Search results for: Computer Numerical Control (CNC) milling operation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7896

Search results for: Computer Numerical Control (CNC) milling operation

3726 A Real-time Computer Vision System for VehicleTracking and Collision Detection

Authors: Mustafa Kisa, Fatih Mehmet Botsali

Abstract:

Recent developments in automotive technology are focused on economy, comfort and safety. Vehicle tracking and collision detection systems are attracting attention of many investigators focused on safety of driving in the field of automotive mechatronics. In this paper, a vision-based vehicle detection system is presented. Developed system is intended to be used in collision detection and driver alert. The system uses RGB images captured by a camera in a car driven in the highway. Images captured by the moving camera are used to detect the moving vehicles in the image. A vehicle ahead of the camera is detected in daylight conditions. The proposed method detects moving vehicles by subtracting successive images. Plate height of the vehicle is determined by using a plate recognition algorithm. Distance of the moving object is calculated by using the plate height. After determination of the distance of the moving vehicle relative speed of the vehicle and Time-to-Collision are calculated by using distances measured in successive images. Results obtained in road tests are discussed in order to validate the use of the proposed method.

Keywords: Image possessing, vehicle tracking, license plate detection, computer vision.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3084
3725 A Computer Aided Detection (CAD) System for Microcalcifications in Mammograms - MammoScan mCaD

Authors: Kjersti Engan, Thor Ole Gulsrud, Karl Fredrik Fretheim, Barbro Furebotten Iversen, Liv Eriksen

Abstract:

Clusters of microcalcifications in mammograms are an important sign of breast cancer. This paper presents a complete Computer Aided Detection (CAD) scheme for automatic detection of clustered microcalcifications in digital mammograms. The proposed system, MammoScan μCaD, consists of three main steps. Firstly all potential microcalcifications are detected using a a method for feature extraction, VarMet, and adaptive thresholding. This will also give a number of false detections. The goal of the second step, Classifier level 1, is to remove everything but microcalcifications. The last step, Classifier level 2, uses learned dictionaries and sparse representations as a texture classification technique to distinguish single, benign microcalcifications from clustered microcalcifications, in addition to remove some remaining false detections. The system is trained and tested on true digital data from Stavanger University Hospital, and the results are evaluated by radiologists. The overall results are promising, with a sensitivity > 90 % and a low false detection rate (approx 1 unwanted pr. image, or 0.3 false pr. image).

Keywords: mammogram, microcalcifications, detection, CAD, MammoScan μCaD, VarMet, dictionary learning, texture, FTCM, classification, adaptive thresholding

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1787
3724 Examination of the Water and Nutrient Utilization of Maize Hybrids on Chernozem Soil

Authors: L. G. Karancsi

Abstract:

The research was set up on chernozem soil at the Látókép AGTC MÉK research area of the University of Debrecen in Hungary. We examined the yield, the yield production per 1kg NPK fertilizer and the water and nutrient utilization of hybrid PR37N01 and PR37M81 in 2013. We found that PR37N01 produced the most yield at the level of N120+P (17,476kg ha-1) while PR37M81 reached the highest yield at level N150+PK (16,754kg ha-1). Studies related to yield production per 1kg NPK indicated that the best results were achieved at level N30+PK compared to the control treatment. Yield production per 1kg NPK was17.6kg kg-1 by P37N01 and 44.2kg kg-1 by PR37M81. By comparing the water utilization of hybrids we found that the worst water utilization results were reached in the control treatment (PR37N01: 26.2kg mm-1, PR37M81: 19.5kg mm-1). The best water utilization values were produced at level N120+PK in the case of hybrid PR37N01 (32.1kg mm-1) and at N150+PK in the case of hybrid PR37M81 (30.8kg mm-1). We established the values of the nutrient reaction and the fertilizer optimum of hybrids. We discovered a strong relationship between the amount of fertilizer applied and the yield produced (r2= 0.8228–0.9515). The best nutrient response was induced by hybrid PR37N01, while the weakest results were reached by hybrid PR37M81.

