Search results for: institutional mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1106

Search results for: institutional mechanism

536 Impact of Obesity on Fertility in a Population of Women in the Wilaya of Batna

Authors: A. Chennaf, M. Yahia, W. Bouafia, S. Benbia, D. Khellaf

Abstract:

Our study was designed to highlight changes in  certain biochemical parameters (CH, TG, HDL, GOT, GPT, LDL and  CRP), obese women infertile fertile witnesses and research potential  pathophysiological link between obesity and infertility in this  population of women. This practical work was focused on a  population of 24 obese women infertile, compared to controls,  subjects without any pathology causing disruption of parameters to  be studied to determine the contribution of obesity in the etiology of  infertility. The assay results revealed a highly significant difference  between the two groups in serum CH, TG, HDL, TGO and TGP (P  <0.0001) and in the rate of LDL (p = 0.0017) and CRP (p = 0.02).  The present study indicates that obesity is associated with infertility,  but no direct pathophysiological link between obesity and infertility  has been determined. Further in-depth studies are needed to  determine the exact mechanism by which overweight leads to female  infertility.

 

Keywords: Obesity, fertility, infertility, biochemical, women.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2394
535 Simulation of Effect of Current Stressing on Reliability of Solder Joints with Cu-Pillar Bumps

Authors: Y. Li, Q. S. Zhang, H. Z. Huang, B. Y. Wu

Abstract:

The mechanism behind the electromigration and thermomigration failure in flip-chip solder joints with Cu-pillar bumps was investigated in this paper through using finite element method. Hot spot and the current crowding occurrs in the upper corner of copper column instead of solders of the common solder ball. The simulation results show that the change in thermal gradient is noticeable, which might greatly affect the reliability of solder joints with Cu-pillar bumps under current stressing. When the average applied current density is increased from 1×104 A/cm2 to 3×104 A/cm2 in solders, the thermal gradient would increase from 74 K/cm to 901 K/cm at an ambient temperature of 25°C. The force from thermal gradient of 901 K/cm can nearly induce thermomigration by itself. With the increase in applied current, the thermal gradient is growing. It is proposed that thermomigration likely causes a serious reliability issue for Cu column based interconnects.

Keywords: Simulation, Cu-pillar bumps, Electromigration, Thermomigration.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1865
534 Calculation of the Forces Acting on the Knee Joint When Rising from Kneeling Positions (Effects of the Leg Alignment and the Arm Assistance on the Knee Joint Forces)

Authors: S. Hirokawa, M. Fukunaga, M. Mawatari

Abstract:

Knee joint forces are available by in vivo measurement using an instrumented knee prosthesis for small to moderate knee flexion but not for high flexion yet. We created a 2D mathematical model of the lower limb incorporating several new features such as a patello-femoral mechanism, a thigh-calf contact at high knee flexion and co-contracting muscles' force ratio, then used it to determine knee joint forces arising from high knee flexions in four kneeling conditions: rising with legs in parallel, with one foot forward, with or without arm use. With arms used, the maximum values of knee joint force decreased to about 60% of those with arms not used. When rising with one foot forward, if arms are not used, the forward leg sustains a force as large as that sustained when rising with legs parallel.

Keywords: Knee joint force, kneeling, mathematical model, biomechanics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4189
533 Performance Analysis of Wireless Ad-Hoc Network Based on EDCA IEEE802.11e

Authors: Shah Ahsanuzzaman Md. Tariq, Fabrizio Granelli

Abstract:

IEEE 802.11e is the enhanced version of the IEEE 802.11 MAC dedicated to provide Quality of Service of wireless network. It supports QoS by the service differentiation and prioritization mechanism. Data traffic receives different priority based on QoS requirements. Fundamentally, applications are divided into four Access Categories (AC). Each AC has its own buffer queue and behaves as an independent backoff entity. Every frame with a specific priority of data traffic is assigned to one of these access categories. IEEE 802.11e EDCA (Enhanced Distributed Channel Access) is designed to enhance the IEEE 802.11 DCF (Distributed Coordination Function) mechanisms by providing a distributed access method that can support service differentiation among different classes of traffic. Performance of IEEE 802.11e MAC layer with different ACs is evaluated to understand the actual benefits deriving from the MAC enhancements.

