Search results for: Close call situation.
681 Through the Lens of Forced Displacement: Refugee Women's Rights as Human Rights
Authors: Pearl K. Atuhaire, Sylvia Kaye
Abstract:
While the need for equal access to civil, political as well as economic, social and cultural rights is clear under the international law, the adoption of the Convention on the Elimination of all forms of Discrimination against women in 1979 made this even clearer. Despite this positive progress, the abuse of refugee women's rights is one of the basic underlying root causes of their marginalisation and violence in their countries of asylum. This paper presents a critical review on the development of refugee women's rights at the international levels and national levels. It provides an array of scholarly literature on this issue and examines the measures taken by the international community to curb the problem of violence against women in their various provisions through the instruments set. It is cognizant of the fact that even if conflict affects both refugee women and men, the effects on women refugees are deep-reaching, due to the cultural strongholds they face. An important aspect of this paper is that it is conceptualised against the fact that refugee women face the problem of sexual and gender based first as refugees and second as women, yet, their rights are stumbled upon. Often times they have been rendered "worthless victims" who are only in need of humanitarian assistance than active participants committed to change their plight through their participation in political, economic and social participation in their societies. Scholars have taken notice of the fact that women's rights in refugee settings have been marginalized and call for a need to incorporate their perspectives in the planning and management of refugee settings in which they live. Underpinning this discussion is feminism theory which gives a clear understanding of the root cause of refugee women's problems. Finally, this paper suggests that these policies should be translated into action at local, national international and regional levels to ensure sustainable peace.
Keywords: Feminism theory, human rights, refugee women, sexual and gender based violence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1801680 Behavior of the Masonry Infill in Structures Subjected to the Horizontal Loads
Authors: Nawel Mezigheche, Abdelhacine Gouasmia, Allaeddine Athmani, Mouloud Merzoud
Abstract:
Masonry infill walls are inevitable in the selfsupporting structures, but their contribution in the resistance to earthquake loads is generally neglected in the structural analyses. The principal aim of this work through a numerical study of masonry infill walls behavior in structures subjected to horizontal load is to propose by finite elements numerical modeling, a more reliable approach, faster and close to reality. In this study, 3D Finite Element Analysis was developed to study the behavior of masonry infill walls in structures subjected to horizontal load; the finite element software being used was ABAQUS, it is observed that more rigidity of the masonry filling is significant, more the structure is rigid, we can so conclude that the filling brings an additional rigidity to the structure not to be neglected; it is also observed that when the framework is subjected to horizontal loads, the framework separates from the filling on the level of the tended diagonal.Keywords: Finite element, Masonry infill walls, Rigidity of the masonry, Tended diagonal.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2120679 A Single-Period Inventory Problem with Resalable Returns: A Fuzzy Stochastic Approach
Authors: Oshmita Dey, Debjani Chakraborty
Abstract:
In this paper, a single period inventory model with resalable returns has been analyzed in an imprecise and uncertain mixed environment. Demand has been introduced as a fuzzy random variable. In this model, a single order is placed before the start of the selling season. The customer, for a full refund, may return purchased products within a certain time interval. Returned products are resalable, provided they arrive back before the end of the selling season and are found to be undamaged. Products remaining at the end of the season are salvaged. All demands not met directly are lost. The probabilities that a sold product is returned and that a returned product is resalable, both imprecise in a real situation, have been assumed to be fuzzy in nature.
