Search results for: Power Quality Evaluation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7449

Search results for: Power Quality Evaluation

1989 Decision Analysis Module for Excel

Authors: Radomir Perzina, Jaroslav Ramik

Abstract:

The Analytic Hierarchy Process is frequently used approach for solving decision making problems. There exists wide range of software programs utilizing that approach. Their main disadvantage is that they are relatively expensive and missing intermediate calculations. This work introduces a Microsoft Excel add-in called DAME – Decision Analysis Module for Excel. Comparing to other computer programs DAME is free, can work with scenarios or multiple decision makers and displays intermediate calculations. Users can structure their decision models into three levels – scenarios/users, criteria and variants. Items on all levels can be evaluated either by weights or pair-wise comparisons. There are provided three different methods for the evaluation of the weights of criteria, the variants as well as the scenarios – Saaty’s Method, Geometric Mean Method and Fuller’s Triangle Method. Multiplicative and additive syntheses are supported. The proposed software package is demonstrated on couple of illustrating examples of real life decision problems.

Keywords: Analytic hierarchy process, multi-criteria decision making, pair-wise comparisons, Microsoft Excel, Scenarios.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3404
1988 SBTAR: An Enhancing Method for Automate Test Tools

Authors: Noppakit Nawalikit, Pattarasinee Bhattarakosol

Abstract:

Since Software testing becomes an important part of Software development in order to improve the quality of software, many automation tools are created to help testing functionality of software. There are a few issues about usability of these tools, one is that the result log which is generated from tools contains useless information that the tester cannot use result log to communicate efficiently, or the result log needs to use a specific application to open. This paper introduces a new method, SBTAR that improves usability of automated test tools in a part of a result log. The practice will use the capability of tools named as IBM Rational Robot to create a customized function, the function would generate new format of a result log which contains useful information faster and easier to understand than using the original result log which was generated from the tools. This result log also increases flexibility by Microsoft Word or WordPad to make them readable.

Keywords: Software Automation Testing, Automated test tool, IBM Rational Robot.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1437
1987 Neural Networks-Based Acoustic Annoyance Model for Laptop Hard Disk Drive

Authors: Yi Chao Ma, Cheng Siong Chin, Wai Lok Woo

Abstract:

Since the last decade, there has been a rapid growth in digital multimedia, such as high-resolution media files and threedimentional movies. Hence, there is a need for large digital storage such as Hard Disk Drive (HDD). As such, users expect to have a quieter HDD in their laptop. In this paper, a jury test has been conducted on a group of 34 people where 17 of them are students who are the potential consumer, and the remaining are engineers who know the HDD. A total 13 HDD sound samples have been selected from over hundred HDD noise recordings. These samples are selected based on an agreed subjective feeling. The samples are played to the participants using head acoustic playback system, which enabled them to experience as similar as possible the same environment as have been recorded. Analysis has been conducted and the obtained results have indicated different group has different perception over the noises. Two neural network-based acoustic annoyance models are established based on back propagation neural network. Four psychoacoustic metrics, loudness, sharpness, roughness and fluctuation strength, are used as the input of the model, and the subjective evaluation results are taken as the output. The developed models are reasonably accurate in simulating both training and test samples.

Keywords: Hard disk drive noise, jury test, neural network model, psychoacoustic annoyance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1533
1986 Stress Intensity Factors for Plates with Collinear and Non-Aligned Straight Cracks

Authors: Surendran M, Palani G. S, Nagesh R. Iyer

Abstract:

Multi-site damage (MSD) has been a challenge to aircraft, civil and power plant structures. In real life components are subjected to cracking at many vulnerable locations such as the bolt holes. However, we do not consider for the presence of multiple cracks. Unlike components with a single crack, these components are difficult to predict. When two cracks approach one another, their stress fields influence each other and produce enhancing or shielding effect depending on the position of the cracks. In the present study, numerical studies on fracture analysis have been conducted by using the developed code based on the modified virtual crack closure integral (MVCCI) technique and finite element analysis (FEA) software ABAQUS for computing SIF of plates with multiple cracks. Various parametric studies have been carried out and the results have been compared with literature where ever available and also with the solution, obtained by using ABAQUS. By conducting extensive numerical studies expressions for SIF have been obtained for collinear cracks and non-aligned cracks.

