Search results for: code of ethics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 822

Search results for: code of ethics

402 Health Care Ethics in Vulnerable Populations: Clinical Research through the Patient's Eyes

Authors: Alexander V. Libin, Manon Schladen, Assya Pascalev, Nawar Shara, Miriam Philmon, Yuri Millo, Joseph Verbalis

Abstract:

Chronic conditions carry with them strong emotions and often lead to charged relationships between patients and their health providers and, by extension, patients and health researchers. Persons are both autonomous and relational and a purely cognitive model of autonomy neglects the social and relational basis of chronic illness. Ensuring genuine informed consent in research requires a thorough understanding of how participants perceive a study and their reasons for participation. Surveys may not capture the complexities of reasoning that underlies study participation. Contradictory reasons for participation, for instance an initial claim of altruism as rationale and a subsequent claim of personal benefit (therapeutic misconception), affect the quality of informed consent. Individuals apply principles through the filter of personal values and lived experience. Authentic autonomy, and hence authentic consent to research, occurs within the context of patients- unique life narratives and illness experiences.

Keywords: ethical dilemmas, open source technology, patient education, psychology of decision making

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1811
401 FPGA Implementation of the “PYRAMIDS“ Block Cipher

Authors: A. AlKalbany, H. Al hassan, M. Saeb

Abstract:

The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and different sequence in each round. The algorithm was previously software implemented in Cµ code. In this paper, a hardware implementation of the algorithm, using Field Programmable Gate Arrays (FPGA), is presented. In this work, we discuss the algorithm, the implemented micro-architecture, and the simulation and implementation results. Moreover, we present a detailed comparison with other implemented standard algorithms. In addition, we include the floor plan as well as the circuit diagrams of the various micro-architecture modules.

Keywords: FPGA, VHDL, micro-architecture, encryption, cryptography, algorithm, data communication security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1704
400 Performance Analysis of QS-CDMA Systems

Authors: Cuiran Li, Jianli Xie, Chengshu Li

Abstract:

In the paper, the performance of quasi-synchronous CDMA (QS-CDMA) system, which can allow an increased timing error in synchronized access, is discussed. Average BER performance of the system is analyzed in the condition of different access timing error and different asynchronous users by simulation in AWGN channel. The results show that QS-CDMA system is shown to have great performance gain over the asynchronous system when access timing error is within a few chips and asynchronous users is tolerable. However, with access timing error increasing and asynchronous users increasing, the performance of QS-CDMA will degrade. Also, we can determine the number of tolerable asynchronous users for different access timing error by simulation figures.

Keywords: Code-division multiple access, Quasi-SynchronousCDMA, Access timing error

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1311
399 Echo State Networks for Arabic Phoneme Recognition

Authors: Nadia Hmad, Tony Allen

Abstract:

This paper presents an ESN-based Arabic phoneme recognition system trained with supervised, forced and combined supervised/forced supervised learning algorithms. Mel-Frequency Cepstrum Coefficients (MFCCs) and Linear Predictive Code (LPC) techniques are used and compared as the input feature extraction technique. The system is evaluated using 6 speakers from the King Abdulaziz Arabic Phonetics Database (KAPD) for Saudi Arabia dialectic and 34 speakers from the Center for Spoken Language Understanding (CSLU2002) database of speakers with different dialectics from 12 Arabic countries. Results for the KAPD and CSLU2002 Arabic databases show phoneme recognition performances of 72.31% and 38.20% respectively.

Keywords: Arabic phonemes recognition, echo state networks (ESNs), neural networks (NNs), supervised learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2409
398 Experimental and Numerical Studies of Drag Reduction on a Circular Cylinder

Authors: A.O. Ladjedel, B.T.Yahiaoui, C.L.Adjlout, D.O.Imine

Abstract:

In the present paper; an experimental and numerical investigations of drag reduction on a grooved circular cylinder have been performed. The experiments were carried out in closed circuit subsonic wind tunnel (TE44); the pressure distribution on the cylinder was conducted using a TE44DPS differential pressure scanner and the drag forces were measured using the TE81 balance. The display unit is linked to a computer, loaded with DATASLIM software for data analysis and logging of result. The numerical study was performed using the code ANSYS FLUENT solving the Reynolds Averaged Navier-Stokes (RANS) equations. The k-ε and k- ω SST models were tested. The results obtained from the experimental and numerical investigations have showed a reduction in the drag when using longitudinal grooves namely 2 and 6 on the cylinder.

