: Distributed renewable energy resource, power storage devices, scheduling, smart meters, smart micro grid, electric vehicle.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10921337 Structural Characteristics of Three-Dimensional Random Packing of Aggregates with Wide Size Distribution
Authors: Kasthurirangan Gopalakrishnan, Naga Shashidhar
Abstract:
The mechanical properties of granular solids are dependent on the flow of stresses from one particle to another through inter-particle contact. Although some experimental methods have been used to study the inter-particle contacts in the past, preliminary work with these techniques indicated that they do not have the necessary resolution to distinguish between those contacts that transmit the load and those that do not, especially for systems with a wide distribution of particle sizes. In this research, computer simulations are used to study the nature and distribution of contacts in a compact with wide particle size distribution, representative of aggregate size distribution used in asphalt pavement construction. The packing fraction, the mean number of contacts and the distribution of contacts were studied for different scenarios. A methodology to distinguish and compute the fraction of load-bearing particles and the fraction of space-filling particles (particles that do not transmit any force) is needed for further investigation.Keywords: Computer simulation, three-dimensional particlepacking, coordination number, asphalt concrete, aggregates.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21101336 Lane Detection Using Labeling Based RANSAC Algorithm
Authors: Yeongyu Choi, Ju H. Park, Ho-Youl Jung
Abstract:
In this paper, we propose labeling based RANSAC algorithm for lane detection. Advanced driver assistance systems (ADAS) have been widely researched to avoid unexpected accidents. Lane detection is a necessary system to assist keeping lane and lane departure prevention. The proposed vision based lane detection method applies Canny edge detection, inverse perspective mapping (IPM), K-means algorithm, mathematical morphology operations and 8 connected-component labeling. Next, random samples are selected from each labeling region for RANSAC. The sampling method selects the points of lane with a high probability. Finally, lane parameters of straight line or curve equations are estimated. Through the simulations tested on video recorded at daytime and nighttime, we show that the proposed method has better performance than the existing RANSAC algorithm in various environments.
Keywords: Canny edge detection, k-means algorithm, RANSAC, inverse perspective mapping.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12021335 Performance Analysis of the First-Order Characteristics of Polling Systems Based on Parallel Limited (k = 1) Services Mode
Authors: Liu Yi, Bao Liyong
Abstract:
Aiming at the problem of low efficiency of pipelined scheduling in periodic query-qualified service, this paper proposes a system service resource scheduling strategy with parallel optimized qualified service polling control. The paper constructs the polling queuing system and its mathematical model; firstly, the first-order and second-order characteristic parameter equations are obtained by partial derivation of the probability mother function of the system state variables, and the complete mathematical, analytical expressions of each system parameter are deduced after the joint solution. The simulation experimental results are consistent with the theoretical calculated values. The system performance analysis shows that the average captain and average period of the system have been greatly improved, which can better adapt to the service demand of delay-sensitive data in the dense data environment.
Keywords: Polling, parallel scheduling, mean queue length, average cycle time.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 591334 The Effect of Enzymatic Keratin Hydrolyzate on the Susceptibility of Cellulosic-Elastomeric Material to Biodecomposition
Authors: Y.-H Tshela Ntumba, A. Przepiórkowska, M. Prochoń
Abstract:
Polymeric materials have become an integral part of every aspect of today's industry. They have wide applications, inter alia, in areas such as medicine, food industry and agriculture. In agriculture, for example, they are used for the production of pots, irrigation systems and for soil mulching. The aim of this study was the attempt to produce a biodecomposable agricultural mat, by coating cotton fabric with a blend of carboxylated styrene-butadiene latex (LBSK) containing the enzymatic hydrolyzate of keratin from cattle hair, which would serve as a material for mulching.
The production of such material allows the beneficial management of burdensome tannery waste constituted by keratin from cattle hair and at the same time, the production of agricultural mats that much faster undergo decomposition than commonly used polyethylene mats.