Keywords: Crack interaction, Fracture mechanics, Multiple site damage, stress intensity factor, collinear cracks, non-aligned cracks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2933
1985 Analyzing Current Transformer’s Transient and Steady State Behavior for Different Burden’s Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, D. Sharma

Abstract:

Current transformers (CTs) are used to transform large primary currents to a small secondary current. Since most standard equipment’s are not designed to handle large primary currents the CTs have an important part in any electrical system for the purpose of Metering and Protection both of which are integral in Power system. Now a days due to advancement in solid state technology, the operation times of the protective relays have come to a few cycles from few seconds. Thus, in such a scenario it becomes important to study the transient response of the current transformers as it will play a vital role in the operating of the protective devices.

This paper shows the steady state and transient behavior of current transformers and how it changes with change in connected burden. The transient and steady state response will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer characteristics with changes in burden will be discussed.

Keywords: Accuracy, Accuracy limiting factor, Burden, Current Transformer, Instrument Security factor.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3318
1984 Slovenian Text-to-Speech Synthesis for Speech User Interfaces

Authors: Jerneja Žganec Gros, Aleš Mihelič, Nikola Pavešić, Mario Žganec, Stanislav Gruden

Abstract:

The paper presents the design concept of a unitselection text-to-speech synthesis system for the Slovenian language. Due to its modular and upgradable architecture, the system can be used in a variety of speech user interface applications, ranging from server carrier-grade voice portal applications, desktop user interfaces to specialized embedded devices. Since memory and processing power requirements are important factors for a possible implementation in embedded devices, lexica and speech corpora need to be reduced. We describe a simple and efficient implementation of a greedy subset selection algorithm that extracts a compact subset of high coverage text sentences. The experiment on a reference text corpus showed that the subset selection algorithm produced a compact sentence subset with a small redundancy. The adequacy of the spoken output was evaluated by several subjective tests as they are recommended by the International Telecommunication Union ITU.

Keywords: text-to-speech synthesis, prosody modeling, speech user interface.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1457
1983 Evaluation of Corrosion in Steel Reinforced Concrete with Brick Waste

Authors: Julieta D. Chelaru, Maria Gorea

Abstract:

The massive demolition of old buildings in recent years has generated tons of waste, especially brick waste. Thus, a concern of recent research is the use of this waste for the production of environmentally friendly concrete. At the same time, corrosion of the reinforcement steel rebar in classical concrete is a current problem. In this context, in the present paper a study was carried out on the corrosion of metal reinforcement in cement mortars with added brick waste. The corrosion process was analyzed on four compositions of mortars without and with 15%, 25% and 35% brick waste replacing the sand. The brick waste has majority content in SiO2, Al2O3, FeO3 and CaO. The grain size distribution of brick waste was close to that of the sand (dmax = 2 mm). The preparation method of the samples was similar to ordinary mortars. The corrosion action on the rebar in concrete, at different brick waste concentrations, was investigated by electrochemical measurements (polarization curves and electrochemical impedance spectroscopy (EIS)) at 1 month and 26 months. The results obtained at 26 months revealed that the addition of the brick waste in mortar improved the anticorrosion properties in the case of all samples compared with the etalon mortar. The best results were obtained in the case of the sample with 15% brick waste (the efficiency was ≈ 90%). The corrosion intermediary layer formed on the rebar surface was evidenced by SEM-EDX.