Keywords: Hybrid, maize, nutrient, yield, water utilization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1447
3723 Parallel Vector Processing Using Multi Level Orbital DATA

Authors: Nagi Mekhiel

Abstract:

Many applications use vector operations by applying single instruction to multiple data that map to different locations in conventional memory. Transferring data from memory is limited by access latency and bandwidth affecting the performance gain of vector processing. We present a memory system that makes all of its content available to processors in time so that processors need not to access the memory, we force each location to be available to all processors at a specific time. The data move in different orbits to become available to other processors in higher orbits at different time. We use this memory to apply parallel vector operations to data streams at first orbit level. Data processed in the first level move to upper orbit one data element at a time, allowing a processor in that orbit to apply another vector operation to deal with serial code limitations inherited in all parallel applications and interleaved it with lower level vector operations.

Keywords: Memory organization, parallel processors, serial code, vector processing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1042
3722 Experimental Study of CO2 Absorption in Different Blend Solutions as Solvent for CO2 Capture

Authors: Rouzbeh Ramezani, Renzo Di Felice

Abstract:

Nowadays, removal of CO2 as one of the major contributors to global warming using alternative solvents with high CO2 absorption efficiency, is an important industrial operation. In this study, three amines, including 2-methylpiperazine, potassium sarcosinate and potassium lysinate as potential additives, were added to the potassium carbonate solution as a base solvent for CO2 capture. In order to study the absorption performance of CO2 in terms of loading capacity of CO2 and absorption rate, the absorption experiments in a blend of additives with potassium carbonate were carried out using the vapor-liquid equilibrium apparatus at a temperature of 313.15 K, CO2 partial pressures ranging from 0 to 50 kPa and at mole fractions 0.2, 0.3, and 0.4. Furthermore, the performance of CO2 absorption in these blend solutions was compared with pure monoethanolamine and with pure potassium carbonate. Finally, a correlation with good accuracy was developed using the nonlinear regression analysis in order to predict CO2 loading capacity.

Keywords: Absorption rate, carbon dioxide, CO2 capture, global warming, loading capacity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1280
3721 On Method of Fundamental Solution for Nondestructive Testing

Authors: Jieer Wu, Zheshu Ma

Abstract:

Nondestructive testing in engineering is an inverse Cauchy problem for Laplace equation. In this paper the problem of nondestructive testing is expressed by a Laplace-s equation with third-kind boundary conditions. In order to find unknown values on the boundary, the method of fundamental solution is introduced and realized. Because of the ill-posedness of studied problems, the TSVD regularization technique in combination with L-curve criteria and Generalized Cross Validation criteria is employed. Numerical results are shown that the TSVD method combined with L-curve criteria is more efficient than the TSVD method combined with GCV criteria. The abstract goes here.

Keywords: ill-posed, TSVD, Laplace's equation, inverse problem, L-curve, Generalized Cross Validation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1455
3720 Numerical Solution for Integro-Differential Equations by Using Quartic B-Spline Wavelet and Operational Matrices

Authors: Khosrow Maleknejad, Yaser Rostami

Abstract:

In this paper, Semi-orthogonal B-spline scaling functions and wavelets and their dual functions are presented to approximate the solutions of integro-differential equations.The B-spline scaling functions and wavelets, their properties and the operational matrices of derivative for this function are presented to reduce the solution of integro-differential equations to the solution of algebraic equations. Here we compute B-spline scaling functions of degree 4 and their dual, then we will show that by using them we have better approximation results for the solution of integro-differential equations in comparison with less degrees of scaling functions

Keywords: Integro-differential equations, Quartic B-spline wavelet, Operational matrices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3121
3719 SCR-Stacking Structure with High Holding Voltage for I/O and Power Clamp

Authors: Hyun-Young Kim, Chung-Kwang Lee, Han-Hee Cho, Sang-Woon Cho, Yong-Seo Koo

Abstract:

In this paper, we proposed a novel SCR (Silicon Controlled Rectifier) - based ESD (Electrostatic Discharge) protection device for I/O and power clamp. The proposed device has a higher holding voltage characteristic than conventional SCR. These characteristics enable to have latch-up immunity under normal operating conditions as well as superior full chip ESD protection. The proposed device was analyzed to figure out electrical characteristics and tolerance robustness in term of individual design parameters (D1, D2, D3). They are investigated by using the Synopsys TCAD simulator. As a result of simulation, holding voltage increased with different design parameters. The holding voltage of the proposed device changes from 3.3V to 7.9V. Also, N-Stack structure ESD device with the high holding voltage is proposed. In the simulation results, 2-stack has holding voltage of 6.8V and 3-stack has holding voltage of 10.5V. The simulation results show that holding voltage of stacking structure can be larger than the operation voltage of high-voltage application.