Keywords: Fuzzy random variable, Modified graded meanintegration, Internet mail order, Inventory.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1528678 Intellectual Capital Report for Universities
Authors: Yolanda Ramírez Córcoles, Ángel Tejad Ponce, Agustín Baidez González
Abstract:
Intellectual capital reporting becomes critical at universities, mainly due to the fact that knowledge is the main output as well as input in these institutions. In addition, universities have continuous external demands for greater information and transparency about the use of public funds, and are increasingly provided with greater autonomy regarding their organization, management, and budget allocation. This situation requires new management and reporting systems. The purpose of the present study is to provide a model for intellectual capital report in Spanish universities. To this end, a questionnaire was sent to every member of the Social Councils of Spanish public universities in order to identify which intangible elements university stakeholders demand most. Our proposal for an intellectual capital report aims to act as a guide to help the Spanish universities on the road to the presentation of information on intellectual capital which can assist stakeholders to make the right decisions.Keywords: Intellectual capital, Spain, report, universities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3027677 CBCTL: A Reasoning System of TemporalEpistemic Logic with Communication Channel
Authors: Suguru Yoshioka, Satoshi Tojo
Abstract:
This paper introduces a temporal epistemic logic CBCTL that updates agent-s belief states through communications in them, based on computational tree logic (CTL). In practical environments, communication channels between agents may not be secure, and in bad cases agents might suffer blackouts. In this study, we provide inform* protocol based on ACL of FIPA, and declare the presence of secure channels between two agents, dependent on time. Thus, the belief state of each agent is updated along with the progress of time. We show a prover, that is a reasoning system for a given formula in a given a situation of an agent ; if it is directly provable or if it could be validated through the chains of communications, the system returns the proof.Keywords: communication channel, computational tree logic, reasoning system, temporal epistemic logic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1247676 Optimization of Solar Tracking Systems
Authors: A. Zaher, A. Traore, F. Thiéry, T. Talbert, B. Shaer
Abstract:
In this paper, an intelligent approach is proposed to optimize the orientation of continuous solar tracking systems on cloudy days. Considering the weather case, the direct sunlight is more important than the diffuse radiation in case of clear sky. Thus, the panel is always pointed towards the sun. In case of an overcast sky, the solar beam is close to zero, and the panel is placed horizontally to receive the maximum of diffuse radiation. Under partly covered conditions, the panel must be pointed towards the source that emits the maximum of solar energy and it may be anywhere in the sky dome. Thus, the idea of our approach is to analyze the images, captured by ground-based sky camera system, in order to detect the zone in the sky dome which is considered as the optimal source of energy under cloudy conditions. The proposed approach is implemented using experimental setup developed at PROMES-CNRS laboratory in Perpignan city (France). Under overcast conditions, the results were very satisfactory, and the intelligent approach has provided efficiency gains of up to 9% relative to conventional continuous sun tracking systems.
Keywords: Clouds detection, fuzzy inference systems, images processing, sun trackers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1212675 Personality of Military Professionals (Commanders) and Their Way of Leading and Commanding Today and in Historical Context
Authors: Petra Hurbišová, Monika Davidová
Abstract:
The article deals with the personality of military professionals (commanders) and their way of leading and commanding today and in historical context. The first part focuses on the leadership skills of Alexander the Great, who introduced strategic innovations and even from today's perspective; he excelled in efficient work with people. This paper focuses on the way which he achieved his goals. Further attention is paid to approaches to commander´s personality by other great generals. The paper is also focused on personality traits of military professionals necessary for successful management and leadership in today's variable and challenging environment. Finally, attention is paid to the effective and ineffective ways of behavior of commanders and determining what styles of leadership is appropriate for a given situation, whether in peacetime or on deployment.Keywords: Authority, commander, leader, leadership, military professional, personality.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2319674 Synthesis, Structure and Properties of NZP/NASICON Structured Materials
Authors: E. A. Asabina, V. I. Pet'kov, P. A. Mayorov, A. V. Markin, N. N. Smirnova, A. M. Kovalskii, A. A. Usenko
Abstract:
The purpose of this work was to synthesize and investigate phase formation, structure and thermophysical properties of the phosphates M0.5+xM'xZr2–x(PO4)3 (M – Cd, Sr, Pb; M' – Mg, Co, Mn). The compounds were synthesized by sol-gel method. The results showed formation of limited solid solutions of NZP/NASICON type. The crystal structures of triple phosphates of the compositions MMg0.5Zr1.5(PO4)3 were refined by the Rietveld method using XRD data. Heat capacity (8–660 K) of the phosphates Pb0.5+xMgxZr2-x(PO4)3 (x = 0, 0.5) was measured, and reversible polymorphic transitions were found at temperatures, close to the room temperature. The results of Rietveld structure refinement showed the polymorphism caused by disordering of lead cations in the cavities of NZP/NASICON structure. Thermal expansion (298−1073 K) of the phosphates MMg0.5Zr1.5(PO4)3 was studied by XRD method, and the compounds were found to belong to middle and low-expanding materials. Thermal diffusivity (298–573 K) of the ceramic samples of phosphates slightly decreased with temperature increasing. As was demonstrated, the studied phosphates are characterized by the better thermophysical characteristics than widespread fire-resistant materials, such as zirconia and etc.