Keywords: EIS, steel corrosion, steel reinforced concrete, waste materials.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 679
1982 Evaluation of European Surveys in the Area of Health and Safety at Work and Identification of Risks in the Labor Environment

Authors: Alena Dadova, Katarina Holla, Anna Cidlinova, Linda Makovicka Osvaldova, Jiri Vala, Samuel Kockar

Abstract:

Occupational health and safety (OHS) is an area in which procedures and applications are constantly evolving and changing through legislation and new directives and guidelines. In this way, the relevant organizations strive to ensure continuous progress and the advantage of up-to-date information to ensure safety and prevent occupational accidents. Three ESENER surveys have been carried out in the European Union, led by the Agency for Safety and Health at Work (EU-OSHA). On the basis of surveys, it was determined how European workplaces manage risks and how they manage the field of safety and health protection at work. Thousands of companies and organizations in the European Union were involved in the surveys. Organizations and businesses were presented with a questionnaire that focused on the following topics: the impact of general risks on the field of OSH and the possibility of their management, psychosocial risks and other factors such as stress, harassment and bullying, and employee participation in OSH procedures. The article is dedicated to the fundamental conclusions from these surveys and their subsequent connection with the strategic intent of the Strategic Framework of European Union for the years 2021-2027. In the conclusion, emerging risks are identified and the EU will soon have to deal with them.

Keywords: ESENER, emerging risks, strategic framework in OSH, EU.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 294
1981 Knowledge Acquisition as Determinant of Outputs of Innovative Business in Regions of the Czech Republic

Authors: P. Hajek, J. Stejskal

Abstract:

The aim of this paper is to analyze the ability to identify and acquire knowledge from external sources at the regional level in the Czech Republic. The results show that the most important sources of knowledge for innovative activities are sources within the businesses themselves, followed by customers and suppliers. Furthermore, the analysis of relationships between the objective of the innovative activity and the ability to identify and acquire knowledge implies that knowledge obtained from (1) customers aims at replacing outdated products and increasing product quality; (2) suppliers aims at increasing capacity and flexibility of production; and (3) competing businesses aims at growing market share and increasing the flexibility of production and services. Regions should therefore direct their support especially into development and strengthening of networks within the value chain.

Keywords: Knowledge, acquisition, innovative business, Czech republic, region.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1548
1980 Unequal Error Protection for Region of Interest with Embedded Zerotree Wavelet

Authors: T. Hirner, J. Polec

Abstract:

This paper describes a new method of unequal error protection (UEP) for region of interest (ROI) with embedded zerotree wavelet algorithm (EZW). ROI technique is important in applications with different parts of importance. In ROI coding, a chosen ROI is encoded with higher quality than the background (BG). Unequal error protection of image is provided by different coding techniques. In our proposed method, image is divided into two parts (ROI, BG) that consist of more important bytes (MIB) and less important bytes (LIB). The experimental results verify effectiveness of the design. The results of our method demonstrate the comparison of the unequal error protection (UEP) of image transmission with defined ROI and the equal error protection (EEP) over multiple noisy channels.

Keywords: embedded zerotree wavelet (EZW), equal error protection (EEP), region of interest (ROI), RS code, unequal error protection (UEP)

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1470
1979 Identifying Interactions in a Feeding System

Authors: Jan Busch, Sebastian Schneider, Konja Knüppel, Peter Nyhuis

Abstract:

In production processes, assembly conceals a considerable potential for increased efficiency in terms of lowering production costs. Due to the individualisation of customer requirements, product variants have increased in recent years. Simultaneously, the portion of automated production systems has increased. A challenge is to adapt the flexibility and adaptability of automated systems to these changes. The Institute for Production Systems and Logistics developed an aerodynamic orientation system for feeding technology. When changing to other components, only four parameters must be adjusted. The expenditure of time for setting parameters is high. An objective therefore is developing an optimisation algorithm for automatic parameter configuration. Know how regarding the interaction of the four parameters and their effect on the sizes to be optimised is required in order to be able to develop a more efficient algorithm. This article introduces an analysis of the interactions between parameters and their influence on the quality of feeding.

