Search results for: Effective properties
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5184

Search results for: Effective properties

1164 Effect of Sintering Temperature Curve in Wick Manufactured for Loop Heat Pipe

Authors: Shen-Chun Wu, Chuo-Jeng Huang, Wun-Hong Yang, Jy-Cheng Chang, Chien-Chun Kung

Abstract:

This investigation examines the effect of the sintering temperature curve in manufactured nickel powder capillary structure (wick) for a loop heat pipe (LHP). The sintering temperature curve is composed of a region of increasing temperature; a region of constant temperature and a region of declining temperature. The most important region is that in which the temperature increases, as an index in the stage in which the temperature increases. The wick of nickel powder is manufactured in the stage of fixed sintering temperature and the time between the stage of constant temperature and the stage of falling temperature. When the slope of the curve in the region of increasing temperature is unity (equivalent to 10 °C/min), the structure of the wick is complete and the heat transfer performance is optimal. The result of experiment test demonstrates that the heat transfer performance is optimal at 320W; the minimal total thermal resistance is approximately 0.18°C/W, and the heat flux is 17W/cm2; the internal parameters of the wick are an effective pore radius of 3.1 μm, a permeability of 3.25×10-13m2 and a porosity of 71%.

Keywords: Loop heat pipe (LHP), capillary structure (wick), sintered temperature curve.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2094
1163 An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images

Authors: S. R. M. Prasanna, Y. V. Subba Rao, A. Mitra

Abstract:

We describe an effective method for image encryption which employs magnitude and phase manipulation using carrier images. Although it involves traditional methods like magnitude and phase encryptions, the novelty of this work lies in deploying the concept of carrier images for encryption purpose. To this end, a carrier image is randomly chosen from a set of stored images. One dimensional (1-D) discrete Fourier transform (DFT) is then carried out on the original image to be encrypted along with the carrier image. Row wise spectral addition and scaling is performed between the magnitude spectra of the original and carrier images by randomly selecting the rows. Similarly, row wise phase addition and scaling is performed between the original and carrier images phase spectra by randomly selecting the rows. The encrypted image obtained by these two operations is further subjected to one more level of magnitude and phase manipulation using another randomly chosen carrier image by 1-D DFT along the columns. The resulting encrypted image is found to be fully distorted, resulting in increasing the robustness of the proposed work. Further, applying the reverse process at the receiver, the decrypted image is found to be distortionless.

Keywords: Encryption, Carrier images, Magnitude manipulation, Phase manipulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1598
1162 Thai Perception on Bitcoin Value

Authors: Toby Gibbs, Suwaree Yordchim

Abstract:

This research analyzes factors affecting the success of Bitcoin Value within Thailand and develops a guideline for self-reliance for effective business implementation. Samples in this study included 121 people through surveys. The results revealed four main factors affecting the success as follows: 1) A great majority didn't know what Bitcoin was. 2) Didn't grasp the concept of a digital currency or see the benefit of a digital currency. 3) There is a great need to educate the next generation of learners on the benefits of Bitcoin within the community. 4) Future Career training should be pursued in applied Bitcoin development.

The guideline for self-reliance planning consisted of 4 aspects: 1) Local communities need to develop awareness of the usefulness of Bitcoin and share the value of Bitcoin among friends and family. 2) Computer Science and Business Management staff should develop skills to expand on the benefits of Bitcoin within their departments. 3) Further research should be pursued on how Bitcoin Value can improve business and tourism within Thailand. Local communities should focus on developing Bitcoin awareness by encouraging street vendors to accept Bitcoin as another form of payment for services rendered. 4) Development planning: by arranging meet up groups to conduct further education on Bitcoin and share solutions on adoption into every day usage.

Keywords: Bitcoin, Cryptocurrency, Decentralized.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2588
1161 Application of Machine Learning Methods to Online Test Error Detection in Semiconductor Test

Authors: Matthias Kirmse, Uwe Petersohn, Elief Paffrath

Abstract:

As in today's semiconductor industries test costs can make up to 50 percent of the total production costs, an efficient test error detection becomes more and more important. In this paper, we present a new machine learning approach to test error detection that should provide a faster recognition of test system faults as well as an improved test error recall. The key idea is to learn a classifier ensemble, detecting typical test error patterns in wafer test results immediately after finishing these tests. Since test error detection has not yet been discussed in the machine learning community, we define central problem-relevant terms and provide an analysis of important domain properties. Finally, we present comparative studies reflecting the failure detection performance of three individual classifiers and three ensemble methods based upon them. As base classifiers we chose a decision tree learner, a support vector machine and a Bayesian network, while the compared ensemble methods were simple and weighted majority vote as well as stacking. For the evaluation, we used cross validation and a specially designed practical simulation. By implementing our approach in a semiconductor test department for the observation of two products, we proofed its practical applicability.