Keywords: Circular cylinder, Drag, grooves, pressure distribution

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2824
397 Algorithmic Skills Transferred from Secondary CSI Studies into Tertiary Education

Authors: Piroska Biró, Mária Csernoch, János Máth, Kálmán Abari

Abstract:

Testing the first year students of Informatics at the University of Debrecen revealed that students start their tertiary studies in programming with a low level of programming knowledge and algorithmic skills. The possible reasons which lead the students to this very unfortunate result were examined. The results of the test were compared to the students’ results in the school leaving exams and to their self-assessment values. It was found that there is only a slight connection between the students’ results in the test and in the school leaving exams, especially at intermediate level. Beyond this, the school leaving exams do not seem to enable students to evaluate their own abilities.

Keywords: Deep and surface approaches, metacognitive abilities, programming and algorithmic skills, school leaving exams, tracking code.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1764
396 The Optimization of Engine Mounting Parts Using Hot-Cold Forging Technology

Authors: D. H. Park, Y. H. Tak, H. H. Kwon, G. J. Kwon, H. G. Kim

Abstract:

The purpose of this study is to develop a forging process of automotive parts that satisfies the deformation characteristics. The analyses of temperature variation and deformation behavior of the material are important to obtain the optimal forging products. The hot compression test was carried out to know formability at high temperature. In order to define the optimum forging conditions including material temperature, strain and forging load, the commercial finite element analysis code was used to simulate the forging procedure of engine mounting parts. Experimental results were compared with the simulation results by finite element analysis. Test results were in good agreement with the simulations.

Keywords: Cold forging, hot forging, engine mounting, automotive parts, optimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1642
395 Corporate Social Responsibility Disclosure, Tax Aggressiveness and Sustainability Report Assurance: Evidence from Thailand

Authors: Eko Budi Santoso, Kazia Laturette, Stanislaus Adnanto Mastan

Abstract:

This study aims to examine the association between disclosure of social responsibility and tax aggressiveness in developing countries, namely Thailand. This is due to the increasing trend of disclosure of social responsibility in developing countries, even though this disclosure of information is still voluntary. On the other hand, developing countries have low taxation rate and investor protection infrastructures that allow the disclosure of social responsibility to be used opportunistically as a tool to fool the attainment of interests. This study also examines the role of assurance on the association between corporate social responsibility disclosure and tax aggressiveness. The assurance aims to provide confidence that the disclosure of social responsibility by the company is valid. This research builds an index to measure the disclosure of social responsibility based on the rules issued by the innovative Global Reporting. The results of the study are based on a sample of publicly traded companies in Thailand, which showed a positive association between disclosure of corporate social responsibility and tax aggressiveness, but it was further discovered that these results were mitigated by the existence of assurance against disclosure of corporate social responsibility. The results of this study indicate that the disclosure of corporate social responsibility can show that the company cares about the issue of social responsibility but does not automatically make the company as one that holds ethical values ​​in its business practices.

Keywords: Corporate Social Responsibility disclosure, tax aggressiveness, sustainability assurance, business ethics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1509
394 Comparison of Two-Phase Critical Flow Models for Estimation of Leak Flow Rate through Cracks

Authors: Tadashi Watanabe, Jinya Katsuyama, Akihiro Mano

Abstract:

The estimation of leak flow rates through narrow cracks in structures is of importance for nuclear reactor safety, since the leak flow could be detected before occurrence of loss-of-coolant accidents. The two-phase critical leak flow rates are calculated using the system analysis code, and two representative non-homogeneous critical flow models, Henry-Fauske model and Ransom-Trapp model, are compared. The pressure decrease and vapor generation in the crack, and the leak flow rates are found to be larger for the Henry-Fauske model. It is shown that the leak flow rates are not affected by the structural temperature, but affected largely by the roughness of crack surface.