Keywords: ESD, SCR, holding voltage, stack, power clamp.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2044
3718 Fifth Order Variable Step Block Backward Differentiation Formulae for Solving Stiff ODEs

Authors: S.A.M. Yatim, Z.B. Ibrahim, K.I. Othman, F. Ismail

Abstract:

The implicit block methods based on the backward differentiation formulae (BDF) for the solution of stiff initial value problems (IVPs) using variable step size is derived. We construct a variable step size block methods which will store all the coefficients of the method with a simplified strategy in controlling the step size with the intention of optimizing the performance in terms of precision and computation time. The strategy involves constant, halving or increasing the step size by 1.9 times the previous step size. Decision of changing the step size is determined by the local truncation error (LTE). Numerical results are provided to support the enhancement of method applied.

Keywords: Backward differentiation formulae, block backwarddifferentiation formulae, stiff ordinary differential equation, variablestep size.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2224
3717 Review and Evaluation of Trending Canonical Correlation Analyses-Based Brain-Computer Interface Methods

Authors: Bayar Shahab

Abstract:

The fast development of technology that has advanced neuroscience and human interaction with computers has enabled solutions to various problems and issues of this new era. The Brain-Computer Interface (BCI) has opened the door to several new research areas and have been able to provide solutions to critical and vital issues such as supporting a paralyzed patient to interact with the outside world, controlling a robot arm, playing games in VR with the brain, driving a wheelchair. This review presents the state-of-the-art methods and improvements of canonical correlation analyses (CCA), an SSVEP-based BCI method. These are the methods used to extract EEG signal features or, to be said differently, the features of interest that we are looking for in the EEG analyses. Each of the methods from oldest to newest has been discussed while comparing their advantages and disadvantages. This would create a great context and help researchers understand the most state-of-the-art methods available in this field, their pros and cons, and their mathematical representations and usage. This work makes a vital contribution to the existing field of study. It differs from other similar recently published works by providing the following: (1) stating most of the main methods used in this field in a hierarchical way, (2) explaining the pros and cons of each method and their performance, (3) presenting the gaps that exist at the end of each method that can improve the understanding and open doors to new researches or improvements. 

Keywords: BCI, CCA, SSVEP, EEG

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 542
3716 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: Network worms, malware infection propagating malicious code, virus, security, VPN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2789
3715 Design, Implementation and Testing of Mobile Agent Protection Mechanism for MANETS

Authors: Khaled E. A. Negm

Abstract:

In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.

Keywords: Mobile agent security, mobile accesses, agent encryption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2021
3714 2D Fracture Analysis of the First Compression Piston Ring

Authors: I. Razmi, N. Choupani

Abstract:

The incidence of mechanical fracture of an automobile piston rings prompted development of fracture analysis method on this case. The three rings (two compression rings and one oil ring) were smashed into several parts during the power-test (after manufacturing the engine) causing piston and liner to be damaged. The radial and oblique cracking happened on the failed piston rings. The aim of the fracture mechanics simulations presented in this paper was the calculation of particular effective fracture mechanics parameters, such as J-integrals and stress intensity factors. Crack propagation angles were calculated as well. Two-dimensional fracture analysis of the first compression ring has been developed in this paper using ABAQUS CAE6.5-1 software. Moreover, SEM fractography was developed on fracture surfaces and is discussed in this paper. Results of numerical calculations constitute the basis for further research on real object.