Keywords: Ensemble methods, fault detection, machine learning, semiconductor test.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2274
1160 The Need for the Development of Entrepreneurial Skill in Benue State University Students, Makurdi

Authors: Philomena Ibuh Adzongo, Margaret U. Oluwole, Justina Nguveren Jor.

Abstract:

This paper investigated the need for the development of entrepreneurial skills for Benue State University students. The population consisted of all 1,500 final year students in Benue State University. A sample of 100 students was selected using simple random sampling. A 12-item self-constructed and content validated questionnaire by research experts titled, the Need for the Development of Entrepreneurial Skills in Benue State University Students (NDECBSUS) was used to collect the data. The questionnaire items were rated using a 4-point modified rating scale of Strongly Agree, Agree, Disagree and Strongly Disagree, assigned the following scores of 4,3,2 and 1, respectively. The questionnaire was administered by the researcher with the help of two research assistants through the primary source. Simple percentages and chi-square were used to answer the research questions and test the hypotheses, respectively. The findings revealed that in business management, business management skills, personal skills, and technical skills need to be developed in students for them to become effective and efficient entrepreneurs and concluded that the acquisition of these skills will reduce the challenge of unemployment. The study recommended that funds should be made available by all education stakeholders for such programmes to remain functional.

Keywords: Entrepreneurial skill, entrepreneurship, need for development, university students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1110
1159 Seasonal Variations and Different Irrigation Programs on Nutrient Concentrations of 'Starkrimson Delicious' Apple Variety

Authors: Zeliha Küçükyumuk, Cenk Küçükyumuk, İbrahim Erdal, Figen Eraslan

Abstract:

This study was aimed to determine seasonal variations of leaf nutrient concentrations to define nutrient needs related to growing period and to compare irrigation programs in terms of nutrient uptake. In this study,'Starkrimson Delicious' variety grafted onto seedling rootstock was used during 2009-2010 growing seasons. The study was conducted at E─ƒirdir Fruit Growing Research Station. Leaf samples were taken in five different sample seasons (May, June, July, August and September). Four different pan coefficients (0.50, 0.75, 1.0, 1.25) were applied during drip irrigation treatments in 7 days irrigation interval. Leaf K, Mg, Ca, P, Fe, Zn, Mn and Cu concentrations were determined. The results showed that among the seasonal changes, the highest concentrations of K, Mg, P and Mn in leaves were recorded in May, followed by a decrease in the other months, while in contrast Ca and Fe showed the lowest concentration in May. Results of the study demonstrate that among irrigation programs K and Cu concentration in plants was significantly influenced. Cu concentrations decreased with seasonal variations and different irrigation programs. Thus, nutrient needs of 'Starkrimson Delicious'apple trees at different growth stages should be taken into consideration before making effective fertilization program.

Keywords: Apple orchard, irrigation programs, seasonal variations, nutrient concentrations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1662
1158 Artificial Neural Networks Modeling in Water Resources Engineering: Infrastructure and Applications

Authors: M. R. Mustafa, M. H. Isa, R. B. Rezaur

Abstract:

The use of artificial neural network (ANN) modeling for prediction and forecasting variables in water resources engineering are being increasing rapidly. Infrastructural applications of ANN in terms of selection of inputs, architecture of networks, training algorithms, and selection of training parameters in different types of neural networks used in water resources engineering have been reported. ANN modeling conducted for water resources engineering variables (river sediment and discharge) published in high impact journals since 2002 to 2011 have been examined and presented in this review. ANN is a vigorous technique to develop immense relationship between the input and output variables, and able to extract complex behavior between the water resources variables such as river sediment and discharge. It can produce robust prediction results for many of the water resources engineering problems by appropriate learning from a set of examples. It is important to have a good understanding of the input and output variables from a statistical analysis of the data before network modeling, which can facilitate to design an efficient network. An appropriate training based ANN model is able to adopt the physical understanding between the variables and may generate more effective results than conventional prediction techniques.

Keywords: ANN, discharge, modeling, prediction, sediment,

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5685
1157 A Study on Flammability of Bio Oil Combustible Vapour Mixtures

Authors: Mohanad El-Harbawi, Nurul Amirah Hanim Bt. Umar, Norizan Ali, Yoshimitsu Uemura

Abstract:

Study of fire and explosion is very important mainly in oil and gas industries due to several accidents which have been reported in the past and present. In this work, we have investigated the flammability of bio oil vapour mixtures. This mixture may contribute to fire during the storage and transportation process. Bio oil sample derived from Palm Kernell shell was analysed using Gas Chromatography Mass Spectrometry (GC-MS) to examine the composition of the sample. Mole fractions of 12 selected components in the liquid phase were obtained from the GC-FID data and used to calculate mole fractions of components in the gas phase via modified Raoult-s law. Lower Flammability Limits (LFLs) and Upper Flammability Limits (UFLs) for individual components were obtained from published literature. However, stoichiometric concentration method was used to calculate the flammability limits of some components which their flammability limit values are not available in the literature. The LFL and UFL values for the mixture were calculated using the Le Chatelier equation. The LFLmix and UFLmix values were used to construct a flammability diagram and subsequently used to determine the flammability of the mixture. The findings of this study can be used to propose suitable inherently safer method to prevent the flammable mixture from occurring and to minimizing the loss of properties, business, and life due to fire accidents in bio oil productions.