Keywords: Aerodynamic feeding system, design of experiments, interactions between parameters.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1738
1978 Usage of Military Continuity Management System for Supporting of Emergency Management

Authors: R. Hajkova, J. Palecek, H. Malachova, A. Oulehlova

Abstract:

Ensuring of continuity of business is basic strategy of every company. Continuity of organization activities includes comprehensive procedures that help in solving unexpected situations of natural and anthropogenic character (for example flood, blaze, economic situations). Planning of continuity operations is a process that helps identify critical processes and implement plans for the security and recovery of key processes. The aim of this article is to demonstrate application of system approach to managing business continuity called business continuity management systems in military issues. This article describes the life cycle of business continuity management which is based on the established cycle PDCA (Plan- Do-Check-Act). After this is carried out by activities which are making by University of Defence during activation of forces and means of the integrated rescue system in case of emergencies - accidents at a nuclear power plant in Czech Republic. Activities of various stages of deployment earmarked forces and resources are managed and evaluated by using MCMS application (Military Continuity Management System).

Keywords: Business continuity management system, emergency management, military, nuclear safety.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2132
1977 Towards a Competitive South African Tooling Industry

Authors: Mncedisi Trinity Dewa, Andre F. Van Der Merwe, Stephen Matope

Abstract:

Tool, Die and Mould-making (TDM) firms have been known to play a pivotal role in the growth and development of the manufacturing sectors in most economies. Their output contributes significantly to the quality, cost and delivery speed of final manufactured parts. Unfortunately, the South African Tool, Die and Mould-making manufacturers have not been competing on the local or global market in a significant way. This reality has hampered the productivity and growth of the sector thus attracting intervention. The paper explores the shortcomings South African toolmakers have to overcome to restore their competitive position globally. Results from a global benchmarking survey on the tooling sector are used to establish a roadmap of what South African toolmakers can do to become a productive, World Class force on the global market.

Keywords: Competitive performance objectives, lead time, toolmakers, world-class manufacturing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2283
1976 Appraisal of Energy Efficiency of Urban Development Plans: The Fidelity Concept on Izmir-Balcova Case

Authors: Y. Duvarci, A. K. Kutluca

Abstract:

Design and land use are closely linked to the energy efficiency levels for an urban area. The current city planning practice does not involve an effective land useenergy evaluation in its 'blueprint' urban plans. The study proposed an appraisal method that can be embedded in GIS programs using five planning criteria as how far a planner can give away from the planning principles (criteria) for the most energy output s/he can obtain. The case of Balcova, a district in the Izmir Metropolitan area, is used conformingly for evaluating the proposed master plan and the geothermal energy (heating only) use for the concern district. If the land use design were proposed accordingly at-most energy efficiency (a 30% obtained), mainly increasing the density around the geothermal wells and also proposing more mixed use zones, we could have 17% distortion (infidelity to the main planning principles) from the original plan. The proposed method can be an effective tool for planners as simulation media, of which calculations can be made by GIS ready tools, to evaluate efficiency levels for different plan proposals, letting to know how much energy saving causes how much deviation from the other planning ideals. Lower energy uses can be possible for different land use proposals for various policy trials.

Keywords: Sustainable Urban Planning, Energy Efficiency, Geothermal Energy, District Heating Systems (DHS), EnergyPlanning

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1922
1975 Usability in E-Commerce Websites: Results of Eye Tracking Evaluations

Authors: Beste Kaysı, Yasemin Topaloğlu

Abstract:

Usability is one of the most important quality attributes for web-based information systems. Specifically, for e-commerce applications, usability becomes more prominent. In this study, we aimed to explore the features that experienced users seek in e-commerce applications. We used eye tracking method in evaluations. Eye movement data are obtained from the eye-tracking method and analyzed based on task completion time, number of fixations, as well as heat map and gaze plot measures. The results of the analysis show that the eye movements of participants' are too static in certain areas and their areas of interest are scattered in many different places. It has been determined that this causes users to fail to complete their transactions. According to the findings, we outlined the issues to improve the usability of e-commerce websites. Then we propose solutions to identify the issues. In this way, it is expected that e-commerce sites will be developed which will make experienced users more satisfied.