Keywords: Crack, critical flow, leak, roughness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 842
393 Numerical Study on the Response of Reinforced Concrete Wall Resisting the Impact Loading

Authors: DucKien Thai, Seung EockKim

Abstract:

A numerical analysis of a reinforced concrete (RC) wall under missile impact loading is presented in this study. The model created by Technical Research Center of Finland was used. The commercial finite element code, LS-DYNA was used to analyze. The structural components of the reinforced concrete wall, missile and their contacts are fully modeled. The material nonlinearity with strain rate effects considering damage and failure is included in the analysis. The results of analysis were verified with other research results. The case-studies with different reinforcement ratios were conducted to investigate the influence of reinforcement on the punching behavior of walls under missile impact.

Keywords: Missile Impact, Reinforced Concrete Walls, LSDYNA, Dynamic Analysis, Punching Behavior.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2556
392 Visualisation Techniques Connecting VRML and GENESIS Environments

Authors: Eduard Kuriščák, Jiří Chludil

Abstract:

We created the tool, which combines the powerful GENESIS (GEneral NEural SImulation System) simulation language with the up-to-date visualisation and internet techniques. Our solution resides in the connection between the simulation output from GENESIS, which is converted to the data-structure suitable for WWW browsers and VRML (Virtual Reality Modelling Language) viewers. The selected GENESIS simulations are once exported into the VRML code, and stored in our neurovisualisation portal (webserver). There, the loaded models, demonstrating mainly the spread of electrical signal (action potentials, postsynaptic potentials) along the neuronal membrane (axon, dendritic tree, neuron) could be displayed in the client-s VRML viewer, without interacting with original GENESIS environment. This enables the visualisation of basic neurophysiological phenomena designed for GENESIS simulator on the independent OS (operation system).

Keywords: GENESIS, neurosimulation, VRML, Java3D.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1790
391 Dynamic Analysis of the Dome with Arches and Rings from Romexpo Bucharest

Authors: V. Precupas, A. Ivan, M. Ivan

Abstract:

The dome with ribs and rings, which covers the ROMEXPO pavilion from Bucharest, was designed after the collapse of the single layer reticulated dome. In this paper, it was made the checking of the structure, under the dynamic loads with three recorded accelerograms calibrated according to Romanian seismic design code P100-1/2006. Under the action the dynamic loadings, it was made a time-history analysis to determine the zones where the plastic hinges appear, at what accelerations and their position on the structure. The studied dome is formed by 32 spatial semi arches and three rings: one circular ring located at the top of the dome and another two rings, design as trusses, the first near the supports and the second as an intermediate rings above the skylights. Above the skylights up to the top, the dome is tight together with purlins and bracings.

Keywords: dome, dynamic analysis, plastic hinges, time-history

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2448
390 Efficient Hardware Architecture of the Direct 2- D Transform for the HEVC Standard

Authors: Fatma Belghith, Hassen Loukil, Nouri Masmoudi

Abstract:

This paper presents the hardware design of a unified architecture to compute the 4x4, 8x8 and 16x16 efficient twodimensional (2-D) transform for the HEVC standard. This architecture is based on fast integer transform algorithms. It is designed only with adders and shifts in order to reduce the hardware cost significantly. The goal is to ensure the maximum circuit reuse during the computing while saving 40% for the number of operations. The architecture is developed using FIFOs to compute the second dimension. The proposed hardware was implemented in VHDL. The VHDL RTL code works at 240 MHZ in an Altera Stratix III FPGA. The number of cycles in this architecture varies from 33 in 4-point- 2D-DCT to 172 when the 16-point-2D-DCT is computed. Results show frequency improvements reaching 96% when compared to an architecture described as the direct transcription of the algorithm.