Keywords: Gas chromatography, compositions, lower and upper flammability limits (LFL & UFL), flammability diagram.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3431
1156 Real Time Approach for Data Placement in Wireless Sensor Networks

Authors: Sanjeev Gupta, Mayank Dave

Abstract:

The issue of real-time and reliable report delivery is extremely important for taking effective decision in a real world mission critical Wireless Sensor Network (WSN) based application. The sensor data behaves differently in many ways from the data in traditional databases. WSNs need a mechanism to register, process queries, and disseminate data. In this paper we propose an architectural framework for data placement and management. We propose a reliable and real time approach for data placement and achieving data integrity using self organized sensor clusters. Instead of storing information in individual cluster heads as suggested in some protocols, in our architecture we suggest storing of information of all clusters within a cell in the corresponding base station. For data dissemination and action in the wireless sensor network we propose to use Action and Relay Stations (ARS). To reduce average energy dissipation of sensor nodes, the data is sent to the nearest ARS rather than base station. We have designed our architecture in such a way so as to achieve greater energy savings, enhanced availability and reliability.

Keywords: Cluster head, data reliability, real time communication, wireless sensor networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1814
1155 Evaluation of Internal Ballistics of Multi-Perforated Grain in a Closed Vessel

Authors: B. A. Parate, C. P. Shetty

Abstract:

This research article describes the evaluation methodology of an internal ballistics of multi-perforated grain in a closed vessel (CV). The propellant testing in a CV is conducted to characterize the propellants and to ascertain the various internal ballistic parameters. The assessment of an internal ballistics plays a very crucial role for suitability of its use in the selection for a given particular application. The propellant used in defense sectors has to satisfy the user requirements as per laid down specifications. The outputs from CV evaluation of multi-propellant grain are maximum pressure of 226.75 MPa, differentiation of pressure with respect to time of 36.99 MPa/ms, average vivacity of 9.990×10-4/MPa ms, force constant of 933.9 J/g, rise time of 9.85 ms, pressure index of 0.878 including burning coefficient of 0.2919. This paper addresses an internal ballistic of multi-perforated grain, propellant selection, its calculation, and evaluation of various parameters in a CV testing. For the current analysis, the propellant is evaluated in 100 cc CV with propellant mass 20 g. The loading density of propellant is 0.2 g/cc. The method for determination of internal ballistic properties consists of burning of propellant mass under constant volume.

Keywords: Burning rate, closed vessel, force constant, internal ballistic, loading density, maximum pressure, multi-propellant grain, propellant, rise time, vivacity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 378
1154 Creating Entrepreneurial Universities: The Swedish Approach of Transformation

Authors: Fawaz Saad, Hamid Alalwany

Abstract:

Sweden has succeeded to maintain a high level of growth and development and has managed to sustain highly ranked position among the world’s developed countries. In this regard, Swedish universities are playing a vital role in supporting innovation and entrepreneurship at all levels and developing Swedish knowledge economy. This paper is aiming to draw on the experiences of two leading Swedish universities, addressing their transformation approach to create entrepreneurial universities and fulfilling their objectives in the era of knowledge economy. The objectives of the paper include: 1) Introducing the Swedish higher education and its characteristics. 2) Examining the infrastructure elements for innovation and Entrepreneurship at two of the Swedish entrepreneurial universities. 3) Addressing the key aspects of support systems in the initiatives of both Chalmers and Gothenburg universities to support innovation and advance entrepreneurial practices. The paper will contribute to two discourses: 1) Examining the relationship between support systems for innovation and entrepreneurship and the Universities’ policies and practices. 2) Lessons for University leaders to assist the development and implementation of effective innovation and entrepreneurship policies and practices.