Keywords: Compression piston ring, Crack, Fracture mechanics, SEM fractography.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2354
3713 Enhancement of Accountability within the South African Public Sector: Knowledge Gained from the Case of a National Commissioner of the South African Police Service

Authors: Yasmin Nanabhay

Abstract:

The paper scrutinizes the literature on accountability and non-accountability, and then presents an analysis of a South African case which demonstrated consequences of a lack of accountability. Ethical conduct displayed by members of the public sector is integral to creating a sustainable democratic government, which upholds the constitutional tenets of accountability, transparency and professional ethicality. Furthermore, a true constitutional democracy emphasises and advocates the notion of service leadership that nurtures public participation and engages with citizens in a positive manner. Ethical conduct and accountability in the public sector earns public trust; hence these are key principles in good governance. Yet, in the years since the advent of democracy in South Africa, the government has been plagued by rampant corruption and mal-administration by public officials and politicians in leadership positions. The control measures passed by government in an attempt to ensure ethicality and accountability within the public sector include codes of ethics, rules of conduct and the enactment of legislation. These are intended to shape the mindset of members of the public sector, with the ultimate aim of an efficient, effective, ethical, responsive and accountable public service. The purpose of the paper is to analyse control systems and accountability within the public sector and to present reasons for non-accountability by means of a selected case study. The selected case study is the corruption trial of Jackie Selebi, who served as National Commissioner of the South African Police Service but was dismissed from the post. The reasons for non-accountability in the public sector as well as recommendations based on the findings to enhance accountability will be undertaken. The case study demonstrates the experience and impact of corruption and/or mal-administration, as a result of a lack of accountability, which has contributed to the increasing loss of confidence in political leadership in the country as elsewhere in the world. The literature is applied to the erstwhile National Commissioner of the South African Police Service and President of Interpol, as a case study of non-accountability.

Keywords: Public sector, public accountability, internal control, oversight mechanisms, non-compliance, corruption, mal-administration.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 764
3712 Rivers Drain Impact on the Black Sea Coastal Line Biocenosis within the Greater Sochi Area Assessed by Bioassay Method

Authors: Tatiana L. Gorbunova

Abstract:

The research is dedicated to the study of the polluted river inflow impact on the Black Sea coastal marine environment within the watercourse’s plumes in the Greater Sochi area applying bioassay methods with using freshwater and marine microalgae. River waters were analyzed using microalgae Chlorella vulgaris Beijer and sea waters were tested with marine diatoms Phaeodactylum tricornutum Bohlin. Experiments included algae cells abundancy growth assessments in acute (24 hours), sub-acute (72 hours) and chronic (168 hours/7 days) tests. The increase in algal cell growth rates compared to the control in the summer period was detected as a consequence of the recreational activities intensification during the tourism seasonal peak. Most of the analyzed samples demonstrated a significant effect of algae cells growth stimulation compared to the control. It is established that under the impact of contaminants carried by river’s drain to the sea, the capacity of the coastal marine ecosystem is partially capable to compensate its effect on the coastal biocenosis, but the general trends of the impact processes remain constant.

Keywords: Algae abundance growth, bioassay, microalgae, modeling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 33
3711 Performance Analysis of Energy-Efficient Home Femto Base Stations

Authors: Yun Won Chung

Abstract:

The energy consumption of home femto base stations (BSs) can be reduced, by turning off the Wi-Fi radio interface when there is no mobile station (MS) under the coverage of the BSs or MSs do not transmit or receive data packet for long time, especially in late night. In the energy-efficient home femto BSs, if MSs have any data packet to transmit and the Wi-Fi radio interface in off state, MSs wake up the Wi-Fi radio interface of home femto BSs by using additional low power radio interface. In this paper, the performance of the energy-efficient home femto BSs from the aspect of energy consumption and cumulative average delay, and show the effect of various parameters on energy consumption and cumulative average delay. From the results, the tradeoff relationship between energy consumption and cumulative average delay is shown and thus, appropriate operation should be needed to balance the tradeoff.

Keywords: energy consumption, power saving, femto base station.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1883
3710 Using Lagrange Equations to Study the Relative Motion of a Mechanism

Authors: R. A. Petre, S. E. Nichifor, A. Craifaleanu, I. Stroe

Abstract:

The relative motion of a robotic arm formed by homogeneous bars of different lengths and masses, hinged to each other is investigated. The first bar of the mechanism is articulated on a platform, considered initially fixed on the surface of the Earth, while for the second case the platform is considered to be in rotation with respect to the Earth. For both analyzed cases the motion equations are determined using the Lagrangian formalism, applied in its traditional form, valid with respect to an inertial reference system, conventionally considered as fixed. However, in the second case, a generalized form of the formalism valid with respect to a non-inertial reference frame will also be applied. The numerical calculations were performed using a MATLAB program.