Keywords: NASICON, NZP, phosphate, structure, synthesis, thermophysical properties.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 841673 Application the Queuing Theory in the Warehouse Optimization
Authors: Jaroslav Masek, Juraj Camaj, Eva Nedeliakova
Abstract:
The aim of optimization of store management is not only designing the situation of store management itself including its equipment, technology and operation. In optimization of store management we need to consider also synchronizing of technological, transport, store and service operations throughout the whole process of logistic chain in such a way that a natural flow of material from provider to consumer will be achieved the shortest possible way, in the shortest possible time in requested quality and quantity and with minimum costs. The paper deals with the application of the queuing theory for optimization of warehouse processes. The first part refers to common information about the problematic of warehousing and using mathematical methods for logistics chains optimization. The second part refers to preparing a model of a warehouse within queuing theory. The conclusion of the paper includes two examples of using queuing theory in praxis.
Keywords: Queuing theory, logistics system, mathematical methods, warehouse optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6568672 Describing Learning Features of Reusable Resources: A Proposal
Authors: Serena Alvino, Paola Forcheri, Maria Grazia Ierardi, Luigi Sarti
Abstract:
One of the main advantages of the LO paradigm is to allow the availability of good quality, shareable learning material through the Web. The effectiveness of the retrieval process requires a formal description of the resources (metadata) that closely fits the user-s search criteria; in spite of the huge international efforts in this field, educational metadata schemata often fail to fulfil this requirement. This work aims to improve the situation, by the definition of a metadata model capturing specific didactic features of shareable learning resources. It classifies LOs into “teacher-oriented" and “student-oriented" categories, in order to describe the role a LO is to play when it is integrated into the educational process. This article describes the model and a first experimental validation process that has been carried out in a controlled environment.Keywords: Learning object, pedagogical metadata, experimental validation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1545671 Learning Based On Computer Science Unplugged in Computer Science Education: Design, Development, and Assessment
Authors: Eiko Takaoka, Yoshiyuki Fukushima, Koichiro Hirose, Tadashi Hasegawa
Abstract:
Although, all high school students in Japan are required to learn informatics, many of them do not learn this topic sufficiently. In response to this situation, we propose a support package for high school informatics classes. To examine what students learned and if they sufficiently understood the context of the lessons, a questionnaire survey was distributed to 186 students. We analyzed the results of the questionnaire and determined the weakest units, which were “basic computer configuration” and “memory and secondary storage”. We then developed a package for teaching these units. We propose that our package be applied in high school classrooms.