Keywords: Agricultural mat, biodecomposition, biodegradation, carboxylated styrene-butadiene latex, cellulosic-elastomeric material, keratin hydrolyzate, mulching, protein hydrolyzate.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22271333 Numerical Computation of Sturm-Liouville Problem with Robin Boundary Condition
Authors: Theddeus T. Akano, Omotayo A. Fakinlede
Abstract:
The modelling of physical phenomena, such as the earth’s free oscillations, the vibration of strings, the interaction of atomic particles, or the steady state flow in a bar give rise to Sturm- Liouville (SL) eigenvalue problems. The boundary applications of some systems like the convection-diffusion equation, electromagnetic and heat transfer problems requires the combination of Dirichlet and Neumann boundary conditions. Hence, the incorporation of Robin boundary condition in the analyses of Sturm-Liouville problem. This paper deals with the computation of the eigenvalues and eigenfunction of generalized Sturm-Liouville problems with Robin boundary condition using the finite element method. Numerical solution of classical Sturm–Liouville problem is presented. The results show an agreement with the exact solution. High results precision is achieved with higher number of elements.Keywords: Sturm-Liouville problem, Robin boundary condition, finite element method, eigenvalue problems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29941332 Improving the Road Construction Supply Chain by Developing a National Level Performance Measurement System: the Case of Estonia
Authors: Kati Kõrbe Kaare, Ott Koppel
Abstract:
Transport and logistics are the lifeblood of societies. There is a strong correlation between overall growth in economic activity and growth of transport. The movement of people and goods has the potential for creating wealth and prosperity, therefore the state of transportation infrastructure and especially the condition of road networks is often a governmental priority. The design, building and maintenance of national roads constitute a substantial share of government budgets. Taking into account the magnitude and importance of these investments, the expedience, efficiency and sustainability of these projects are of great public interest. This paper provides an overview of supply chain management principles applied to road construction. In addition, road construction performance measurement systems and ICT solutions are discussed. Road construction in Estonia is analyzed. The authors propose the development of a national performance measurement system for road construction.Keywords: ICT in road construction, key performance indicators, quality performance measurement, road construction supply chain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37311331 Bandwidth Optimization through Dynamic Routing in ATM Networks: Genetic Algorithm and Tabu Search Approach
Authors: Susmi Routray, A. M. Sherry, B. V. R. Reddy
Abstract:
Asynchronous Transfer Mode (ATM) is widely used in telecommunications systems to send data, video and voice at a very high speed. In ATM network optimizing the bandwidth through dynamic routing is an important consideration. Previous research work shows that traditional optimization heuristics result in suboptimal solution. In this paper we have explored non-traditional optimization technique. We propose comparison of two such algorithms - Genetic Algorithm (GA) and Tabu search (TS), based on non-traditional Optimization approach, for solving the dynamic routing problem in ATM networks which in return will optimize the bandwidth. The optimized bandwidth could mean that some attractive business applications would become feasible such as high speed LAN interconnection, teleconferencing etc. We have also performed a comparative study of the selection mechanisms in GA and listed the best selection mechanism and a new initialization technique which improves the efficiency of the GA.Keywords: Asynchronous Transfer Mode(ATM), GeneticAlgorithm(GA), Tabu Search(TS).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17671330 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.
Keywords: Cloud computing, cloud monitoring, performance optimization, high availability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 731329 Evaluation Performance of PID, LQR, Pole Placement Controllers for Heat Exchanger
Authors: Mohamed Essahafi, Mustapha Ait Lafkih
Abstract:
In industrial environments, the heat exchanger is a necessary component to any strategy of energy conversion. Much of thermal energy used in industrial processes passes at least one times by a heat exchanger, and methods systems recovering thermal energy. This survey paper tries to presents in a systemic way an sample control of a heat exchanger by comparison between three controllers LQR (linear quadratic regulator), PID (proportional, integrator and derivate) and Pole Placement. All of these controllers are used mainly in industrial sectors (chemicals, petrochemicals, steel, food processing, energy production, etc…) of transportation (automotive, aeronautics), but also in the residential sector and tertiary (heating, air conditioning, etc...) The choice of a heat exchanger, for a given application depends on many parameters: field temperature and pressure of fluids, and physical properties of aggressive fluids, maintenance and space. It is clear that the fact of having an exchanger appropriate, well-sized, well made and well used allows gain efficiency and energy processes.