Keywords: E-commerce websites, eye tracking method, usability, website evaluations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1266
1974 Human Walking Vertical Force and Vertical Vibration of Pedestrian Bridge Induced by Its Higher Components

Authors: M. Yoneda

Abstract:

The purpose of this study is to identify human walking vertical force by using FFT power spectrum density from the experimental acceleration data of the human body. An experiment on human walking is carried out on a stationary floor especially paying attention to higher components of dynamic vertical walking force. Based on measured acceleration data of the human lumbar part, not only in-phase component with frequency of 2fw, 3fw, but also in-opposite-phase component with frequency of 0.5 fw, 1.5 fw, 2.5 fw where fw is the walking rate is observed. The vertical vibration of pedestrian bridge induced by higher components of human walking vertical force is also discussed in this paper. A full scale measurement for the existing pedestrian bridge with center span length of 33 m is carried out focusing on the resonance phenomenon due to higher components of human walking vertical force. Dynamic response characteristics excited by these vertical higher components of human walking are revealed from the dynamic design viewpoint of pedestrian bridge.

Keywords: Simplified method, Human walking vertical force, Higher component, Pedestrian bridge vibration.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1815
1973 A Critical Survey of Reusability Aspects for Component-Based Systems

Authors: Arun Sharma, Rajesh Kumar, P. S. Grover

Abstract:

The last decade has shown that object-oriented concept by itself is not that powerful to cope with the rapidly changing requirements of ongoing applications. Component-based systems achieve flexibility by clearly separating the stable parts of systems (i.e. the components) from the specification of their composition. In order to realize the reuse of components effectively in CBSD, it is required to measure the reusability of components. However, due to the black-box nature of components where the source code of these components are not available, it is difficult to use conventional metrics in Component-based Development as these metrics require analysis of source codes. In this paper, we survey few existing component-based reusability metrics. These metrics give a border view of component-s understandability, adaptability, and portability. It also describes the analysis, in terms of quality factors related to reusability, contained in an approach that aids significantly in assessing existing components for reusability.

Keywords: Components, Customizability, Reusability, and Observability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2470
1972 Comparative Study in Evaluating the Antioxidation Efficiency for Native Types Antioxidants Extracted from Crude Oil with the Synthesized Class

Authors: Mohammad Jamil Abd AlGhani

Abstract:

The natural native antioxidants N,N-P-methyl phenyl acetone and N,N-phenyl acetone were isolated from the Iraqi crude oil region of Kirkuk by ion exchange and their structure was characterized by spectral and chemical analysis methods. Tetraline was used as a liquid hydrocarbon to detect the efficiency of isolated molecules at elevated temperature (393 K) that it has physicochemical specifications and structure closed to hydrocarbons fractionated from crude oil. The synthesized universal antioxidant 2,6-ditertiaryisobutyl-p-methyl phenol (Unol) with known stochiometric coefficient of inhibition equal to (2) was used as a model for comparative evaluation at the same conditions. Modified chemiluminescence method was used to find the amount of absorbed oxygen and the induction periods in and without the existence of isolated antioxidants molecules. The results of induction periods and quantity of absorbed oxygen during the oxidation process were measured by manometric installation. It was seen that at specific equal concentrations of N,N-phenyl acetone and N, N-P-methyl phenyl acetone in comparison with Unol at 393 K were with (2) and (2.5) times efficient than do Unol. It means that they had the ability to inhibit the formation of new free radicals and prevent the chain reaction to pass from the propagation to the termination step rather than decomposition of formed hydroperoxides.