Keywords: HEVC, Modified Integer Transform, FPGA.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2749
389 Coupling Concept of two Parallel Research Codes for Two and Three Dimensional Fluid Structure Interaction Analysis

Authors: Luciano Garelli, Marco Schauer, Jorge D’Elia, Mario A. Storti, Sabine C. Langer

Abstract:

This paper discuss a coupling strategy of two different software packages to provide fluid structure interaction (FSI) analysis. The basic idea is to combine the advantages of the two codes to create a powerful FSI solver for two and three dimensional analysis. The fluid part is computed by a program called PETSc-FEM a software developed at Centro de Investigaci´on de M´etodos Computacionales –CIMEC. The structural part of the coupled process is computed by the research code elementary Parallel Solver – (ELPASO) of the Technische Universit¨at Braunschweig, Institut f¨ur Konstruktionstechnik (IK).

Keywords: Computational Fluid Dynamics (CFD), Fluid Structure Interaction (FSI), Finite Element Method (FEM).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1943
388 Low Complexity Regular LDPC codes for Magnetic Storage Devices

Authors: Gabofetswe Malema, Michael Liebelt

Abstract:

LDPC codes could be used in magnetic storage devices because of their better decoding performance compared to other error correction codes. However, their hardware implementation results in large and complex decoders. This one of the main obstacles the decoders to be incorporated in magnetic storage devices. We construct small high girth and rate 2 columnweight codes from cage graphs. Though these codes have low performance compared to higher column weight codes, they are easier to implement. The ease of implementation makes them more suitable for applications such as magnetic recording. Cages are the smallest known regular distance graphs, which give us the smallest known column-weight 2 codes given the size, girth and rate of the code.

Keywords: Structured LDPC codes, cage graphs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2112
387 A Follow–Up Study of Bachelor of Science Graduates in Applied Statistics from Suan Sunandha Rajabhat University during the 1999-2012 Academic Years

Authors: Somruedee Pongsena

Abstract:

The purpose of this study is to follow – up the graduated students of Bachelor of Science in Applied Statistics from Suan Sunandha Rajabhat University (SSRU) during the 1999 – 2012 academic years and to provide the fundamental guideline for developing the current curriculum according to Thai Qualifications Framework for Higher Education (TQF: HEd). The sample was collected from 75 graduates by interview and online questionnaire. The content covered 5 subjects were Ethics and Moral, Knowledge, Cognitive Skills, Interpersonal Skill and Responsibility, Numerical Analysis as well as Communication and Information Technology Skills. Data were analyzed by using statistical methods as percentiles, means, standard deviation, t- tests, and F- tests. The findings showed that samples were mostly female had less than 26 years old. The majority of graduates had income in the range of 10,001-20,000 Baht and experience range were 2-5 years. In addition, overall opinions from receiving knowledge to apply to work were at agree; mean score was 3.97 and standard deviation was 0.40. In terms of, the hypothesis testing’s result indicate gender only had different opinion at a significance level of 0.05.

Keywords: Follow up, Graduates, knowledge, opinion, Work performance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1457
386 Research on Hypermediated Images in Asian Films

Authors: Somi Nah, Timothy Yoonsuk Lee, Jinhwan Yu

Abstract:

In films, visual effects have played the role of expressing realities more realistically or describing imaginations as if they are real. Such images are immediated images representing realism, and the logic of immediation for the reality of images has been perceived dominant in visual effects. In order for immediation to have an identity as immediation, there should be the opposite concept hypermediation. In the mid 2000s, hypermediated images were settled as a code of mass culture in Asia. Thus, among Asian films highly popular in those days, this study selected five displaying hypermediated images – 2 Korean, 2 Japanese, and 1 Thailand movies – and examined the semiotic meanings of such images using Roland Barthes- directional and implicated meaning analysis and Metz-s paradigmatic analysis method, focusing on how hypermediated images work in the general context of the films, how they are associated with spaces, and what meanings they try to carry.