Keywords: Computer Science Unplugged, computer science outreach, high school curriculum, experimental evaluation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2119670 QSI Dynamical Fetch Policy for SMT
Authors: Shu-Chiao Yang, Jong-Jiann Shieh
Abstract:
A Simultaneous Multithreading (SMT) Processor is capable of executing instructions from multiple threads in the same cycle. SMT in fact was introduced as a powerful architecture to superscalar to increase the throughput of the processor. Simultaneous Multithreading is a technique that permits multiple instructions from multiple independent applications or threads to compete limited resources each cycle. While the fetch unit has been identified as one of the major bottlenecks of SMT architecture, several fetch schemes were proposed by prior works to enhance the fetching efficiency and overall performance. In this paper, we propose a novel fetch policy called queue situation identifier (QSI) which counts some kind of long latency instructions of each thread each cycle then properly selects which threads to fetch next cycle. Simulation results show that in best case our fetch policy can achieve 30% on speedup and also can reduce the data cache level 1 miss rate.Keywords: SMT, QSI, DL1 miss rate.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1269669 A Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation
Authors: Pei-yih Ting, Dream-Ming Huang, Xiao-Wei Huang
Abstract:
Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of private veto, distributed proxy key generation, secure transmission of proxy key, and existentially unforgeable proxy multi-signature scheme. First, a provably secure Guillou-Quisquater proxy signature scheme is presented, then the “zero-sharing" protocol is extended over a composite modulus multiplicative group, and finally the above two are combined to realize the GQ proxy multi-signature with anonymously vetoable delegation. As a proxy signature scheme, this protocol protects both the original signers and the proxy signer. The modular design allows simplified implementation with less communication overheads and better computation performance than a general secure multi-party protocol.Keywords: GQ proxy signature, proxy multi-signature, zero-sharing protocol, secure multi-party protocol, private veto protocol
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1543668 A Critical Social Research Perspective on Self-Directed Learning and Information Technology Practitioners
Authors: Roelien Goede
Abstract:
Information systems practitioners are frequently required to master new technology, often without the aid of formal training. They require the skill to manage their own learning and, when this skill is developed in their formal training, their adaptability to new technology may be improved. Self- directed learning is the ability of the learner to manage his or her own learning experience with some guidance from a facilitator. Self-directed learning skills are best improved when practiced. This paper reflects on a critical social research project to improve the self-directed learning skills of fourth year Information Systems students. Critical social research differs from other research paradigms in that the researcher is viewed as the agent of change to achieve the desired outcome in the problem situation.Keywords: Action Research, Critical Social Research, Information Systems Education, Self-directed Learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1812667 Conventional Design and Simulation of an Urban Hybrid Bus
Authors: A. Khanipour, K. M. Ebrahimi, W. J. Seale
Abstract:
Due to heightened concerns over environmental and economic issues the growing important of air pollution, and the importance of conserving fossil fuel resources in the world, the automotive industry is now forced to produce more fuel efficient, low emission vehicles and new drive system technologies. One of the most promising technologies to receive attention is the hybrid electric vehicle (HEV), which consists of two or more energy sources that supply energy to electric traction motors that in turn drive the wheels. This paper presents the various structures of HEV systems, the basic theoretical knowledge for describing their operation and the general behaviour of the HEV in acceleration, cruise and deceleration phases. The conventional design and sizing of a series HEV is studied. A conventional bus and its series configuration are defined and evaluated using the ADVISOR. In this section the simulation of a standard driving cycle and prediction of its fuel consumption and emissions of the HEV are discussed. Finally the bus performance is investigated to establish whether it can satisfy the performance, fuel consumption and emissions requested. The validity of the simulation has been established by the close conformity between the fuel consumption of the conventional bus reported by the manufacturer to what has achieved from the simulation.Keywords: Hybrid Electric Vehicle, Hybridization, LEV, HEV.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2516666 Performance of Axially Loaded Single Pile Embedded in Cohesive Soil with Cavities
Authors: Ali A. Al-Jazaairry, Tahsin T. Sabbagh
Abstract:
The stability of a single model pile located adjacent to a continuous cavity was studied. This paper is an attempt to understand the behaviour of axially loaded single pile embedded in clayey soil with the presences of cavities. The performance of piles located in such soils was studied analytically. A verification analysis was carried out on available studies to assess the ability of analytical model to correctly interpret the system behaviour. The study was adopted by finite element program (PLAXIS). The study included many cases; in each case, there is a critical value in which the presence of cavities has shown minimum effect on the pile performance. Figures including the load carrying capacity of pile with the affecting factors are presented. These figures provide beneficial information for pile design constructed close to underground cavities. It was concluded that the load carrying capacity of the pile is reduced by the presence of the cavity within the soil mass. This reduction varies according to the size and location of cavity.