Keywords: Entrepreneurial university, Chalmers university, Gothenburg university, innovation and entrepreneurship policies, entrepreneurial transformation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2396
1153 Optimization of Conditions for Xanthan Gum Production from Waste Date in Submerged Fermantation

Authors: S. Moshaf, Z. Hamidi-Esfahani, M. H. Azizi

Abstract:

Xanthan gum is one of the major commercial biopolymers. Due to its excellent rheological properties xanthan gum is used in many applications, mainly in food industry. Commercial production of xanthan gum uses glucose as the carbon substrate; consequently the price of xanthan production is high. One of the ways to decrease xanthan price, is using cheaper substrate like agricultural wastes. Iran is one of the biggest date producer countries. However approximately 50% of date production is wasted annually. The goal of this study is to produce xanthan gum from waste date using Xanthomonas campestris PTCC1473 by submerged fermentation. In this study the effect of three variables including phosphor and nitrogen amount and agitation rate in three levels using response surface methodology (RSM) has been studied. Results achieved from statistical analysis Design Expert 7.0.0 software showed that xanthan increased with increasing level of phosphor. Low level of nitrogen leaded to higher xanthan production. Xanthan amount, increasing agitation had positive influence. The statistical model identified the optimum conditions nitrogen amount=3.15g/l, phosphor amount=5.03 g/l and agitation=394.8 rpm for xanthan. To model validation, experiments in optimum conditions for xanthan gum were carried out. The mean of result for xanthan was 6.72±0.26. The result was closed to the predicted value by using RSM.

Keywords: Optimization, RSM, Waste date, Xanthan gum, Xanthomonas Campestris

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2611
1152 Effect of Precursors Aging Time on the Photocatalytic Activity of ZnO Thin Films

Authors: N. Kaneva, A. Bojinova, K. Papazova

Abstract:

Thin ZnO films are deposited on glass substrates via sol–gel method and dip-coating. The films are prepared from zinc acetate dehydrate as a starting reagent. After that the as-prepared ZnO sol is aged for different periods (0, 1, 3, 5, 10, 15 and 30 days). Nanocrystalline thin films are deposited from various sols. The effect ZnO sols aging time on the structural and photocatalytic properties of the films is studied. The films surface is studied by Scanning Electron Microscopy. The effect of the aging time of the starting solution is studied in the photocatalytic degradation of Reactive Black 5 (RB5) by UV-vis spectroscopy. The experiments are conducted upon UV-light illumination and in complete darkness. The variation of the absorption spectra shows the degradation of RB5 dissolved in water, as a result of the reaction, occurring on the surface of the films and promoted by UV irradiation. The initial concentrations of dye (5, 10 and 20 ppm) and the effect of the aging time are varied during the experiments. The results show, that the increasing aging time of starting solution with respect to ZnO generally promotes photocatalytic activity. The thin films obtained from ZnO sol, which is aged 30 days have best photocatalytic degradation of the dye (97,22%) in comparison with the freshly prepared ones (65,92%). The samples and photocatalytic experimental results are reproducible. Nevertheless, all films exhibit a substantial activity in both UV light and darkness, which is promising for the development of new ZnO photocatalysts by sol-gel method.

Keywords: ZnO thin films, sol-gel, photocatalysis, aging time.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2449
1151 Privacy in New Mobile Payment Protocol

Authors: Tan Soo Fun, Leau Yu Beng, Rozaini Roslan, Habeeb Saleh Habeeb

Abstract:

The increasing development of wireless networks and the widespread popularity of handheld devices such as Personal Digital Assistants (PDAs), mobile phones and wireless tablets represents an incredible opportunity to enable mobile devices as a universal payment method, involving daily financial transactions. Unfortunately, some issues hampering the widespread acceptance of mobile payment such as accountability properties, privacy protection, limitation of wireless network and mobile device. Recently, many public-key cryptography based mobile payment protocol have been proposed. However, limited capabilities of mobile devices and wireless networks make these protocols are unsuitable for mobile network. Moreover, these protocols were designed to preserve traditional flow of payment data, which is vulnerable to attack and increase the user-s risk. In this paper, we propose a private mobile payment protocol which based on client centric model and by employing symmetric key operations. The proposed mobile payment protocol not only minimizes the computational operations and communication passes between the engaging parties, but also achieves a completely privacy protection for the payer. The future work will concentrate on improving the verification solution to support mobile user authentication and authorization for mobile payment transactions.

Keywords: Mobile Network Operator, Mobile payment protocol, Privacy, Symmetric key.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2133
1150 Entrepreneurship Cure for Economic Under-Development in Nigeria: A Theoretical Perspective

Authors: Kurotimi Maurice Fems, Abara Onu, Francis W. D. Poazi

Abstract:

Scholars and development economists believe that the development of an economy depends largely on the creative and innovative ingenuity of its entrepreneurs. Others however, are of the opinion that the lack of entrepreneurs or entrepreneurial activities is not a constraint to economic development in any economy, particularly Nigeria. This paper sets out to explore the connectivity between entrepreneurship and economic development from a theoretical point of view, principally in Nigeria. A desk research approach was adopted where a conglomerate of literatures was reviewed on how entrepreneurship can spur economic growth or otherwise. The findings reveal that entrepreneurship is vital to the development of Nigeria and that, universities and other Higher Education Institutions must play the vital role of educating the people on entrepreneurship skills and competences. However, the problems and difficulties entrepreneurs face in Nigeria and the same problems suffocating the growth and development of its economy. Therefore, entrepreneurship cannot be said to be the sole cure for economic under-development in Nigeria but rather other factors such as empowering and granting the institutions autonomy and the provision of infrastructural capability, such as consistent electricity generation and supply, good system of transportation, implementing proposed economic policies in an effective and efficient manner etc., the cultural beliefs and mindset of the citizenry, was also found to be key in the development of any economy.