Keywords: 802.11e, fairness, enhanced distributed channelaccess, access categories, quality of Service.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1944
532 Gravitino Dark Matter in (nearly) SLagy D3/D7 m-Split SUSY

Authors: Mansi Dhuria, Aalok Misra

Abstract:

In the context of large volume Big Divisor (nearly) SLagy D3/D7 μ-Split SUSY [1], after an explicit identification of first generation of SM leptons and quarks with fermionic superpartners of four Wilson line moduli, we discuss the identification of gravitino as a potential dark matter candidate by explicitly calculating the decay life times of gravitino (LSP) to be greater than age of universe and lifetimes of decays of the co-NLSPs (the first generation squark/slepton and a neutralino) to the LSP (the gravitino) to be very small to respect BBN constraints. Interested in non-thermal production mechanism of gravitino, we evaluate the relic abundance of gravitino LSP in terms of that of the co-NLSP-s by evaluating their (co-)annihilation cross sections and hence show that the former satisfies the requirement for a potential Dark Matter candidate. We also show that it is possible to obtain a 125 GeV light Higgs in our setup.

Keywords: Split Supersymmetry, Large Volume Swiss-Cheese Calabi-Yau's, Dark Matter, (N)LSP decays, relic abundance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1583
531 Improvement of Performance for R.C. Beams Made from Recycled Aggregate by Using Non-Traditional Admixture

Authors: A. H. Yehia, M. M. Rashwan, K. A. Assaf, K. Abd el Samee

Abstract:

The aim of this work is to use an environmental, cheap; organic non-traditional admixture to improve the structural behavior of sustainable reinforced concrete beams contains different ratios of recycled concrete aggregate. The used admixture prepared by using wastes from vegetable oil industry. Under and over reinforced concrete beams made from natural aggregate and different ratios of recycled concrete aggregate were tested under static load until failure. Eight beams were tested to investigate the performance and mechanism effect of admixture on improving deformation characteristics, modulus of elasticity and toughness of tested beams. Test results show efficiency of organic admixture on improving flexural behavior of beams contains 20% recycled concrete aggregate more over the other ratios.

Keywords: Deflection, modulus of elasticity, non-traditional admixture, recycled concrete aggregate, strain, toughness, under and over reinforcement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2269
530 Virtual Container Yard: A Paradigm Shift in Container Inventory Management

Authors: Lalith Edirisinghe, Zhihong Jin, A.W. Wijeratne, Hansa Edirisinghe, Lakshmi Ranwala Rashika Mudunkotuwa

Abstract:

A paradigm shift in container inventory management (CIM) is a long-awaited industry need. Virtual container yard (VCY) is a concept developed in 2013 and its primary objective is to minimize shipping transport cost through implementing container exchange between carriers. Shipping lines always try to maintain lower container idle time and provide higher customer satisfaction. However, it is disappointing to note that carriers turn a blind eye to the escalating cost resulted from the present inefficient CIM mechanism. The cost of empty container management is simply transferred to the importers and exporters as freight adjustments. It also creates an environmental hazard. Therefore, it has now become a problem for the society. Therefore, a paradigm shift may be required as the present CIM system is not working for common interests of human beings as it should be.

Keywords: Virtual container yard, imbalance, management, inventory, container inventory management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 594
529 Quantification of E-Waste: A Case Study in Federal University of Espírito Santo, Brazil

Authors: Andressa S. T. Gomes, Luiza A. Souza, Luciana H. Yamane, Renato R. Siman

Abstract:

The segregation of waste of electrical and electronic equipment (WEEE) in the generating source, its characterization (quali-quantitative) and identification of origin, besides being integral parts of classification reports, are crucial steps to the success of its integrated management. The aim of this paper was to count WEEE generation at the Federal University of Espírito Santo (UFES), Brazil, as well as to define sources, temporary storage sites, main transportations routes and destinations, the most generated WEEE and its recycling potential. Quantification of WEEE generated at the University in the years between 2010 and 2015 was performed using data analysis provided by UFES’s sector of assets management. EEE and WEEE flow in the campuses information were obtained through questionnaires applied to the University workers. It was recorded 6028 WEEEs units of data processing equipment disposed by the university between 2010 and 2015. Among these waste, the most generated were CRT screens, desktops, keyboards and printers. Furthermore, it was observed that these WEEEs are temporarily stored in inappropriate places at the University campuses. In general, these WEEE units are donated to NGOs of the city, or sold through auctions (2010 and 2013). As for recycling potential, from the primary processing and further sale of printed circuit boards (PCB) from the computers, the amount collected could reach U$ 27,839.23. The results highlight the importance of a WEEE management policy at the University.