Keywords: Axial load, cavity, clay, pile, ultimate capacity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1017665 Using Mixtures of Waste Frying Oil and Pork Lard to Produce Biodiesel
Authors: Joana M. Dias, Conceição A. Ferraz, Manuel F. Almeida
Abstract:
Studying alternative raw materials for biodiesel production is of major importance. The use of mixtures with incorporation of wastes is an environmental friendly alternative and might reduce biodiesel production costs. The objective of the present work was: (i) to study biodiesel production using waste frying oil mixed with pork lard and (ii) to understand how mixture composition influences biodiesel quality. Biodiesel was produced by transesterification and quality was evaluated through determination of several parameters according to EN 14214. The weight fraction of lard in the mixture varied from 0 to 1 in 0.2 intervals. Biodiesel production yields varied from 81.7 to 88.0 (wt%), the lowest yields being the ones obtained using waste frying oil and lard alone as raw materials. The obtained products fulfilled most of the determined quality specifications according to European biodiesel quality standard EN 14214. Minimum purity (96.5 wt%) was closely obtained when waste frying oil was used alone and when 0.2% of lard was incorporated in the raw material (96.3 wt%); however, it ranged from 93.9 to 96.3 (wt%) being always close to the limit. From the evaluation of the influence of mixture composition in biodiesel quality, it was possible to establish a model to be used for predicting some parameters of biodiesel resulting from mixtures of waste frying oil with lard when different lard contents are used.
Keywords: Biodiesel, mixtures, transesterification, waste.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2549664 A Survey on MAC Protocols for Vehicular Ad-Hoc Networks
Authors: B. Cynthia Sherin, E. A. Mary Anita
Abstract:
Vehicular Ad-hoc Network (VANET) is an emerging and very promising technology that has great demand on the access capability of the existing wireless technology. VANETs help improve traffic safety and efficiency. Each vehicle can exchange their information to inform the other vehicles about the current status of the traffic flow or a dangerous situation such as an accident. To achieve these, a reliable and efficient Medium Access Control (MAC) protocol with minimal transmission collisions is required. High speed nodes, absence of infrastructure, variations in topology and their QoS requirements makes it difficult for designing a MAC protocol in vehicular networks. There are several MAC protocols proposed for VANETs to ensure that all the vehicles could send safety messages without collisions by reducing the end-to-end delay and packet loss ratio. This paper gives an overview of the several proposed MAC protocols for VANETs along with their benefits and limitations and presents an overall classification based on their characteristics.
Keywords: MAC Protocols, QoS, VANET, V2V, V2I.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 946663 Comparative Study of Line Voltage Stability Indices for Voltage Collapse Forecasting in Power Transmission System
Authors: H. H. Goh, Q. S. Chua, S. W. Lee, B. C. Kok, K. C. Goh, K. T. K. Teo
Abstract:
At present, the evaluation of voltage stability assessment experiences sizeable anxiety in the safe operation of power systems. This is due to the complications of a strain power system. With the snowballing of power demand by the consumers and also the restricted amount of power sources, therefore, the system has to perform at its maximum proficiency. Consequently, the noteworthy to discover the maximum ability boundary prior to voltage collapse should be undertaken. A preliminary warning can be perceived to evade the interruption of power system’s capacity. The effectiveness of line voltage stability indices (LVSI) is differentiated in this paper. The main purpose of the indices used is to predict the proximity of voltage instability of the electric power system. On the other hand, the indices are also able to decide the weakest load buses which are close to voltage collapse in the power system. The line stability indices are assessed using the IEEE 14 bus test system to validate its practicability. Results demonstrated that the implemented indices are practically relevant in predicting the manifestation of voltage collapse in the system. Therefore, essential actions can be taken to dodge the incident from arising.