Keywords: Entrepreneurship, entrepreneurial, economic underdevelopment, unemployable, oil boom, infrastructural under-development, SMEs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1582
1149 GenCos- Optimal Bidding Strategy Considering Market Power and Transmission Constraints: A Cournot-based Model

Authors: A. Badri

Abstract:

Restructured electricity markets may provide opportunities for producers to exercise market power maintaining prices in excess of competitive levels. In this paper an oligopolistic market is presented that all Generation Companies (GenCos) bid in a Cournot model. Genetic algorithm (GA) is applied to obtain generation scheduling of each GenCo as well as hourly market clearing prices (MCP). In order to consider network constraints a multiperiod framework is presented to simulate market clearing mechanism in which the behaviors of market participants are modelled through piecewise block curves. A mixed integer linear programming (MILP) is employed to solve the problem. Impacts of market clearing process on participants- characteristic and final market prices are presented. Consequently, a novel multi-objective model is addressed for security constrained optimal bidding strategy of GenCos. The capability of price-maker GenCos to alter MCP is evaluated through introducing an effective-supply curve. In addition, the impact of exercising market power on the variation of market characteristics as well as GenCos scheduling is studied.

Keywords: Optimal bidding strategy, Cournot equilibrium, market power, network constraints, market auction mechanism

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1652
1148 Fundamentals of Performance Management in the World of Public Service Organisations

Authors: Daniella Kucsma

Abstract:

The examination of the Public Service Organization’s performance evaluation includes several steps that help public organizations to develop a more efficient system. Public sector organizations have different characteristics than the competitive sector, so it can be stated that other/new elements become more important in their performance processes. The literature in this area is diverse, so highlighting an indicator system can be useful for introducing a system, but it is also worthwhile to measure the specific elements of the organization. In the case of a public service organization, due to the service obligation, it is usually possible to talk about a high number of users, so compliance is more difficult. For the organization, it is an important target to place great emphasis on the increase of service standards and the development of related processes. In this research, the health sector is given a prominent role, as it is a sensitive area where both organizational and individual performance is important for all participants. As a primary step, the content of the strategy is decisive, as this is important for the efficient structure of the process. When designing any system, it is important to review the expectations of the stakeholders, as this is primary when considering the design. The goal of this paper is to build the foundations of a performance management and indexing framework that can help a hospital to provide effective feedback and a direction that is important in assessing and developing a service and can become a management philosophy.

Keywords: health sector, public sector, performance management, strategy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 545
1147 Estimation of Vertical Handover Probability in an Integrated UMTS and WLAN Networks

Authors: Diganta Kumar Pathak, Manashjyoti Bhuyan, Vaskar Deka

Abstract:

Vertical Handover(VHO) among different communication technologies ensuring uninterruption and service continuity is one of the most important performance parameter in Heterogenous networks environment. In an integrated Universal Mobile Telecommunicatin System(UMTS) and Wireless Local Area Network(WLAN), WLAN is given an inherent priority over UMTS because of its high data rates with low cost. Therefore mobile users want to be associated with WLAN maximum of the time while roaming, to enjoy best possible services with low cost. That encourages reduction of number of VHO. In this work the reduction of number of VHO with respect to varying number of WLAN Access Points(APs) in an integrated UMTS and WLAN network is investigated through simulation to provide best possible cost effective service to the users. The simulation has been carried out for an area (7800 × 9006)m2 where COST-231 Hata model and 3GPP (TR 101 112 V 3.1.0) specified models are used for WLAN and UMTS path loss models respectively. The handover decision is triggered based on the received signal level as compared to the fade margin. Fade margin gives a probabilistic measure of the reliability of the communication link. A relationship between number of WLAN APs and the number of VHO is also established in this work.

Keywords: VHO, UMTS, WLAN, MT, AP, BS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2036
1146 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an  enormous number of applications, cyber-threats have significantly  increased accordingly. Thus, accurate detection of malicious traffic in  a timely manner is a critical concern in today’s Internet for security.  One approach for intrusion detection is to use Machine Learning (ML)  techniques. Several methods based on ML algorithms have been  introduced over the past years, but they are largely limited in terms of  detection accuracy and/or time and space complexity to run. In this  work, we present a novel method for intrusion detection that  incorporates a set of supervised learning algorithms. The proposed  technique provides high accuracy and outperforms existing techniques  that simply utilizes a single learning method. In addition, our  technique relies on partial flow information (rather than full  information) for detection, and thus, it is light-weight and desirable for  online operations with the property of early identification. With the  mid-Atlantic CCDC intrusion dataset publicly available, we show that  our proposed technique yields a high degree of detection rate over 99%  with a very low false alarm rate (0.4%). 

