Search results for: real number sequences.
5260 The Impact of the Number of Neurons in the Hidden Layer on the Performance of MLP Neural Network: Application to the Fast Identification of Toxic Gases
Authors: Slimane Ouhmad, Abdellah Halimi
Abstract:
In this work, neural networks methods MLP type were applied to a database from an array of six sensors for the detection of three toxic gases. The choice of the number of hidden layers and the weight values are influential on the convergence of the learning algorithm. We proposed, in this article, a mathematical formula to determine the optimal number of hidden layers and good weight values based on the method of back propagation of errors. The results of this modeling have improved discrimination of these gases and optimized the computation time. The model presented here has proven to be an effective application for the fast identification of toxic gases.
Keywords: Back-propagation, Computing time, Fast identification, MLP neural network, Number of neurons in the hidden layer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22625259 Low Cost Real Time Robust Identification of Impulsive Signals
Authors: R. Biondi, G. Dys, G. Ferone, T. Renard, M. Zysman
Abstract:
This paper describes an automated implementable system for impulsive signals detection and recognition. The system uses a Digital Signal Processing device for the detection and identification process. Here the system analyses the signals in real time in order to produce a particular response if needed. The system analyses the signals in real time in order to produce a specific output if needed. Detection is achieved through normalizing the inputs and comparing the read signals to a dynamic threshold and thus avoiding detections linked to loud or fluctuating environing noise. Identification is done through neuronal network algorithms. As a setup our system can receive signals to “learn” certain patterns. Through “learning” the system can recognize signals faster, inducing flexibility to new patterns similar to those known. Sound is captured through a simple jack input, and could be changed for an enhanced recording surface such as a wide-area recorder. Furthermore a communication module can be added to the apparatus to send alerts to another interface if needed.
Keywords: Sound Detection, Impulsive Signal, Background Noise, Neural Network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23355258 A Preliminary Study on Effects of Community Structures on Epidemic Spreading and Detection in Complex Networks
Authors: Yi Yu, Gaoxi Xiao
Abstract:
Community structures widely exist in almost all real-life networks. Extensive researches have been carried out on detecting community structures in complex networks. However, many aspects of how community structures may affect the dynamics and properties of complex networks still remain unclear. In this work, we examine the impacts of community structures on the epidemic spreading and detection in complex networks. Extensive simulation results show that community structures may not help decrease the infection size at steady state, yet they could indeed help slow down the infection spreading. Also, networks with strong community structures may expect to have a smaller average infection size when equipped with a number of sparsely deployed monitors.
Keywords: Complex network, epidemic spreading, infection size, infection monitoring.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15995257 An Iterative Algorithm for Inverse Kinematics of 5-DOF Manipulator with Offset Wrist
Authors: Juyi Park, Jung-Min Kim, Hee-Hwan Park, Jin-Wook Kim, Gye-Hyung Kang, Soo-Ho Kim
Abstract:
This paper presents an iterative algorithm to find a inverse kinematic solution of 5-DOF robot. The algorithm is to minimize the iteration number. Since the 5-DOF robot cannot give full orientation of tool. Only z-direction of tool is satisfied while rotation of tool is determined by kinematic constraint. This work therefore described how to specify the tool direction and let the tool rotation free. The simulation results show that this algorithm effectively worked. Using the proposed iteration algorithm, error due to inverse kinematics converged to zero rapidly in 5 iterations. This algorithm was applied in real welding robot and verified through various practical works.Keywords: 5-DOF manipulator, Inverse kinematics, Iterative algorithm, Wrist offset.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 41415256 Occupational Safety Need Analysis for Turkey and Europe
Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci
Abstract:
This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.Keywords: Europe, need analysis, occupational safety, Turkey, vocational education.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14125255 Effects of Viscous Dissipation and Concentration Based Internal Heat Source on Convective Instability in a Porous Medium with Throughflow
Authors: N. Deepika, P. A. L. Narayana
Abstract:
Linear stability analysis of double diffusive convection in a horizontal porous layer saturated with fluid is examined by considering the effects of viscous dissipation, concentration based internal heat source and vertical throughflow. The basic steady state solution for Governing equations is derived. Linear stability analysis has been implemented numerically by using shooting and Runge-kutta methods. Critical thermal Rayleigh number Rac is obtained for various values of solutal Rayleigh number Sa, vertical Peclet number Pe, Gebhart number Ge, Lewis number Le and measure of concentration based internal heat source γ. It is observed that Ge has destabilizing effect for upward throughflow and stabilizing effect for downward throughflow. And γ has considerable destabilizing effect for upward throughflow and insignificant destabilizing effect for downward throughflow.Keywords: Porous medium, concentration based internal heat source, vertical throughflow, viscous dissipation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16345254 2D Image Processing for DSO Astrophotography
Authors: R. Suszynski, K. Wawryn, R. Wirski
Abstract:
The new concept of two–dimensional (2D) image processing implementation for auto-guiding system is shown in this paper. It is dedicated to astrophotography and operates with astronomy CCD guide cameras or with self-guided dual-detector CCD cameras and ST4 compatible equatorial mounts. This idea was verified by MATLAB model, which was used to test all procedures and data conversions. Next the circuit prototype was implemented at Altera MAX II CPLD device and tested for real astronomical object images. The digital processing speed of CPLD prototype board was sufficient for correct equatorial mount guiding in real-time system.Keywords: DSO astrophotography, image processing, twodimensionalconvolution method, two-dimensional filtering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22765253 Comparison of Different Types of Sources of Traffic Using SFQ Scheduling Discipline
Authors: Alejandro Gomez Suarez, H. Srikanth Kamath
Abstract:
In this paper, SFQ (Start Time Fair Queuing) algorithm is analyzed when this is applied in computer networks to know what kind of behavior the traffic in the net has when different data sources are managed by the scheduler. Using the NS2 software the computer networks were simulated to be able to get the graphs showing the performance of the scheduler. Different traffic sources were introduced in the scripts, trying to establish the real scenario. Finally the results were that depending on the data source, the traffic can be affected in different levels, when Constant Bite Rate is applied, the scheduler ensures a constant level of data sent and received, but the truth is that in the real life it is impossible to ensure a level that resists the changes in work load. Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21385252 Linear Stability of Convection in a Viscoelastic Nanofluid Layer
Authors: Long Jye Sheu
Abstract:
This paper presents a linear stability analysis of natural convection in a horizontal layer of a viscoelastic nanofluid. The Oldroyd B model was utilized to describe the rheological behavior of a viscoelastic nanofluid. The model used for the nanofluid incorporated the effects of Brownian motion and thermophoresis. The onset criterion for stationary and oscillatory convection was derived analytically. The effects of the Deborah number, retardation parameters, concentration Rayleigh number, Prandtl number, and Lewis number on the stability of the system were investigated. Results indicated that there was competition among the processes of thermophoresis, Brownian diffusion, and viscoelasticity which caused oscillatory rather than stationary convection to occur. Oscillatory instability is possible with both bottom- and top-heavy nanoparticle distributions. Regimes of stationary and oscillatory convection for various parameters were derived and are discussed in detail.Keywords: instability, viscoelastic, nanofluids, oscillatory, Brownian, thermophoresis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28035251 Determination of Some Agricultural Characters of Chickpea (Cicer arietinum L.) Genotypes
Authors: Ercan Ceyhan, Ali Kahraman, Hasan Dalgıç
Abstract:
This research was made during the 2011 and 2012 growing periods in the trial filed of "Research Station for Management of Soil Water and Desertification" according to “Randomized Blocks Design” with 3 replications. Research material was the following chickpea genotype; CA119, CA128, CA149, CA150, CA222, CA250, CA254 and other 2 commercial varieties named as Gökçe and Yaşa. Some agronomical characteristics such as plant height (cm), number of pod per plant, number of seed per pod, number of seed per plant, 1000 seed weight (g) and seed yield (kg ha-1) were determined. Statistically significant variations were found amongst the genotypes for all variables except seeds per pod. Means of the two years showed the range for plant height was from 52.83cm (Gökçe) to 73.00cm (CA150), number of pod per plant was from 14.00 (CA149) to 26.83 (CA261), number of seed per pod was from 1.10 (Gökçe) to 1.19 (CA149 and CA250), number of seed per plant was from 16.28 (CA149) to 31.65 (CA261), 1000 seed weight was from 295.85g (CA149) to 437.80g (CA261) and seed yield was from 1342.73 kg ha-1 (CA261) to 2161.50 kg ha-1 (CA128). Results of the research implicated that the new developed lines were superior compared with the control (commercial) varieties by means of most of the characteristics.