Keywords: Asian Films, Hypermediated Images, Semiotics, Visual Effects

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1710
385 Test Data Compression Using a Hybrid of Bitmask Dictionary and 2n Pattern Runlength Coding Methods

Authors: C. Kalamani, K. Paramasivam

Abstract:

In VLSI, testing plays an important role. Major problem in testing are test data volume and test power. The important solution to reduce test data volume and test time is test data compression. The Proposed technique combines the bit maskdictionary and 2n pattern run length-coding method and provides a substantial improvement in the compression efficiency without introducing any additional decompression penalty. This method has been implemented using Mat lab and HDL Language to reduce test data volume and memory requirements. This method is applied on various benchmark test sets and compared the results with other existing methods. The proposed technique can achieve a compression ratio up to 86%.

Keywords: Bit Mask dictionary, 2n pattern run length code, system-on-chip, SOC, test data compression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1921
384 Software Architecture Recovery

Authors: Ghulam Rasool, Nadim Asif

Abstract:

The advent of modern technology shadows its impetus repercussions on successful Legacy systems making them obsolete with time. These systems have evolved the large organizations in major problems in terms of new business requirements, response time, financial depreciation and maintenance. Major difficulty is due to constant system evolution and incomplete, inconsistent and obsolete documents which a legacy system tends to have. The myriad dimensions of these systems can only be explored by incorporating reverse engineering, in this context, is the best method to extract useful artifacts and by exploring these artifacts for reengineering existing legacy systems to meet new requirements of organizations. A case study is conducted on six different type of software systems having source code in different programming languages using the architectural recovery framework.

Keywords: Reverse Engineering, Architecture recovery, Architecture artifacts, Reengineering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2935
383 Heterogeneous Artifacts Construction for Software Evolution Control

Authors: Mounir Zekkaoui, Abdelhadi Fennan

Abstract:

The software evolution control requires a deep understanding of the changes and their impact on different system heterogeneous artifacts. And an understanding of descriptive knowledge of the developed software artifacts is a prerequisite condition for the success of the evolutionary process. The implementation of an evolutionary process is to make changes more or less important to many heterogeneous software artifacts such as source code, analysis and design models, unit testing, XML deployment descriptors, user guides, and others. These changes can be a source of degradation in functional, qualitative or behavioral terms of modified software. Hence the need for a unified approach for extraction and representation of different heterogeneous artifacts in order to ensure a unified and detailed description of heterogeneous software artifacts, exploitable by several software tools and allowing to responsible for the evolution of carry out the reasoning change concerned.

Keywords: Heterogeneous software artifacts, Software evolution control, Unified approach, Meta Model, Software Architecture.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1798
382 New Investigation of the Exchange Effects Role on the Elastic and Inelastic Scattering of α-Particles on 9Be

Authors: A. Amar, N. Burtebayev, Zh. K. Kerimkulov, M. K. Baktybayev, J. T. Burtebayeva, A. K. Morzabayev, S. K. Sakhiev, N. Saduyev, S. B. Sakuta

Abstract:

Elastic and inelastic scattering of α-particles by 9Be nuclei at different incident energies have been analyzed. Optical model parameters (OMPs) of α-particles elastic scattering by 9Be at different energies have been obtained. Coupled Reaction Channel (CRC) of elastic scattering, inelastic scattering and transfer reaction has been calculated using Fresco Code. The effect of involving CRC calculations on the analysis of differential cross section has been studied. The transfer reaction of (5He) in the reaction 9Be(α,9Be)α has been studied. The spectroscopic factor of 9Be≡α+5He has been extracted.