Keywords: Antioxidants, chemiluminescence, inhibition, unol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1016
1971 On the Analysis of Bandwidth Management for Hybrid Load Balancing Scheme in WLANs

Authors: Chutima Prommak, Airisa Jantaweetip

Abstract:

In wireless networks, bandwidth is scare resource and it is essential to utilize it effectively. This paper analyses effects of using different bandwidth management techniques on the network performances of the Wireless Local Area Networks (WLANs) that use hybrid load balancing scheme. In particular, we study three bandwidth management schemes, namely Complete Sharing (CS), Complete Partitioning (CP), and Partial Sharing (PS). Performances of these schemes are evaluated by simulation experiments in term of percentage of network association blocking. Our results show that the CS scheme can provide relatively low blocking percentage in various network traffic scenarios whereas the PS scheme can enhance quality of services of the multimedia traffic with rather small expenses on the blocking percentage of the best effort traffic.

Keywords: Bandwidth management, Load Balancing, WLANs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1463
1970 Review and Evaluation of Trending Canonical Correlation Analyses-Based Brain-Computer Interface Methods

Authors: Bayar Shahab

Abstract:

The fast development of technology that has advanced neuroscience and human interaction with computers has enabled solutions to various problems and issues of this new era. The Brain-Computer Interface (BCI) has opened the door to several new research areas and have been able to provide solutions to critical and vital issues such as supporting a paralyzed patient to interact with the outside world, controlling a robot arm, playing games in VR with the brain, driving a wheelchair. This review presents the state-of-the-art methods and improvements of canonical correlation analyses (CCA), an SSVEP-based BCI method. These are the methods used to extract EEG signal features or, to be said differently, the features of interest that we are looking for in the EEG analyses. Each of the methods from oldest to newest has been discussed while comparing their advantages and disadvantages. This would create a great context and help researchers understand the most state-of-the-art methods available in this field, their pros and cons, and their mathematical representations and usage. This work makes a vital contribution to the existing field of study. It differs from other similar recently published works by providing the following: (1) stating most of the main methods used in this field in a hierarchical way, (2) explaining the pros and cons of each method and their performance, (3) presenting the gaps that exist at the end of each method that can improve the understanding and open doors to new researches or improvements. 

Keywords: BCI, CCA, SSVEP, EEG

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 590
1969 Adaptive Filtering of Heart Rate Signals for an Improved Measure of Cardiac Autonomic Control

Authors: Desmond B. Keenan, Paul Grossman

Abstract:

In order to provide accurate heart rate variability indices of sympathetic and parasympathetic activity, the low frequency and high frequency components of an RR heart rate signal must be adequately separated. This is not always possible by just applying spectral analysis, as power from the high and low frequency components often leak into their adjacent bands. Furthermore, without the respiratory spectra it is not obvious that the low frequency component is not another respiratory component, which can appear in the lower band. This paper describes an adaptive filter, which aids the separation of the low frequency sympathetic and high frequency parasympathetic components from an ECG R-R interval signal, enabling the attainment of more accurate heart rate variability measures. The algorithm is applied to simulated signals and heart rate and respiratory signals acquired from an ambulatory monitor incorporating single lead ECG and inductive plethysmography sensors embedded in a garment. The results show an improvement over standard heart rate variability spectral measurements.

Keywords: Heart rate variability, vagal tone, sympathetic, parasympathetic, spectral analysis, adaptive filter.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1754
1968 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: Network worms, malware infection propagating malicious code, virus, security, VPN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2811
1967 Liquid Fuel Production via Catalytic Pyrolysis of Waste Oil

Authors: Malee Santikunaporn, Neera Wongtyanuwat, Channarong Asavatesanupap

Abstract:

Pyrolysis of waste oil is an effective process to produce high quality liquid fuels. In this work, pyrolysis experiments of waste oil over Y zeolite were carried out in a semi-batch reactor under a flow of nitrogen at atmospheric pressure and at different reaction temperatures (350-450 oC). The products were gas, liquid fuel, and residue. Only liquid fuel was further characterized for its composition and properties by using gas chromatography, thermogravimetric analyzer, and bomb calorimeter. Experimental results indicated that the pyrolysis reaction temperature significantly affected both yield and composition distribution of pyrolysis oil. An increase in reaction temperature resulted in increased fuel yield, especially gasoline fraction. To obtain high amount of fuel, the optimal reaction temperature should be higher than 350 oC. A presence of Y zeolite in the system enhanced the cracking activity. In addition, the pyrolysis oil yield is proportional to the catalyst quantity.