Keywords: Agricultural characters, chickpea, seed yield.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19375250 The Linguistic and Legal Term
Authors: Adam Niewiadomski
Abstract:
The research objective of the project and article “The Linguistic and Legal Term "Real Estate" in the Polish Law and Literature” is characteristic of legal regulations in contemporary countries is the abundance of legal definitions, which are, in fact, formulated separately for the needs of each legal act. This situation does not create favourable conditions for comprehensibility and effectiveness of the law created. The definition mess leads to various interpretations of the same legal circumstances and does not support normal business trading. It needs to be pointed out that using numerous references within a legal act and to other legal acts results in new legal definitions being created for the needs of a given decision by the authority which issues the decision in question. Such interpretation freedom may lead to the law being misused, not to mention being instrumentalised.
Keywords: Real estate, linguistic, legal term.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14585249 Novel Security Strategy for Real Time Digital Videos
Authors: Prakash Devale, R. S. Prasad, Amol Dhumane, Pritesh Patil
Abstract:
Now a days video data embedding approach is a very challenging and interesting task towards keeping real time video data secure. We can implement and use this technique with high-level applications. As the rate-distortion of any image is not confirmed, because the gain provided by accurate image frame segmentation are balanced by the inefficiency of coding objects of arbitrary shape, with a lot factors like losses that depend on both the coding scheme and the object structure. By using rate controller in association with the encoder one can dynamically adjust the target bitrate. This paper discusses about to keep secure videos by mixing signature data with negligible distortion in the original video, and to keep steganographic video as closely as possible to the quality of the original video. In this discussion we propose the method for embedding the signature data into separate video frames by the use of block Discrete Cosine Transform. These frames are then encoded by real time encoding H.264 scheme concepts. After processing, at receiver end recovery of original video and the signature data is proposed.
Keywords: Data Hiding, Digital Watermarking, video coding H.264, Rate Control, Block DCT.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15615248 Numerical Study of Transient Laminar Natural Convection Cooling of high Prandtl Number Fluids in a Cubical Cavity: Influence of the Prandtl Number
Authors: O. Younis, J. Pallares, F. X. Grau
Abstract:
This paper presents and discusses the numerical simulations of transient laminar natural convection cooling of high Prandtl number fluids in cubical cavities, in which the six walls of the cavity are subjected to a step change in temperature. The effect of the fluid Prandtl number on the heat transfer coefficient is studied for three different fluids (Golden Syrup, Glycerin and Glycerin-water solution 50%). The simulations are performed at two different Rayleigh numbers (5·106 and 5·107) and six different Prandtl numbers (3 · 105 ≥Pr≥ 50). Heat conduction through the cavity glass walls is also considered. The propsed correlations of the averaged heat transfer coefficient (N u) showed that it is dependant on the initial Ra and almost independent on P r. The instantaneous flow patterns, temperature contours and time evolution of volume averaged temperature and heat transfer coefficient are presented and analyzed.
Keywords: Transient natural convection, High Prandtl number, variable viscosity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24625247 Protecting the Privacy and Trust of VIP Users on Social Network Sites
Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi
Abstract:
There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.