 

Keywords: Intrusion Detection, Supervised Learning, Traffic Classification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2035
1145 Evaluation of Microleakage of a New Generation Nano-Ionomer in Class II Restoration of Primary Molars

Authors: Ghada Salem, Nihal Kabel

Abstract:

Objective: This in vitro study was carried out to assess the microleakage properties of nano-filled glass ionomer in comparison to resin-reinforced glass ionomers. Material and Methods: 40 deciduous molar teeth were included in this study. Class-II cavity was prepared in a standard form for all the specimens. The teeth were randomly distributed into two groups (20 per group) according to the restorative material used either nano-glass ionomer or Photac Fill glass ionomer restoration. All specimens were thermocycled for 1000 cycles between 5 and 55 °C. After that, the teeth were immersed in 2% methylene blue dye then sectioned and evaluated under a stereomicroscope. Microleakage was assessed using linear dye penetration and on a scale from zero to five. Results: Two way ANOVA test revealed a statistically significant lower degree of microleakage in both occlusal and gingival restorations (0.4±0.2), (0.9±0.1) for nano-filled glass ionomer group in comparison to resin modified glass ionomer (2.3±0.7), (2.4±0.5). No statistical difference was found between gingival and occlusal leakage regarding the effect of the measured site. Conclusion: Nano-filled glass ionomer shows superior sealing ability which enables this type of restoration to be used in minimum invasive treatment.

Keywords: Microleakage, nano-ionomer, resin-reinforced glass ionomer, proximal cavity preparation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1258
1144 Vulnerability Analysis for Risk Zones Boundary Definition to Support a Decision Making Process at CBRNE Operations

Authors: Aliaksei Patsekha, Michael Hohenberger, Harald Raupenstrauch

Abstract:

An effective emergency response to accidents with chemical, biological, radiological, nuclear, or explosive materials (CBRNE) that represent highly dynamic situations needs immediate actions within limited time, information and resources. The aim of the study is to provide the foundation for division of unsafe area into risk zones according to the impact of hazardous parameters (heat radiation, thermal dose, overpressure, chemical concentrations). A decision on the boundary values for three risk zones is based on the vulnerability analysis that covered a variety of accident scenarios containing the release of a toxic or flammable substance which either evaporates, ignites and/or explodes. Critical values are selected for the boundary definition of the Red, Orange and Yellow risk zones upon the examination of harmful effects that are likely to cause injuries of varying severity to people and different levels of damage to structures. The obtained results provide the basis for creating a comprehensive real-time risk map for a decision support at CBRNE operations.

Keywords: Boundary values, CBRNE threats, decision making process, hazardous effects, vulnerability analysis, risk zones.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 441
1143 Performance Evaluation of a Diesel Engine Fueled with Methyl Ester of shea Butter

Authors: Christopher C. Enweremadu, Hilary L. Rutto, Najeem Peleowo

Abstract:

Biodiesel as an alternative fuel for diesel engines has been developed for some three decades now. While it is gaining wide acceptance in Europe, USA and some parts of Asia, the same cannot be said of Africa. With more than 35 countries in the continent depending on imported crude oil, it is necessary to look for alternative fuels which can be produced from resources available locally within any country. Hence this study presents performance of single cylinder diesel engine using blends of shea butter biodiesel. Shea butter was transformed into biodiesel by transesterification process. Tests are conducted to compare the biodiesel with baseline diesel fuel in terms of engine performance and exhaust emission characteristics. The results obtained showed that the addition of biodiesel to diesel fuel decreases the brake thermal efficiency (BTE) and increases the brake specific fuel consumption (BSFC). These results are expected due to the lower energy content of biodiesel fuel. On the other hand while the NOx emissions increased with increase in biodiesel content in the fuel blends, the emissions of carbon monoxide (CO), un-burnt hydrocarbon (UHC) and smoke opacity decreased. The engine performance which indicates that the biodiesel has properties and characteristics similar to diesel fuel and the reductions in exhaust emissions make shea butter biodiesel a viable additive or substitute to diesel fuel.