Keywords: Lagrange equations, relative motion, inertial or non-inertial reference frame.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 549
3709 Dynamics Analyses of Swing Structure Subject to Rotational Forces

Authors: Buntheng Chhorn, WooYoung Jung

Abstract:

Large-scale swing has been used in entertainment and performance, especially in circus, for a very long time. To increase the safety of this type of structure, a thorough analysis for displacement and bearing stress was performed for an extreme condition where a full cycle swing occurs. Different masses, ranging from 40 kg to 220 kg, and velocities were applied on the swing. Then, based on the solution of differential dynamics equation, swing velocity response to harmonic force was obtained. Moreover, the resistance capacity was estimated based on ACI steel structure design guide. Subsequently, numerical analysis was performed in ABAQUS to obtain the stress on each frame of the swing. Finally, the analysis shows that the expansion of swing structure frame section was required for mass bigger than 150kg.

Keywords: Swing structure, displacement, bearing stress, dynamic loads response, finite element analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1239
3708 The Impact of Bus Rapid Transit on Land Development: A Case Study of Beijing, China

Authors: Taotao Deng, John D. Nelson

Abstract:

Bus Rapid Transit (BRT) has emerged as a cost-effective transport system for urban mobility. However its ability to stimulate land development remains largely unexplored. The study makes use of qualitative (interview method) and quantitative analysis (questionnaire survey and longitudinal analysis of property data) to investigate land development impact resulting from BRT in Beijing, China. The empirical analysis suggests that BRT has a positive impact on the residential and commercial property attractiveness along the busway corridor. The statistical analysis suggests that accessibility advantage conferred by BRT is capitalized into higher property price. The average price of apartments adjacent to a BRT station has gained a relatively faster increase than those not served by the BRT system. The capitalization effect mostly occurs after the full operation of BRT, and is more evident over time and particularly observed in areas which previously lack alternative mobility opportunity.

Keywords: accessibility, Bus Rapid Transit (BRT), Beijing, property value uplift

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4575
3707 Effect of Inclusions on the Shape and Size of Crack Tip Plastic Zones by Element Free Galerkin Method

Authors: A. Jameel, G. A. Harmain, Y. Anand, J. H. Masoodi, F. A. Najar

Abstract:

The present study investigates the effect of inclusions on the shape and size of crack tip plastic zones in engineering materials subjected to static loads by employing the element free Galerkin method (EFGM). The modeling of the discontinuities produced by cracks and inclusions becomes independent of the grid chosen for analysis. The standard displacement approximation is modified by adding additional enrichment functions, which introduce the effects of different discontinuities into the formulation. The level set method has been used to represent different discontinuities present in the domain. The effect of inclusions on the extent of crack tip plastic zones is investigated by solving some numerical problems by the EFGM.

Keywords: EFGM, stress intensity factors, crack tip plastic zones, inclusions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 860
3706 Modeling of Catalyst Deactivation in Catalytic Wet Air Oxidation of Phenol in Fixed Bed Three-Phase Reactor

Authors: Akram Golestani, Mohammad Kazemeini, Farhad Khorasheh, Moslem Fattahi

Abstract:

Modeling and simulation of fixed bed three-phase catalytic reactors are considered for wet air catalytic oxidation of phenol to perform a comparative numerical analysis between tricklebed and packed-bubble column reactors. The modeling involves material balances both for the catalyst particle as well as for different fluid phases. Catalyst deactivation is also considered in a transient reactor model to investigate the effects of various parameters including reactor temperature on catalyst deactivation. The simulation results indicated that packed-bubble columns were slightly superior in performance than trickle beds. It was also found that reaction temperature was the most effective parameter in catalyst deactivation.