Keywords: Social Network Sites, Online Social Network, Privacy, Trust, Security and Authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37805246 Free Convective Heat Transfer in an Enclosure Filled with Porous Media with and without Insulated Moving Wall
Authors: Laith Jaafer Habeeb
Abstract:
The present work is concerned with the free convective two dimensional flow and heat transfer, in isotropic fluid filled porous rectangular enclosure with differentially heated walls for steady state incompressible flow have been investigated for non- Darcy flow model. Effects of Darcy number (0.0001 £Da£ 10), Rayleigh number (10 £Ra£ 5000), and aspect ratio (0.25 £AR£ 4), for a range of porosity (0.4 £e£ 0.9) with and without moving lower wall have been studied. The cavity was insulated at the lower and upper surfaces. The right and left heated surfaces allows convective transport through the porous medium, generating a thermal stratification and flow circulations. It was found that the Darcy number, Rayleigh number, aspect ratio, and porosity considerably influenced characteristics of flow and heat transfer mechanisms. The results obtained are discussed in terms of the Nusselt number, vectors, contours, and isotherms.Keywords: Numerical study, moving-wall cavity flow, saturated porous medium, different Darcy and Rayleigh numbers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20655245 Dynamic Clustering using Particle Swarm Optimization with Application in Unsupervised Image Classification
Authors: Mahamed G.H. Omran, Andries P Engelbrecht, Ayed Salman
Abstract:
A new dynamic clustering approach (DCPSO), based on Particle Swarm Optimization, is proposed. This approach is applied to unsupervised image classification. The proposed approach automatically determines the "optimum" number of clusters and simultaneously clusters the data set with minimal user interference. The algorithm starts by partitioning the data set into a relatively large number of clusters to reduce the effects of initial conditions. Using binary particle swarm optimization the "best" number of clusters is selected. The centers of the chosen clusters is then refined via the Kmeans clustering algorithm. The experiments conducted show that the proposed approach generally found the "optimum" number of clusters on the tested images.Keywords: Clustering Validation, Particle Swarm Optimization, Unsupervised Clustering, Unsupervised Image Classification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24545244 Power System Damping Using Hierarchical Fuzzy Multi- Input Power System Stabilizer and Static VAR Compensator
Authors: Mohammad Hasan Raouf, Ebrahim Rasooli Anarmarzi, Hamid Lesani, Javad Olamaei
Abstract:
This paper proposes the application of a hierarchical fuzzy system (HFS) based on multi-input power system stabilizer (MPSS) and also Static Var Compensator (SVC) in multi-machine environment.The number of rules grows exponentially with the number of variables in a conventional fuzzy logic system. The proposed HFS method is developed to solve this problem. To reduce the number of rules the HFS consists of a number of low-dimensional fuzzy systems in a hierarchical structure. In fact, by using HFS the total number of involved rules increases only linearly with the number of input variables. In the MPSS, to have better efficiency an auxiliary signal of reactive power deviation (ΔQ) is added with ΔP+ Δω input type Power system stabilizer (PSS). Phasor model of SVC is described and used in this paper. The performances of MPSS, Conventional power system stabilizer (CPSS), hierarchical Fuzzy Multi-input Power System Stabilizer (HFMPSS) and the proposed method in damping inter-area mode of oscillation are examined in response to disturbances. By using digital simulations the comparative study is illustrated. It can be seen that the proposed PSS is performing satisfactorily within the whole range of disturbances.
Keywords: Power system stabilizer (PSS), hierarchical fuzzysystem (HFS), Static VAR compensator (SVC)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15265243 The Bipartite Ramsey Numbers b(C2m; C2n)
Authors: Rui Zhang, Yongqi Sun, and Yali Wu
Abstract:
Given bipartite graphs H1 and H2, the bipartite Ramsey number b(H1;H2) is the smallest integer b such that any subgraph G of the complete bipartite graph Kb,b, either G contains a copy of H1 or its complement relative to Kb,b contains a copy of H2. It is known that b(K2,2;K2,2) = 5, b(K2,3;K2,3) = 9, b(K2,4;K2,4) = 14 and b(K3,3;K3,3) = 17. In this paper we study the case that both H1 and H2 are even cycles, prove that b(C2m;C2n) ≥ m + n - 1 for m = n, and b(C2m;C6) = m + 2 for m ≥ 4.