Keywords: LQR linear-quadratic regulator, PID control, Pole Placement, Heat exchanger.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 43921328 New Technologies for Modeling of Gas Turbine Cooled Blades
Authors: A. Pashayev, D. Askerov, R.Sadiqov, A. Samedov, C. Ardil
Abstract:
In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and cvazistationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine 1st stage nozzle blade
Keywords: multiconnected systems, method of the boundary integrated equations, splines, neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16511327 Influence of Nano-ATH on Electrical Performance of LSR for HVDC Insulation
Authors: Ju-Na Hwang, Yong-Jun Park, Min-Hae Park, Kee-Joe Lim
Abstract:
Many studies have been conducted on DC transmission. Of power apparatus for DC transmission, high voltage direct current (HVDC) cable systems are being evaluated because of the increase in power demand and transmission distance. Therefore, dc insulation characteristics of liquid silicone rubber (LSR), which has various advantages such as short curing time and the ease of maintenance, were investigated to assess its performance as a HVDC insulation material for cable joints. The electrical performance of LSR added to nano-aluminum trihydrate (ATH) were confirmed by measurements of the breakdown strength and electrical conductivity. In addition, field emission scanning electron microscope (FE-SEM) was used as a means of confirmation of nanofiller dispersion state. The LSR nanocomposite was prepared by compounding LSR filled nano-sized ATH filler. The dc insulation properties of LSR added to nano-sized ATH fillers were found to be superior to those of the LSR without a filler.
Keywords: Liquid silicone rubber, Nanocomposite, Nano-ATH, HVDC insulation, Cable joints.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26001326 Sloshing-Induced Overflow Assessment of the Seismically-Isolated Nuclear Tanks
Authors: Kihyon Kwon, Hyun T. Park, Gil Y. Chung, Sang-Hoon Lee
Abstract:
This paper focuses on assessing sloshing-induced overflow of the seismically-isolated nuclear tanks based on Fluid-Structure Interaction (FSI) analysis. Typically, fluid motion in the seismically-isolated nuclear tank systems may be rather amplified and even overflowed under earthquake. Sloshing-induced overflow in those structures has to be reliably assessed and predicted since it can often cause critical damages to humans and environments. FSI analysis is herein performed to compute the total cumulative overflowed water volume more accurately, by coupling ANSYS with CFX for structural and fluid analyses, respectively. The approach is illustrated on a nuclear liquid storage tank, Spent Fuel Pool (SFP), forgiven conditions under consideration: different liquid levels, Peak Ground Accelerations (PGAs), and post earthquakes.
Keywords: FSI analysis, seismically-isolated nuclear tank system, sloshing-induced overflow.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28751325 Simulation Modeling and Analysis of In-Plant Logistics at a Cement Manufacturing Plant in India
Authors: Sachin Kamble, Shradha Gawankar
Abstract:
This paper presents the findings of successful implementation of Business Process Reengineering (BPR) of cement dispatch activities in a cement manufacturing plant located in India. Simulation model was developed for the purpose of identifying and analyzing the areas for improvement. The company was facing a problem of low throughput rate and subsequent forced stoppages of the plant leading to a high production loss of 15000MT per month. It was found from the study that the present systems and procedures related to the in-plant logistics plant required significant changes. The major recommendations included process improvement at the entry gate, reducing the cycle time at the security gate and installation of an additional weigh bridge. This paper demonstrates how BPR can be implemented for improving the in-plant logistics process. Various recommendations helped the plant to increase its throughput by 14%.Keywords: Business process reengineering, simulation modeling, in-plant logistics, distribution process, cement industry.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22891324 Numerical Modeling of Gas Turbine Engines
Authors: A. Pashayev, D. Askerov, C. Ardil, R. Sadiqov
Abstract:
In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and quasi-stationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine first stage nozzle blade.
Keywords: Multiconnected systems, method of the boundary integrated equations, splines, neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16241323 Connect among Green, Sustainability and Hotel Industry: A Prospective Simulation Study
Authors: Leena N. Fukey, Surya S. Issac
Abstract:
This review paper aims at understanding the importance of implementing sustainable green practices in the current hotel industry and the perception of the same from the point of view of the customers as well as the industry experts. Many hotels have benefited from green management such as enhanced reputation of the firm and more worth customers. For the business standing, it reduces business’s cost for posting advertisements and the clear hotel’s orientation shows hotels’ positive image which might increase employees’ recognition toward the business. Sustainability in business is the growth in lively processes which enable people to understand the potential to protect the Earth’s existent support systems. Well, looking to the future today’s green concerns will definitely become facet of more synchronized business environment, perhaps the concerns discussed in this study, may exchange a few words which hotels may consider in near future to widen awareness and improve business model.
Keywords: Environmental Protection, Green Hotel Concept, Hotel Industry, Sustainability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8854