Keywords: Critical line, line outage, line voltage stability indices (LVSI), maximum loadability, voltage collapse, voltage instability, voltage stability analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4164662 An Approach in the Improvement of the Reliability of Impedance Relay
Authors: D. Ouahdi, R. Ladjeroud, I. Habi
Abstract:
The distance protection mainly the impedance relay which is considered as the main protection for transmission lines can be subjected to impedance measurement error which is, mainly, due to the fault resistance and to the power fluctuation. Thus, the impedance relay may not operate for a short circuit at the far end of the protected line (case of the under reach) or operates for a fault beyond its protected zone (case of overreach). In this paper, an approach to fault detection by a distance protection, which distinguishes between the faulty conditions and the effect of overload operation mode, has been developed. This approach is based on the symmetrical components; mainly the negative sequence, and it is taking into account both the effect of fault resistance and the overload situation which both have an effect upon the reliability of the protection in terms of dependability for the former and security for the latter.
Keywords: Distance Protection, Fault Detection, negative sequence, overload, Transmission line.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1840661 An Image Segmentation Algorithm for Gradient Target Based on Mean-Shift and Dictionary Learning
Authors: Yanwen Li, Shuguo Xie
Abstract:
In electromagnetic imaging, because of the diffraction limited system, the pixel values could change slowly near the edge of the image targets and they also change with the location in the same target. Using traditional digital image segmentation methods to segment electromagnetic gradient images could result in lots of errors because of this change in pixel values. To address this issue, this paper proposes a novel image segmentation and extraction algorithm based on Mean-Shift and dictionary learning. Firstly, the preliminary segmentation results from adaptive bandwidth Mean-Shift algorithm are expanded, merged and extracted. Then the overlap rate of the extracted image block is detected before determining a segmentation region with a single complete target. Last, the gradient edge of the extracted targets is recovered and reconstructed by using a dictionary-learning algorithm, while the final segmentation results are obtained which are very close to the gradient target in the original image. Both the experimental results and the simulated results show that the segmentation results are very accurate. The Dice coefficients are improved by 70% to 80% compared with the Mean-Shift only method.
Keywords: Gradient image, segmentation and extract, mean-shift algorithm, dictionary learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 970660 Finite Element Simulation of Multi-Stage Deep Drawing Processes and Comparison with Experimental Results
Authors: A. Pourkamali Anaraki, M. Shahabizadeh, B. Babaee
Abstract:
The plastic forming process of sheet plate takes an important place in forming metals. The traditional techniques of tool design for sheet forming operations used in industry are experimental and expensive methods. Prediction of the forming results, determination of the punching force, blank holder forces and the thickness distribution of the sheet metal will decrease the production cost and time of the material to be formed. In this paper, multi-stage deep drawing simulation of an Industrial Part has been presented with finite element method. The entire production steps with additional operations such as intermediate annealing and springback has been simulated by ABAQUS software under axisymmetric conditions. The simulation results such as sheet thickness distribution, Punch force and residual stresses have been extracted in any stages and sheet thickness distribution was compared with experimental results. It was found through comparison of results, the FE model have proven to be in close agreement with those of experiment.Keywords: Deep drawing, Finite element method, Simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5077659 Reconfigurable Circularly Polarized Compact Short Backfire Antenna
Authors: M. Javid Asad, M. Zafrullah, Mian Shahzad Iqbal
Abstract:
In this research paper, a slotted coaxial line fed cross dipole excitation structure for short backfire antenna is proposed and developed to achieve reconfigurable circular polarization. The cross dipole, which is fed by the slotted coaxial line, consists of two orthogonal dipoles. The dipoles are mounted on the outer conductor of the coaxial line. A unique technique is developed to generate reconfigurable circular polarization using cross dipole configuration. The sub-reflector is supported by the feed line, thus requiring no extra support. The antenna is developed on elliptical ground plane with dielectric rim making antenna compact. It is demonstrated that cross dipole excited short backfire antenna can achieve voltage standing wave ratio (VSWR) bandwidth of 14.28% for 2:1 VSWR, axial ratio of 0.2 dB with axial ratio (≤ 3dB) bandwidth of 2.14% and a gain of more than 12 dBi. The experimental results for the designed antenna structure are in close agreement with computer simulations.Keywords: Circularly polarized, compact, short backfireantenna.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2162658 Construction and Performance Characterization of the Looped-Tube Travelling-Wave Thermoacoustic Engine with Ceramic Regenerator
Authors: Abdulrahman S. Abduljalil, Zhibin Yu, Artur J. Jaworski, Lei Shi
Abstract:
In a travelling wave thermoacoustic device, the regenerator sandwiched between a pair of (hot and cold) heat exchangers constitutes the so-called thermoacoustic core, where the thermoacoustic energy conversion from heat to acoustic power takes place. The temperature gradient along the regenerator caused by the two heat exchangers excites and maintains the acoustic wave in the resonator. The devices are called travelling wave thermoacoustic systems because the phase angle difference between the pressure and velocity oscillation is close to zero in the regenerator. This paper presents the construction and testing of a thermoacoustic engine equipped with a ceramic regenerator, made from a ceramic material that is usually used as catalyst substrate in vehicles- exhaust systems, with fine square channels (900 cells per square inch). The testing includes the onset temperature difference (minimum temperature difference required to start the acoustic oscillation in an engine), the acoustic power output, thermal efficiency and the temperature profile along the regenerator.Keywords: Regenerator, Temperature gradient, Thermoacoustic, Travelling-wave.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2266657 The National Security Assurance of the Republic of Kazakhstan
Authors: Sholpan Zhandossova, Erden Ordabek, Yelbolsyn Nazarov
Abstract:
the article analyzes the national security as a scientific and practical problem, characterized by the state's political institutions to ensure effective action to maintain optimal conditions for the existence and development of the individual and society. National security, as a category of political science reflects the relationship between the security to the nation, including public relations and social consciousness, social institutions and their activities, ensuring the realization of national interests in a particular historical situation. In national security are three security levels: individual, society and state. Their role and place determined by the nature of social relations, political systems, the presence of internal and external threats. In terms of content in the concept of national security is taken to provide political, economic, military, environmental, information security and safety of the cultural development of the nation.
Keywords: Kazakhstan, national security, religious extremism
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1955656 Towards Automatic Recognition and Grading of Ganoderma Infection Pattern Using Fuzzy Systems
Authors: Mazliham Mohd Su'ud, Pierre Loonis, Idris Abu Seman
Abstract:
This paper deals with the extraction of information from the experts to automatically identify and recognize Ganoderma infection in oil palm stem using tomography images. Expert-s knowledge are used as rules in a Fuzzy Inference Systems to classify each individual patterns observed in he tomography image. The classification is done by defining membership functions which assigned a set of three possible hypotheses : Ganoderma infection (G), non Ganoderma infection (N) or intact stem tissue (I) to every abnormalities pattern found in the tomography image. A complete comparison between Mamdani and Sugeno style,triangular, trapezoids and mixed triangular-trapezoids membership functions and different methods of aggregation and defuzzification is also presented and analyzed to select suitable Fuzzy Inference System methods to perform the above mentioned task. The results showed that seven out of 30 initial possible combination of available Fuzzy Inference methods in MATLAB Fuzzy Toolbox were observed giving result close to the experts estimation.