Keywords: bipartite graph, Ramsey number, even cycle
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17275242 Parametric Study of Confined Turbulent Impinging Slot Jets upon a Flat Plate
Authors: A. M. Tahsini, S. Tadayon Mousavi
Abstract:
In the present paper, a numerical investigation has been carried out to classify and clarify the effects of paramount parameters on turbulent impinging slot jets. The effects of nozzle-s exit turbulent intensity, distance between nozzle and impinging plate are studied at Reynolds number 5000 and 20000. In addition, the effect of Mach number that is varied between 0.3-0.8 at a constant Reynolds number 133000 is investigated to elucidate the effect of compressibility in impinging jet upon a flat plate. The wall that is located at the same level with nozzle-s exit confines the flow. A compressible finite volume solver is implemented for simulation the flow behavior. One equation Spalart-Allmaras turbulent model is used to simulate turbulent flow at this study. Assessment of the Spalart-Allmaras turbulent model at high nozzle to plate distance, and giving enough insights to characterize the effect of Mach number at high Reynolds number for the complex impinging jet flow are the remarkable results of this study.Keywords: Impinging jet, Numerical simulation, Turbulence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24745241 Sinusoidal Roughness Elements in a Square Cavity
Abstract:
Numerical studies were conducted using Lattice Boltzmann Method (LBM) to study the natural convection in a square cavity in the presence of roughness. An algorithm based on a single relaxation time Bhatnagar-Gross-Krook (BGK) model of Lattice Boltzmann Method (LBM) was developed. Roughness was introduced on both the hot and cold walls in the form of sinusoidal roughness elements. The study was conducted for a Newtonian fluid of Prandtl number (Pr) 1.0. The range of Ra number was explored from 10^3 to 10^6 in a laminar region. Thermal and hydrodynamic behavior of fluid was analyzed using a differentially heated square cavity with roughness elements present on both the hot and cold wall. Neumann boundary conditions were introduced on horizontal walls with vertical walls as isothermal. The roughness elements were at the same boundary condition as corresponding walls. Computational algorithm was validated against previous benchmark studies performed with different numerical methods, and a good agreement was found to exist. Results indicate that the maximum reduction in the average heat transfer was 16.66 percent at Ra number 10^5.
Keywords: Lattice Boltzmann Method Natural convection, Nusselt Number Rayleigh number, Roughness.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21535240 Person Identification using Gait by Combined Features of Width and Shape of the Binary Silhouette
Authors: M.K. Bhuyan, Aragala Jagan.
Abstract:
Current image-based individual human recognition methods, such as fingerprints, face, or iris biometric modalities generally require a cooperative subject, views from certain aspects, and physical contact or close proximity. These methods cannot reliably recognize non-cooperating individuals at a distance in the real world under changing environmental conditions. Gait, which concerns recognizing individuals by the way they walk, is a relatively new biometric without these disadvantages. The inherent gait characteristic of an individual makes it irreplaceable and useful in visual surveillance. In this paper, an efficient gait recognition system for human identification by extracting two features namely width vector of the binary silhouette and the MPEG-7-based region-based shape descriptors is proposed. In the proposed method, foreground objects i.e., human and other moving objects are extracted by estimating background information by a Gaussian Mixture Model (GMM) and subsequently, median filtering operation is performed for removing noises in the background subtracted image. A moving target classification algorithm is used to separate human being (i.e., pedestrian) from other foreground objects (viz., vehicles). Shape and boundary information is used in the moving target classification algorithm. Subsequently, width vector of the outer contour of binary silhouette and the MPEG-7 Angular Radial Transform coefficients are taken as the feature vector. Next, the Principal Component Analysis (PCA) is applied to the selected feature vector to reduce its dimensionality. These extracted feature vectors are used to train an Hidden Markov Model (HMM) for identification of some individuals. The proposed system is evaluated using some gait sequences and the experimental results show the efficacy of the proposed algorithm.Keywords: Gait Recognition, Gaussian Mixture Model, PrincipalComponent Analysis, MPEG-7 Angular Radial Transform.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19115239 Optimization of Structure of Section-Based Automated Lines
Authors: R. Usubamatov, M. Z. Abdulmuin
Abstract:
Automated production lines with so called 'hard structures' are widely used in manufacturing. Designers segmented these lines into sections by placing a buffer between the series of machine tools to increase productivity. In real production condition the capacity of a buffer system is limited and real production line can compensate only some part of the productivity losses of an automated line. The productivity of such production lines cannot be readily determined. This paper presents mathematical approach to solving the structure of section-based automated production lines by criterion of maximum productivity.