Keywords: Biodiesel, diesel engine, engine performance and emission, shea butter, transesterification

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2592
1142 Increasing the Capacity of Plant Bottlenecks by Using of Improving the Ratio of Mean Time between Failures to Mean Time to Repair

Authors: Jalal Soleimannejad, Mohammad Asadizeidabadi, Mahmoud Koorki, Mojtaba Azarpira

Abstract:

A significant percentage of production costs is the maintenance costs, and analysis of maintenance costs could to achieve greater productivity and competitiveness. With this is mind, the maintenance of machines and installations is considered as an essential part of organizational functions and applying effective strategies causes significant added value in manufacturing activities. Organizations are trying to achieve performance levels on a global scale with emphasis on creating competitive advantage by different methods consist of RCM (Reliability-Center-Maintenance), TPM (Total Productivity Maintenance) etc. In this study, increasing the capacity of Concentration Plant of Golgohar Iron Ore Mining & Industrial Company (GEG) was examined by using of reliability and maintainability analyses. The results of this research showed that instead of increasing the number of machines (in order to solve the bottleneck problems), the improving of reliability and maintainability would solve bottleneck problems in the best way. It should be mention that in the abovementioned study, the data set of Concentration Plant of GEG as a case study, was applied and analyzed.

Keywords: Bottleneck, Golgohar Iron Ore Mining and Industrial Company, maintainability, maintenance costs, reliability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 956
1141 Shock Induced Damage onto Free-Standing Objects in an Earthquake

Authors: Haider AlAbadi, Joe Petrolito, Nelson Lam, Emad Gad

Abstract:

In areas of low to moderate seismicity many building contents and equipment are not positively fixed to the floor or tied to adjacent walls. Under seismic induced horizontal vibration, such contents and equipment can suffer from damage by either overturning or impact associated with rocking. This paper focuses on the estimation of shock on typical contents and equipment due to rocking. A simplified analytical model is outlined that can be used to estimate the maximum acceleration on a rocking object given its basic geometric and mechanical properties. The developed model was validated against experimental results. The experimental results revealed that the maximum shock acceleration can be underestimated if the static stiffness of the materials at the interface between the rocking object and floor is used rather than the dynamic stiffness. Excellent agreement between the model and experimental results was found when the dynamic stiffness for the interface material was used, which was found to be generally much higher than corresponding static stiffness under different investigated boundary conditions of the cushion. The proposed model can be a beneficial tool in performing a rapid assessment of shock sensitive components considered for possible seismic rectification. 

Keywords: Impact, shock, earthquakes, rocking, building contents, overturning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1821
1140 Impact of Changes in Excise Tax Rate for Strong Alcohol on Consumption and State Revenues in Latvia

Authors: A. Strateičuks, V. Kaže, R. Škapars

Abstract:

State tax revenues in most countries started to decrease during the recession. Government of Latvia decided to compensate the decline by increasing rates of several taxes including excise tax on strong alcohol. The total increase in 2009 constituted 42% and the rate increased from 896€ to 1 266€ for 100l of absolute alcohol. Since then this has had a negative impact on consumption volumes and the split between legal and illegal market. The legal alcohol sales decreased by almost 50% (by volume), consequentially having negative effect on the State revenues from VAT and excise tax. Estimated results for 2010 are indicating 54 million € decrease in VAT, excise tax and other taxes versus 2008 (excise tax -19 million €, VAT -30 million €, other taxes -5 million €). The paper aims to analyze impact of the increase in excise tax on consumption patterns, State revenues and competitiveness of the local companies to draw up proposals for the state authorities regarding more effective tax policies. The analysis reveals a relationship between excise tax rate, illegal alcohol market and State revenues. The results can be used to improve excise tax system and effectiveness in Latvia.

Keywords: State revenues, alcohol market, excise tax, competitiveness, consumption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1773
1139 Effect of U-Turn in Reinforced Concrete Dog-Legged Stair Slabs

Authors: Abdul Baqi, Zaid Mohammad

Abstract:

Reinforced concrete stair slabs with mid landings i.e. Dog-legged shaped are conventionally designed as per specifications of standard codes of practices which guide about the effective span according to the varying support conditions. Presently, the behavior of such slabs has been investigated using Finite Element method. A single flight stair slab with landings on both sides and supported at ends on wall, and a multi flight stair slab with landings and six different support arrangements have been analyzed. The results obtained for stresses, strains and deflections are used to describe the behavior of such stair slabs, including locations of critical moments and deflections. Values of critical moments obtained by F.E. analysis have also have been compared with that obtained from conventional analysis. Analytical results show that the moments are also critical near the kinks i.e. junction of mid-landing and inclined waist slab. This change in the behavior of dog-legged stair slab may be due to continuity of the material in transverse direction in two landings adjoining the waist slab, hence additional stiffness achieved. This change in the behavior is generally not taken care of in conventional method of design.