Keywords: Waste oil, pyrolysis oil, Y zeolite, gasoline, diesel.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 805
1966 Cardiac Function and Morphological Adaptations in Endurance and Resistance Athletes: Evaluation using a new Method

Authors: K. Hosseini, MD., R. Mazaheri, MD., H.R. Khoddami Vishteh, MD., M.A. Mansournia, MD., H. Angoorani, MD

Abstract:

Background: Tissue Doppler Echocardiography (TDE) assesses diastolic function more accurately than routine pulse Doppler echo. Assessment of the effects of dynamic and static exercises on the heart by using TDE can provides new information about the athlete-s heart syndrome. Methods: This study was conducted on 20 elite wrestlers, 14 endurance runners at national level and 21 non-athletes as the control group. Participants underwent two-dimensional echocardiography, standard Doppler and TDE. Results: Wrestlers had the highest left ventricular mass index, enddiastolic inter-ventricular septum thickness and left ventricular Posterior wall thickness. Runners had the highest Left ventricular end-diastolic volume, LV ejection fraction, stroke volume and cardiac output. In TDE, the early diastolic velocity of mitral annulus to the late diastolic velocity ratio in athletic groups was greater than the controls with no significant difference. Conclusion: In spite of cardiac morphological changes in athletes, TDE shows that cardiac diastolic function won-t be adversely affected.

Keywords: Tissue Doppler Echocardiography, Diastolic function, Athlete's heart syndrome, Static exercise, Dynamic exercise

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1616
1965 Using Collaborative Pictures to Understand Student Experience

Authors: Tessa Berg, Emma Guion Akdag

Abstract:

Summative feedback forms are used in academia for gathering data on course quality and student understanding. Students answer a series of questions based on the course they are soon to finish in these forms. Feedback forms are notorious for being homogenised and limiting and thus the data captured is often neutral and lacking in tacit emotional responses. This paper contrasts student feedback forms with collaborative drawing. We analyse 19 pictures drawn by international students on a pre-sessional course. Through visuals we present an approach to enable a holistic level of student understanding. Visuals communicate irrespective of possible language, cultural and educational barriers. This paper sought to discover if the pictures mirrored the feedback given on a typical feedback form. Findings indicate a considerable difference in the two approaches and thus we highlight the value of collaborative drawing as a complimentary resource to aid the understanding of student experience.

Keywords: Feedback forms, visualisation, student experience, collaborative drawing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1257
1964 Digital Image Encryption Scheme using Chaotic Sequences with a Nonlinear Function

Authors: H. Ogras, M. Turk

Abstract:

In this study, a system of encryption based on chaotic sequences is described. The system is used for encrypting digital image data for the purpose of secure image transmission. An image secure communication scheme based on Logistic map chaotic sequences with a nonlinear function is proposed in this paper. Encryption and decryption keys are obtained by one-dimensional Logistic map that generates secret key for the input of the nonlinear function. Receiver can recover the information using the received signal and identical key sequences through the inverse system technique. The results of computer simulations indicate that the transmitted source image can be correctly and reliably recovered by using proposed scheme even under the noisy channel. The performance of the system will be discussed through evaluating the quality of recovered image with and without channel noise.