Keywords: optimization production line, productivity, sections
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13255238 Numerical Analysis and Experimental Validation of a Downhole Stress/Strain Measurement Tool
Authors: Abhay Bodake, Ping Sui, Hafeez Syed, Ratish Kadam
Abstract:
Real-time measurement of applied forces, like tension, compression, torsion, and bending moment, identifies the transferred energies being applied to the bottomhole assembly (BHA). These forces are highly detrimental to measurement/logging-while-drilling tools and downhole equipment. Real-time measurement of the dynamic downhole behavior, including weight, torque, bending on bit, and vibration, establishes a real-time feedback loop between the downhole drilling system and drilling team at the surface. This paper describes the numerical analysis of the strain data acquired by the measurement tool at different locations on the strain pockets. The strain values obtained by FEA for various loading conditions (tension, compression, torque, and bending moment) are compared against experimental results obtained from an identical experimental setup. Numerical analyses results agree with experimental data within 8% and, therefore, substantiate and validate the FEA model. This FEA model can be used to analyze the combined loading conditions that reflect the actual drilling environment.
Keywords: FEA, M/LWD, Oil & Gas, Strain Measurement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25855237 A Real Time Comparison of Standalone and Grid Connected Solar Photovoltaic Generation Systems
Authors: Sachin Vrajlal Rajani, Vivek Pandya, Ankit Suvariya
Abstract:
Green and renewable energy is getting extraordinary consideration today, because of ecological concerns made by blazing of fossil powers. Photovoltaic and wind power generation are the basic decisions for delivering power in this respects. Producing power by the sun based photovoltaic systems is known to the world, yet control makers may get confounded to pick between on-grid and off-grid systems. In this exploration work, an endeavor is made to compare the off-grid (stand-alone) and on-grid (grid-connected) frameworks. The work presents relative examination, between two distinctive PV frameworks situated at V.V.P. Engineering College, Rajkot. The first framework is 100 kW remain solitary and the second is 60 kW network joined. The real-time parameters compared are; output voltage, load current, power in-flow, power output, performance ratio, yield factor, and capacity factor. The voltage changes and the power variances in both frameworks are given exceptional consideration and the examination is made between the two frameworks to judge the focal points and confinements of both the frameworks.Keywords: Standalone PV systems, grid connected PV systems, comparison, real time data analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30875236 Forecasting of Flash Floods over Wadi Watier –Sinai Peninsula Using the Weather Research and Forecasting (WRF) Model
Authors: Moustafa S. El-Sammany
Abstract:
Flash floods are considered natural disasters that can cause casualties and demolishing of infra structures. The problem is that flash floods, particularly in arid and semi arid zones, take place in very short time. So, it is important to forecast flash floods earlier to its events with a lead time up to 48 hours to give early warning alert to avoid or minimize disasters. The flash flood took place over Wadi Watier - Sinai Peninsula, in October 24th, 2008, has been simulated, investigated and analyzed using the state of the art regional weather model. The Weather Research and Forecast (WRF) model, which is a reliable short term forecasting tool for precipitation events, has been utilized over the study area. The model results have been calibrated with the real data, for the same date and time, of the rainfall measurements recorded at Sorah gauging station. The WRF model forecasted total rainfall of 11.6 mm while the real measured one was 10.8 mm. The calibration shows significant consistency between WRF model and real measurements results.Keywords: Early warning system, Flash floods forecasting, WadiWatier, WRF model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19705235 Hall Effect on MHD Mixed Convection Flow of Viscous-Elastic Incompressible Fluid Past of an Infinite Porous Medium
Authors: T. K. Das, N. Senapatil, R. K. Dhal
Abstract:
An unsteady mixed free convection MHD flow of elastic-viscous incompressible fluid past an infinite vertical porous flat plate is investigated when the presence of heat Source/sink, temperature and concentration are assumed to be oscillating with time and hall effect. The governing equations are solved by complex variable technique. The expressions for the velocity field, temperature field and species concentration are demonstrated in graphs. The effects of the Prandtl number, the Grashof number, modified Grashof number, the Schimidt number, the Hall parameter, Elastic parameter & Magnetic parameter are discussed.