Keywords: Dog-legged, Stair slab, F.E. Analysis, Landing, Reinforced concrete.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4554
1138 Study on Cross-flow Heat Transfer in Fixed Bed

Authors: Hong-fang Ma, Hai-tao Zhang, Wei-yong Ying, Ding-ye Fang

Abstract:

Radial flow reactor was focused for large scale methanol synthesis and in which the heat transfer type was cross-flow. The effects of operating conditions including the reactor inlet air temperature, the heating pipe temperature and the air flow rate on the cross-flow heat transfer was investigated and the results showed that the temperature profile of the area in front of the heating pipe was slightly affected by all the operating conditions. The main area whose temperature profile was influenced was the area behind the heating pipe. The heat transfer direction according to the air flow directions. In order to provide the basis for radial flow reactor design calculation, the dimensionless number group method was used for data fitting of the bed effective thermal conductivity and the wall heat transfer coefficient which was calculated by the mathematical model with the product of Reynolds number and Prandtl number. The comparison of experimental data and calculated value showed that the calculated value fit the experimental data very well and the formulas could be used for reactor designing calculation.

Keywords: Cross-flow, Heat transfer, Fixed bed, Mathematical model

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1874
1137 Memory Estimation of Internet Server Using Queuing Theory: Comparative Study between M/G/1, G/M/1 and G/G/1 Queuing Model

Authors: L. K. Singh, Riktesh Srivastava

Abstract:

How to effectively allocate system resource to process the Client request by Gateway servers is a challenging problem. In this paper, we propose an improved scheme for autonomous performance of Gateway servers under highly dynamic traffic loads. We devise a methodology to calculate Queue Length and Waiting Time utilizing Gateway Server information to reduce response time variance in presence of bursty traffic. The most widespread contemplation is performance, because Gateway Servers must offer cost-effective and high-availability services in the elongated period, thus they have to be scaled to meet the expected load. Performance measurements can be the base for performance modeling and prediction. With the help of performance models, the performance metrics (like buffer estimation, waiting time) can be determined at the development process. This paper describes the possible queue models those can be applied in the estimation of queue length to estimate the final value of the memory size. Both simulation and experimental studies using synthesized workloads and analysis of real-world Gateway Servers demonstrate the effectiveness of the proposed system.

Keywords: M/M/1, M/G/1, G/M/1, G/G/1, Gateway Servers, Buffer Estimation, Waiting Time, Queuing Process.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1936
1136 Grouping and Indexing Color Features for Efficient Image Retrieval

Authors: M. V. Sudhamani, C. R. Venugopal

Abstract:

Content-based Image Retrieval (CBIR) aims at searching image databases for specific images that are similar to a given query image based on matching of features derived from the image content. This paper focuses on a low-dimensional color based indexing technique for achieving efficient and effective retrieval performance. In our approach, the color features are extracted using the mean shift algorithm, a robust clustering technique. Then the cluster (region) mode is used as representative of the image in 3-D color space. The feature descriptor consists of the representative color of a region and is indexed using a spatial indexing method that uses *R -tree thus avoiding the high-dimensional indexing problems associated with the traditional color histogram. Alternatively, the images in the database are clustered based on region feature similarity using Euclidian distance. Only representative (centroids) features of these clusters are indexed using *R -tree thus improving the efficiency. For similarity retrieval, each representative color in the query image or region is used independently to find regions containing that color. The results of these methods are compared. A JAVA based query engine supporting query-by- example is built to retrieve images by color.

Keywords: Content-based, indexing, cluster, region.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1812
1135 Investigation of Microstructure of Differently Sub-Zero Treated Vanadis 6 Steel

Authors: J. Ptačinová, J. Ďurica, P. Jurči, M Kusý

Abstract:

Ledeburitic tool steel Vanadis 6 has been subjected to sub-zero treatment (SZT) at -140 °C and -196 °C, for different durations up to 48 h. The microstructure and hardness have been examined with reference to the same material after room temperature quenching, by using the light microscopy, scanning electron microscopy, X-ray diffraction, and Vickers hardness testing method. The microstructure of the material consists of the martensitic matrix with certain amount of retained austenite, and of several types of carbides – eutectic carbides, secondary carbides, and small globular carbides. SZT reduces the retained austenite amount – this is more effective at -196 °C than at -140 °C. Alternatively, the amount of small globular carbides increases more rapidly after SZT at -140 °C than after the treatment at -140 °C. The hardness of sub-zero treated material is higher than that of conventionally treated steel when tempered at low temperature. Compressive hydrostatic stresses are developed in the retained austenite due to the application of SZT, as a result of more complete martensitic transformation. This is also why the population density of small globular carbides is substantially increased due to the SZT. In contrast, the hardness of sub-zero treated samples decreases more rapidly compared to that of conventionally treated steel, and in addition, sub-zero treated material induces a loss the secondary hardening peak.

Keywords: Microstructure, Vanadis 6 tool steel, sub-zero treatment, carbides.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 784