Keywords: Digital image, Image encryption, Secure communication

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2238
1963 Detection of Concrete Reinforcement Damage Using Piezoelectric Materials - Analytical and Experimental Study

Authors: C. P. Providakis, G. M. Angeli, M. J. Favvata, N. A. Papadopoulos, C. E. Chalioris, C. G. Karayannis

Abstract:

An effort for the detection of damages in the  reinforcement bars of reinforced concrete members using PZTs is  presented. The damage can be the result of excessive elongation of  the steel bar due to steel yielding or due to local steel corrosion. In  both cases the damage is simulated by considering reduced diameter  of the rebar along the damaged part of its length. An integration  approach based on both electromechanical admittance methodology  and guided wave propagation technique is used to evaluate the  artificial damage on the examined longitudinal steel bar. Two  actuator PZTs and a sensor PZT are considered to be bonded on the  examined steel bar. The admittance of the Sensor PZT is calculated  using COMSOL 3.4a. Fast Furrier Transformation for a better  evaluation of the results is employed. An effort for the quantification  of the damage detection using the root mean square deviation  (RMSD) between the healthy condition and damage state of the  sensor PZT is attempted. The numerical value of the RSMD yields a  level for the difference between the healthy and the damaged  admittance computation indicating this way the presence of damage  in the structure. Experimental measurements are also presented.

 

Keywords: Concrete reinforcement, damage detection, electromechanical admittance, experimental measurements, finite element method, guided waves, PZT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2655
1962 An Energy Reverse AODV Routing Protocol in Ad Hoc Mobile Networks

Authors: Said Khelifa, Zoulikha Mekkakia Maaza

Abstract:

In this paper we present a full performance analysis of an energy conserving routing protocol in mobile ad hoc network, named ER-AODV (Energy Reverse Ad-hoc On-demand Distance Vector routing). ER-AODV is a reactive routing protocol based on a policy which combines two mechanisms used in the basic AODV protocol. AODV and most of the on demand ad hoc routing protocols use single route reply along reverse path. Rapid change of topology causes that the route reply could not arrive to the source node, i.e. after a source node sends several route request messages, the node obtains a reply message, and this increases in power consumption. To avoid these problems, we propose a mechanism which tries multiple route replies. The second mechanism proposes a new adaptive approach which seeks to incorporate the metric "residual energy " in the process route selection, Indeed the residual energy of mobile nodes were considered when making routing decisions. The results of simulation show that protocol ER-AODV answers a better energy conservation.

Keywords: Ad hoc mobile networks, Energy AODV, Energy consumption, ER-AODV, Reverse AODV.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2339
1961 Novel CFRP Adhesive Joints and Structures for Offshore Application

Authors: M. R. Abusrea, Shiyi Jiang, Dingding Chen, Kazuo Arakawa

Abstract:

Novel wind-lens turbine designs can augment power output. Vacuum-Assisted Resin Transfer Molding (VARTM) is used to form large and complex structures from a Carbon Fiber Reinforced Polymer (CFRP) composite. Typically, wind-lens turbine structures are fabricated in segments, and then bonded to form the final structure. This paper introduces five new adhesive joints, divided into two groups: one is constructed between dry carbon and CFRP fabrics, and the other is constructed with two dry carbon fibers. All joints and CFRP fabrics were made in our laboratory using VARTM manufacturing techniques. Specimens were prepared for tensile testing to measure joint performance. The results showed that the second group of joints achieved a higher tensile strength than the first group. On the other hand, the tensile fracture behavior of the two groups showed the same pattern of crack originating near the joint ends followed by crack propagation until fracture.

Keywords: Adhesive joints, CFRP, VARTM, resin transfer molding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1870
1960 Telehealth Ecosystem: Challenge and Opportunity

Authors: R. Poonsuph

Abstract:

Technological innovation plays a crucial role in virtual healthcare services. A growing number of telehealth platforms are concentrating on using digital tools to improve the quality and availability of care. As a result, telehealth represents an opportunity to redesign the way health services are delivered. The research objective is to discover a new business model for digital health services and related industries to participate with telehealth solutions. The business opportunity is valuable for healthcare investors as a startup company to further investigations or implement the telehealth platform. The paper presents a digital healthcare business model and business opportunities to related industries. These include digital healthcare services extending from a traditional business model and use cases of business opportunities to related industries. Although there are enormous business opportunities, telehealth is still challenging due to the patient adaption and digital transformation process within a healthcare organization.

Keywords: telehealth, Internet hospital, HealthTech, InsurTech

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1079