Keywords: Solid waste, waste of electric and electronic equipment, waste management, institutional generation of solid waste.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1565
528 Intrusion Detection Using a New Particle Swarm Method and Support Vector Machines

Authors: Essam Al Daoud

Abstract:

Intrusion detection is a mechanism used to protect a system and analyse and predict the behaviours of system users. An ideal intrusion detection system is hard to achieve due to nonlinearity, and irrelevant or redundant features. This study introduces a new anomaly-based intrusion detection model. The suggested model is based on particle swarm optimisation and nonlinear, multi-class and multi-kernel support vector machines. Particle swarm optimisation is used for feature selection by applying a new formula to update the position and the velocity of a particle; the support vector machine is used as a classifier. The proposed model is tested and compared with the other methods using the KDD CUP 1999 dataset. The results indicate that this new method achieves better accuracy rates than previous methods.

Keywords: Feature selection, Intrusion detection, Support vector machine, Particle swarm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1989
527 The Conduct of Laundering Money through Transport of Cash in the Middle East and North Africa Region

Authors: Haytham Yassine

Abstract:

This article mainly aims to detect and understand how money laundering activities are executed by transport of cash, identifying the underlying factors and separating legitimate from illegitimate usage of cash and how it is being used. This research provides academics with additional literature and provides bank supervisors and practitioners with a better understanding of sources and uses of cash in criminal activities and how cash is used in the laundering mechanism. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help distinguish the factors affecting preference for cash rather other payment instruments in the region, identify what causes the tendency to launder illegal proceeds through cash transportation and how illegal cash is being laundered and moved. On the other hand, this paper sheds the light on major cash generating criminal activities, its sources and main destinations.

Keywords: Illegitimate activities, cash, money laundering, terrorism financing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 841
526 The Fake News Impact on the Public Policy Cycle: A Systemic Analysis through Documentary Survey

Authors: Aron Miranda Burgos, Ergon Cugler de Moraes Silva

Abstract:

In the present article, it is observed that the constant advancement of issues related to misinformation impacts the guarantee of the public policy cycle. Thus, it is found that the dissemination of false information has a direct influence on each of the component stages of this cycle. Therefore, in order to maintain scientific and theoretical credibility in the qualitative analysis process, it was necessary to logically interpose the concepts of firehosing of falsehood, fake news, public policy cycle, as well as using the epistemological and pragmatic mechanism at the intersection of such academic concepts, such as the scientific method. It was found, through the analysis of official documents and public notes, how the multiple theoretical perspectives evidence the commitment of the provision and elaboration of public policies, verifying the way in which the fake news impact each part of the process in this atmosphere.

Keywords: Firehosing of falsehood, governance, misinformation, post-truth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 868
525 Numerical Simulation and Experiment of a Lifting Body with Leading-Edge Rotating Cylinder

Authors: A. Badarudin, C. S. Oon, S. N. Kazi, N. Nik-Ghazali, Y. J. Lee, W. T. Chong

Abstract:

An experimental and simulation flight test has been carried out to evaluate the longitudinal gliding characteristics of a lifting body with blunted half-cone geometry. The novelty here is the lifting body's pitch control mechanism, which consists of a pair of leading-edge rotating cylinders. Flight simulation uses aerodynamic data from computational fluid dynamics supported by wind-tunnel test. Flight test consists of releasing an aluminum lifting body model from a moving vehicle at the appropriate wind speed while measuring the lifting body's variation of altitude against time of flight. Results show that leading-edge rotating cylinder is able to give small amounts of improvement to the longitudinal stability and pitch control to the lifting body.

Keywords: Lifting body, pitch control, aerodynamic, rotating cylinder.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1928
524 Fuzzy Rules Emulated Network Adaptive Controller with Unfixed Learning Rate for a Class of Unknown Discrete-time Nonlinear Systems

Authors: Chidentree Treesatayapun

Abstract:

A direct adaptive controller for a class of unknown nonlinear discrete-time systems is presented in this article. The proposed controller is constructed by fuzzy rules emulated network (FREN). With its simple structure, the human knowledge about the plant is transferred to be if-then rules for setting the network. These adjustable parameters inside FREN are tuned by the learning mechanism with time varying step size or learning rate. The variation of learning rate is introduced by main theorem to improve the system performance and stabilization. Furthermore, the boundary of adjustable parameters is guaranteed through the on-line learning and membership functions properties. The validation of the theoretical findings is represented by some illustrated examples.