Keywords: MHD, Mixed convective, Elastic-viscous incompressible, rotational, heat transfer, mass transfer, suction and injection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19795234 Optimal Supplementary Damping Controller Design for TCSC Employing RCGA
Authors: S. Panda, S. C. Swain, A. K. Baliarsingh, C. Ardil
Abstract:
Optimal supplementary damping controller design for Thyristor Controlled Series Compensator (TCSC) is presented in this paper. For the proposed controller design, a multi-objective fitness function consisting of both damping factors and real part of system electromachanical eigenvalue is used and Real- Coded Genetic Algorithm (RCGA) is employed for the optimal supplementary controller parameters. The performance of the designed supplementary TCSC-based damping controller is tested on a weakly connected power system with different disturbances and loading conditions with parameter variations. Simulation results are presented and compared with a conventional power system stabilizer and also with the TCSC-based supplementary controller when the controller parameters are not optimized to show the effectiveness and robustness of the proposed approach over a wide range of loading conditions and disturbances.
Keywords: Power System Oscillations, Real-Coded Genetic Algorithm (RCGA), Thyristor Controlled Series Compensator (TCSC), Damping Controller, Power System Stabilizer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22245233 Simultaneous Tuning of Static Var Compensator and Power System Stabilizer Employing Real- Coded Genetic Algorithm
Authors: S. Panda, N. P. Patidar, R. Singh
Abstract:
Power system stability enhancement by simultaneous tuning of a Power System Stabilizer (PSS) and a Static Var Compensator (SVC)-based controller is thoroughly investigated in this paper. The coordination among the proposed damping stabilizers and the SVC internal voltage regulators has also been taken into consideration. The design problem is formulated as an optimization problem with a time-domain simulation-based objective function and Real-Coded Genetic Algorithm (RCGA) is employed to search for optimal controller parameters. The proposed stabilizers are tested on a weakly connected power system with different disturbances and loading conditions. The nonlinear simulation results are presented to show the effectiveness and robustness of the proposed control schemes over a wide range of loading conditions and disturbances. Further, the proposed design approach is found to be robust and improves stability effectively even under small disturbance and unbalanced fault conditions.
Keywords: Real-Coded Genetic Algorithm (RCGA), Static Var Compensator (SVC), Power System Stabilizer (PSS), Low Frequency Oscillations, Power System Stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22555232 Feedback Stabilization Based on Observer and Guaranteed Cost Control for Lipschitz Nonlinear Systems
Authors: A. Thabet, G. B. H. Frej, M. Boutayeb
Abstract:
This paper presents a design of dynamic feedback control based on observer for a class of large scale Lipschitz nonlinear systems. The use of Differential Mean Value Theorem (DMVT) is to introduce a general condition on the nonlinear functions. To ensure asymptotic stability, sufficient conditions are expressed in terms of linear matrix inequalities (LMIs). High performances are shown through real time implementation with ARDUINO Duemilanove board to the one-link flexible joint robot.Keywords: Feedback stabilization, DMVT, Lipschitz nonlinear systems, nonlinear observer, real time implementation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13615231 Real-Time Identification of Media in a Laboratory-Scaled Penetrating Process
Authors: Sheng-Hong Pong, Herng-Yu Huang, Yi-Ju Lee, Shih-Hsuan Chiu
Abstract:
In this paper, a neural network technique is applied to real-time classifying media while a projectile is penetrating through them. A laboratory-scaled penetrating setup was built for the experiment. Features used as the network inputs were extracted from the acceleration of penetrator. 6000 set of features from a single penetration with known media and status were used to train the neural network. The trained system was tested on 30 different penetration experiments. The system produced an accuracy of 100% on the training data set. And, their precision could be 99% for the test data from 30 tests.Keywords: back-propagation, identification, neural network, penetration.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1277