Keywords: Fuzzy Inference Systems, Tomography analysis, Modelizationof expert's information, Ganoderma Infection pattern recognition
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1836655 Solution of S3 Problem of Deformation Mechanics for a Definite Condition and Resulting Modifications of Important Failure Theories
Authors: Ranajay Bhowmick
Abstract:
Analysis of stresses for an infinitesimal tetrahedron leads to a situation where we obtain a cubic equation consisting of three stress invariants. This cubic equation, when solved for a definite condition, gives the principal stresses directly without requiring any cumbersome and time-consuming trial and error methods or iterative numerical procedures. Since the failure criterion of different materials are generally expressed as functions of principal stresses, an attempt has been made in this study to incorporate the solutions of the cubic equation in the form of principal stresses, obtained for a definite condition, into some of the established failure theories to determine their modified descriptions. It has been observed that the failure theories can be represented using the quadratic stress invariant and the orientation of the principal plane.
Keywords: Cubic equation, stress invariant, trigonometric, explicit solution, principal stress, failure criterion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 437654 Enhancing Human Mobility Exoskeleton Comfort Using Admittance Controller
Authors: Alexandre Rabaseda, Emelie Seguin, Marc Doumit
Abstract:
Human mobility exoskeletons have been in development for several years and are becoming increasingly efficient. Unfortunately, user comfort was not always a priority design criterion throughout their development. To further improve this technology, exoskeletons should operate and deliver assistance without causing discomfort to the user. For this, improvements are necessary from an ergonomic point of view. The device’s control method is important when endeavoring to enhance user comfort. Exoskeleton or rehabilitation device controllers use methods of control called interaction controls (admittance and impedance controls). This paper proposes an extended version of an admittance controller to enhance user comfort. The control method used consists of adding an inner loop that is controlled by a proportional-integral-derivative (PID) controller. This allows the interaction force to be kept as close as possible to the desired force trajectory. The force-tracking admittance controller modifies the actuation force of the system in order to follow both the desired motion trajectory and the desired relative force between the user and the exoskeleton.
Keywords: Mobility assistive device, exoskeleton, force-tracking admittance controller, user comfort.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 447653 The Safety of WiMAX Insolid Propellant Rocket Production
Authors: Jiradett K., Ornin S.
Abstract:
With the advance in wireless networking, IEEE 802.16 WiMAX technology has been widely deployed for several applications such as “last mile" broadband service, cellular backhaul, and high-speed enterprise connectivity. As a result, military employed WiMAX as a high-speed wireless connection for data-link because of its point to multi-point and non-line-of-sight (NLOS) capability for many years. However, the risk of using WiMAX is a critical factor in some sensitive area of military applications especially in ammunition manufacturing such as solid propellant rocket production. The US DoD policy states that the following certification requirements are met for WiMAX: electromagnetic effects on the environment (E3) and Hazards of Electromagnetic Radiation to Ordnance (HERO). This paper discuses the Recommended Power Densities and Safe Separation Distance (SSD) for HERO on WiMAX systems deployed on solid propellant rocket production. The result of this research found that WiMAX is safe to operate at close proximity distances to the rocket production based on AF Guidance Memorandum immediately changing AFMAN 91-201.
Keywords: WiMAX, ammunition, explosive, munition, solidpropellant, safety, rocket, missile
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1999652 Abnormality Detection of Persons Living Alone Using Daily Life Patterns Obtained from Sensors
Authors: Ippei Kamihira, Takashi Nakajima, Taiyo Matsumura, Hikaru Miura, Takashi Ono
Abstract:
In this research, the goal was construction of a system by which multiple sensors were used to observe the daily life behavior of persons living alone (while respecting their privacy), using this information to judge such conditions as bad physical condition or falling in the home, etc., so that these abnormal conditions can be made known to relatives and third parties. The daily life patterns of persons living alone are expressed by the number of responses of sensors each time that a set time period has elapsed. By comparing data for the prior two weeks, it was possible to judge a situation as “normal” when the person was in good physical condition or as “abnormal” when the person was in bad physical condition.
Keywords: Sensors, Elderly living alone, Abnormality detection, Lifestyle habit.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1622