Keywords: Elastic scattering of α-particles, Optical model parameters, Coupled Reaction Channel, the transfer reaction of (5He), the spectroscopic factor of 9Be≡α+5He.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2954
381 EOG Controlled Motorized Wheelchair for Disabled Persons

Authors: A. Naga Rajesh, S. Chandralingam, T. Anjaneyulu, K. Satyanarayana

Abstract:

Assistive robotics are playing a vital role in advancing the quality of life for disable people. There exist wide range of systems that can control and guide autonomous mobile robots. The objective of the control system is to guide an autonomous mobile robot using the movement of eyes by means of EOG signal. The EOG signal is acquired using Ag/AgCl electrodes and this signal is processed by a microcontroller unit to calculate the eye gaze direction. Then according to the guidance control strategy, the control commands of the wheelchair are sent. The classification of different eye movements allows us to generate simple code for controlling the wheelchair. This work was aimed towards developing a usable and low-cost assistive robotic wheel chair system for disabled people. To live more independent life, the system can be used by the handicapped people especially those with only eye-motor coordination.

Keywords: Electrooculography, Microcontroller, Motors, Wheelchair.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4125
380 Modeling the Country Selection Decision in Retail Internationalization

Authors: A. Hortacsu, A. Tektas

Abstract:

This paper aims to develop a model that assists the international retailer in selecting the country that maximizes the degree of fit between the retailer-s goals and the country characteristics in his initial internationalization move. A two-stage multi criteria decision model is designed integrating the Analytic Hierarchy Process (AHP) and Goal Programming. Ethical, cultural, geographic and economic proximity are identified as the relevant constructs of the internationalization decision. The constructs are further structured into sub-factors within analytic hierarchy. The model helps the retailer to integrate, rank and weigh a number of hard and soft factors and prioritize the countries accordingly. The model has been implemented on a Turkish luxury goods retailer who was planning to internationalize. Actual entry of the specific retailer in the selected country is a support for the model. Implementation on a single retailer limits the generalizability of the results; however, the emphasis of the paper is on construct identification and model development. The paper enriches the existing literature by proposing a hybrid multi objective decision model which introduces new soft dimensions i.e. perceived distance, ethical proximity, humane orientation to the decision process and facilitates effective decision making.

Keywords: Analytic hierarchy process, culture, ethics, goal programming, retail foreign market selection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2341
379 Seamless MATLAB® to Register-Transfer Level Design Methodology Using High-Level Synthesis

Authors: Petri Solanti, Russell Klein

Abstract:

Many designers are asking for an automated path from an abstract mathematical MATLAB model to a high-quality Register-Transfer Level (RTL) hardware description. Manual transformations of MATLAB or intermediate code are needed, when the design abstraction is changed. Design conversion is problematic as it is multidimensional and it requires many different design steps to translate the mathematical representation of the desired functionality to an efficient hardware description with the same behavior and configurability. Yet, a manual model conversion is not an insurmountable task. Using currently available design tools and an appropriate design methodology, converting a MATLAB model to efficient hardware is a reasonable effort. This paper describes a simple and flexible design methodology that was developed together with several design teams.

Keywords: Design methodology, high-level synthesis, MATLAB, verification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 560
378 Fatigue Crack Initiation and Propagation through Residual Stress Field

Authors: M. Benachour, N. Benachour, M. Benguediab

Abstract:

In this paper fatigue crack initiation and propagation in notched plate under constant amplitude loading through tensile residual stress field of 2024 T351 Al-alloy plate were investigated. Residual stress field was generated by plastic deformation using finite element method (FEM) where isotropic hardening in Von Mises model was applied. Simulation of fatigue behavior was made on AFGROW code. It was shown that the fatigue crack initiation and propagation were affected by level of residual stress filed. In this investigation, the presence of tensile residual stresses at notch (hole) reduces considerably the total fatigue life. It was shown that the decreasing in stress reduces the fatigue crack growth rates.

Keywords: Residual stress, fatigue crack initiation, fatigue crack growth, Al-alloy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2718
377 Numerical Simulation of the Flow Field around a Vertical Flat Plate of Infinite Extent

Authors: Marco Raciti Castelli, Paolo Cioppa, Ernesto Benini

Abstract:

This paper presents a CFD analysis of the flow field around a thin flat plate of infinite span inclined at 90° to a fluid stream of infinite extent. Numerical predictions have been compared to experimental measurements, in order to assess the potential of the finite volume code of determining the aerodynamic forces acting on a bluff body invested by a fluid stream of infinite extent. Several turbulence models and spatial node distributions have been tested. Flow field characteristics in the neighborhood of the flat plate have been investigated, allowing the development of a preliminary procedure to be used as guidance in selecting the appropriate grid configuration and the corresponding turbulence model for the prediction of the flow field over a two-dimensional vertical flat plate.