Keywords: Catalyst deactivation, Catalytic wet air oxidation, Trickle-bed, Wastewater.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2376
3705 Optimal Allocation of FACTS Devices for ATC Enhancement Using Bees Algorithm

Authors: R.Mohamad Idris, A.Khairuddin, M.W.Mustafa

Abstract:

In this paper, a novel method using Bees Algorithm is proposed to determine the optimal allocation of FACTS devices for maximizing the Available Transfer Capability (ATC) of power transactions between source and sink areas in the deregulated power system. The algorithm simultaneously searches the FACTS location, FACTS parameters and FACTS types. Two types of FACTS are simulated in this study namely Thyristor Controlled Series Compensator (TCSC) and Static Var Compensator (SVC). A Repeated Power Flow with FACTS devices including ATC is used to evaluate the feasible ATC value within real and reactive power generation limits, line thermal limits, voltage limits and FACTS operation limits. An IEEE30 bus system is used to demonstrate the effectiveness of the algorithm as an optimization tool to enhance ATC. A Genetic Algorithm technique is used for validation purposes. The results clearly indicate that the introduction of FACTS devices in a right combination of location and parameters could enhance ATC and Bees Algorithm can be efficiently used for this kind of nonlinear integer optimization.

Keywords: ATC, Bees Algorithm, TCSC, SVC

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3145
3704 Hexagonal Honeycomb Sandwich Plate Optimization Using Gravitational Search Algorithm

Authors: A. Boudjemai, A. Zafrane, R. Hocine

Abstract:

Honeycomb sandwich panels are increasingly used in the construction of space vehicles because of their outstanding strength, stiffness and light weight properties. However, the use of honeycomb sandwich plates comes with difficulties in the design process as a result of the large number of design variables involved, including composite material design, shape and geometry. Hence, this work deals with the presentation of an optimal design of hexagonal honeycomb sandwich structures subjected to space environment. The optimization process is performed using a set of algorithms including the gravitational search algorithm (GSA). Numerical results are obtained and presented for a set of algorithms. The results obtained by the GSA algorithm are much better compared to other algorithms used in this study.

Keywords: Optimization, Gravitational search algorithm, Genetic algorithm, Honeycomb plate.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3274
3703 Wind Power Forecast Error Simulation Model

Authors: Josip Vasilj, Petar Sarajcev, Damir Jakus

Abstract:

One of the major difficulties introduced with wind power penetration is the inherent uncertainty in production originating from uncertain wind conditions. This uncertainty impacts many different aspects of power system operation, especially the balancing power requirements. For this reason, in power system development planing, it is necessary to evaluate the potential uncertainty in future wind power generation. For this purpose, simulation models are required, reproducing the performance of wind power forecasts. This paper presents a wind power forecast error simulation models which are based on the stochastic process simulation. Proposed models capture the most important statistical parameters recognized in wind power forecast error time series. Furthermore, two distinct models are presented based on data availability. First model uses wind speed measurements on potential or existing wind power plant locations, while the seconds model uses statistical distribution of wind speeds.

Keywords: Wind power, Uncertainty, Stochastic process, Monte Carlo simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3908
3702 Teachers’ Continuance Intention Towards Using Madrasati Platform: A Conceptual Framework

Authors: Fiasal Assiri, Joanna Wincenciak, David Morrison-Love

Abstract:

With the rapid spread of the COVID-19 pandemic, the Saudi government suspended students from going to school to combat the outbreak. As e-learning was not applied at all in schools, online teaching and learning have been revived in Saudi Arabia by providing a new platform called ‘Madrasati’. The Decomposed Theory of Planned Behaviour (DTPB) is used to examine individuals’ intention behaviour in many fields. Nevertheless, the factors that affect teachers’ continuance intention of the Madrasati platform have not yet been investigated. The purpose of this paper is to present a conceptual model in light with DTPB. To enhance the predictability of the model, the study incorporates other variables including learning content quality and interactivity as sub-factors under the perceived usefulness, students and government influences under the subjective norms, and technical support and prior e-learning experience under the perceived behavioural control. The model will be further validated using a mixed methods approach. Such findings would help administrators and stakeholders to understand teachers’ needs and develop new methods that might encourage teachers to continue using Madrasati effectively in their teaching.