Keywords: CFD, vertical flat plate, aerodynamic force

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2630
376 A Parametric Study on Deoiling Hydrocyclones Flow Field

Authors: Maysam Saidi, Reza Maddahian, Bijan Farhanieh

Abstract:

Hydrocyclones flow field study is conducted by performing a parametric study. Effect of cone angle on deoiling hydrocyclones flow behaviour is studied in this research. Flow field of hydrocyclone is obtained by three-dimensional simulations with OpenFOAM code. Because of anisotropic behaviour of flow inside hydrocyclones LES is a suitable method to predict the flow field since it resolves large scales and model isotropic small scales. Large eddy simulation is used to predict the flow behavior of three different cone angles. Differences in tangential velocity and pressure distribution are reported in some figures.

Keywords: Deoiling hydrocyclones, Flow field, Hydrocyclone cone angle, Large Eddy Simulation, Pressure distribution

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2420
375 Using a Trust-Based Environment Key for Mobile Agent Code Protection

Authors: Salima Hacini, Zahia Guessoum, Zizette Boufaïda

Abstract:

Human activities are increasingly based on the use of remote resources and services, and on the interaction between remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with various environmental security conditions. The aim of this paper is to propose a trust based mechanism to improve the security of mobile agents and allow their execution in various environments. Thus, an adaptive trust mechanism is proposed. It is based on the dynamic interaction between the agent and the environment. Information collected during the interaction enables generation of an environment key. This key informs on the host-s trust degree and permits the mobile agent to adapt its execution. Trust estimation is based on concrete parameters values. Thus, in case of distrust, the source of problem can be located and a mobile agent appropriate behavior can be selected.

Keywords: Internet security, malicious host, mobile agent security, trust management

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1413
374 Effect of Iterative Algorithm on the Performance of MC-CDMA System with Nonlinear Models of HPA

Authors: R. Blicha

Abstract:

High Peak to Average Power Ratio (PAPR) of the transmitted signal is a serious problem in multicarrier systems (MC), such as Orthogonal Frequency Division Multiplexing (OFDM), or in Multi-Carrier Code Division Multiple Access (MC-CDMA) systems, due to large number of subcarriers. This effect is possible reduce with some PAPR reduction techniques. Spreading sequences at the presence of Saleh and Rapp models of high power amplifier (HPA) have big influence on the behavior of system. In this paper we investigate the bit-error-rate (BER) performance of MC-CDMA systems. Basically we can see from simulations that the MC-CDMA system with Iterative algorithm can be providing significantly better results than the MC-CDMA system. The results of our analyses are verified via simulation.

Keywords: MC-CDMA, Iterative algorithm, PAPR, BER, Saleh, Rapp, Spreading Sequences.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2378
373 A Numerical Simulation of the Indoor Air Flow

Authors: Karel Frana, Jianshun S. Zhang, Milos Muller

Abstract:

The indoor airflow with a mixed natural/forced convection was numerically calculated using the laminar and turbulent approach. The Boussinesq approximation was considered for a simplification of the mathematical model and calculations. The results obtained, such as mean velocity fields, were successfully compared with experimental PIV flow visualizations. The effect of the distance between the cooled wall and the heat exchanger on the temperature and velocity distributions was calculated. In a room with a simple shape, the computational code OpenFOAM demonstrated an ability to numerically predict flow patterns. Furthermore, numerical techniques, boundary type conditions and the computational grid quality were examined. Calculations using the turbulence model k-omega had a significant effect on the results influencing temperature and velocity distributions.

Keywords: natural and forced convections, numerical simulations, indoor airflows.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3206