Keywords: Madrasati, Decomposed Theory of Planned Behaviour, continuance intention, attitude, subjective norms, perceived behavioural control.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 440
3701 A Special Algorithm to Approximate the Square Root of Positive Integer

Authors: Hsian Ming Goo

Abstract:

The paper concerns a special approximate algorithm of the square root of the specific positive integer, which is built by the use of the property of positive integer solution of the Pell’s equation, together with using some elementary theorems of matrices, and then takes it to compare with general used the Newton’s method and give a practical numerical example and error analysis; it is unexpected to find its special property: the significant figure of the approximation value of the square root of positive integer will increase one digit by one. It is well useful in some occasions.

Keywords: Special approximate algorithm, square root, Pell’s equation, Newton’s method, error analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2785
3700 A Novel Single-Wavelength All-Optical Flip-Flop Employing Single SOA-MZI

Authors: H. Kaatuzian, M. Sedghi, S. Khatami

Abstract:

In this paper, by exploiting a single semiconductor optical amplifier-Mach Zehnder Interferometer (SOA-MZI), an integratable all-optical flip-flop (AOFF) is proposed. It is composed of a SOA-MZI with a bidirectional coupler at the output. Output signals of both bar and crossbar of the SOA-MZI is fed back to SOAs located in the arms of the Mach-Zehnder Interferometer (MZI). The injected photon-rates to the SOAs are modulated by feedback signals in order to form optical flip-flop. According to numerical analysis, Gaussian optical pulses with the energy of 15.2 fJ and 20 ps duration with the full width at half-maximum criterion, can switch the states of the SR-AOFF. Also simulation results show that the SR-AOFF has the contrast ratio of 8.5 dB between two states with the transition time of nearly 20 ps.

Keywords: All Optical, Flip-Flop, Mach-Zehnder Interferometer (MZI), Semiconductor Optical Amplifier (SOA).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2005
3699 Analyzing of Noise inside a Simple Vehicle Cabin using Boundary Element Method

Authors: A. Soltani, M. Karimi Demneh

Abstract:

In this paper, modeling of an acoustic enclosed vehicle cabin has been carried out by using boundary element method. Also, the second purpose of this study is analyzing of linear wave equation in an acoustic field. The resultants of this modeling consist of natural frequencies that have been compared with resultants derived from finite element method. By using numerical method (boundary element method) and after solution of wave equation inside an acoustic enclosed cabin, this method has been progressed to simulate noise inside a simple vehicle cabin.

Keywords: Boundary element method, natural frequency, noise, vehicle cabin.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2523
3698 CFD Simulation of Surge Wave Generated by Flow-Like Landslides

Authors: Liu-Chao Qiu

Abstract:

The damage caused by surge waves generated in water bodies by flow-like landslides can be very high in terms of human lives and economic losses. The complicated phenomena occurred in this highly unsteady process are difficult to model because three interacting phases: air, water and sediment are involved. The problem therefore is challenging since the effects of non-Newtonian fluid describing the rheology of the flow-like landslides, multi-phase flow and free surface have to be included in the simulation. In this work, the commercial computational fluid dynamics (CFD) package FLUENT is used to model the surge waves due to flow-like landslides. The comparison between the numerical results and experimental data reported in the literature confirms the accuracy of the method.

Keywords: Flow-like landslide, surge wave, VOF, non-Newtonian fluids, multi-phase flows, free surface flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1396
3697 Temperature Field Study of Brake Disc in a Belt Conveyor Brake

Authors: Hou Youfu, Wang Daoming, Meng Qingrui

Abstract:

To reveal the temperature field distribution of disc brake in downward belt conveyor, mathematical models of heat transfer for disc brake were established combined with heat transfer theory. Then, the simulation process was stated in detail and the temperature field of disc brake under conditions of dynamic speed and dynamic braking torque was numerically simulated by using ANSYS software. Finally the distribution and variation laws of temperature field in the braking process were analyzed. Results indicate that the maximum surface temperature occurs at a time before the brake end and there exist large temperature gradients in both radial and axial directions, while it is relatively small in the circumferential direction.

Keywords: Downward belt conveyor, Disc brake, Temperature field, Numerical simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1934