Keywords: Neuro-Fuzzy, learning algorithm, nonlinear discrete time.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1424
523 Simulation versus Hands-On Learning Methodologies: A Comparative Study for Engineering and Technology Curricula

Authors: Mohammed T. Taher, Usman Ghani, Ahmed S. Khan

Abstract:

This paper compares the findings of two studies conducted to determine the effectiveness of simulation-based, hands-on and feedback mechanism on students learning by answering the following questions: 1). Does the use of simulation improve students’ learning outcomes? 2). How do students perceive the instructional design features embedded in the simulation program such as exploration and scaffolding support in learning new concepts? 3.) What is the effect of feedback mechanisms on students’ learning in the use of simulation-based labs? The paper also discusses the other aspects of findings which reveal that simulation by itself is not very effective in promoting student learning. Simulation becomes effective when it is followed by hands-on activity and feedback mechanisms. Furthermore, the paper presents recommendations for improving student learning through the use of simulation-based, hands-on, and feedback-based teaching methodologies.

Keywords: Simulation-based teaching, hands-on learning, feedback-based learning, scaffolding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1725
522 Leadership Branding for Sustainable Customer Engagement

Authors: Fauziah Sh. Ahmad, Rosmini Omar, Siti Zaleha Abdul Rasid, Muslim Amin

Abstract:

The purpose of this paper is to examine the inter relationships among various leadership branding constructs of entrepreneurs in small and medium sized enterprises (SMEs). We employ a quantitative structural equation modeling through a new leadership branding engagement model comprises constructs of leader-s or entrepreneur-s personality, branding practice and customer engagement. The results confirm that there are significant relationships between the three constructs and the major fit indices indicate that the data fits the proposed model. The findings provide insights and fill in the literature gaps on statistically validated representation of leadership branding for SMEs across new economic regions of Malaysia that may implicate other economic zones with similar situations. This study extends the establishment of a leadership branding engagement model with a new mechanism of using leaders- personality as a predictor to branding practice and customer engagement performance.

Keywords: Leadership Branding, Malaysia Brands, Customer Engagement, SME Branding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2459
521 Impact Behavior of Cryogenically Treated En 52 and 21-4N Valve Steels

Authors: M. Arockia Jaswin, D. Mohan Lal

Abstract:

Cryogenic treatment is the process of cooling a material to extremely low temperatures to generate enhanced mechanical and physical properties. The purpose of this study is to examine the effect of cryogenic treatment on the impact behavior of En 52 and 21-4N valve steels. The valve steels are subjected to shallow (193 K) and deep cryogenic treatment (85 K), and the impact behavior is compared with the valve steel materials subjected to conventional heat treatment. The impact test is carried out in accordance with the ASTM E 23-02a standard. The results show an improvement of 23 % in the impact energy for the En 52 deep cryo-treated samples when compared to that of the conventionally heat treated samples. It is revealed that during cryogenic treatment fine platelets of martensite are formed from the retained austenite, and these platelets promote the precipitation of fine carbides by a diffusion mechanism during tempering.

Keywords: Cryogenic treatment, valve steel, Fractograph, carbides, impact strength.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4517
520 An Obesity Index Derived from Waist and Hip Circumferences Well-Matched with Other Indices in Children with Obesity

Authors: Mustafa M. Donma, Orkide Donma

Abstract:

Indices derived from anthropometric measurements [waist-to-hip ratio (WHR)] or body fat mass compositions [trunk-to-leg fat ratio (TLFR)] are used for the evaluation of obesity. The best for clinical practices is still being investigated. The aim of this study is to derive an index, which best suits the purpose for the discrimination of children with normal body mass index (N-BMI) from obese (OB) children. 83 children participated in the study. Groups 1 and 2 comprised 42 children with N-BMI and 41 OB children, whose age- and sex-adjusted BMI percentile values vary between 15-85 and 95-99, respectively. The institutional ethics committee approved the study protocol. Informed consent forms were filled by the parents of the participants. Anthropometric measurements (weight, height (Ht), waist circumference (WC), hip circumference (HC), neck circumference (NC) values) were taken. BMI, WHR, (WC+HC)/2, WC/Ht, (WC/HC)/Ht, WC*NC were calculated. Bioelectrical impedance analysis was performed to obtain body’s fat compartments in terms of total fat, trunk fat, leg fat, arm fat masses. TLFR, trunk-to-appendicular fat ratio (TAFR), (trunk fat+leg fat)/2 ((TF+LF)/2), fat mass index (FMI) and diagnostic obesity notation model assessment-II (D2I) index values were calculated. Statistical analysis was performed. Significantly higher values of (WC+HC)/2, (TF+LF)/2, D2I and FMI were observed in OB group than N-BMI group. Significant correlations were found between BMI and WC, (WC+HC)/2, (TF+LF)/2, TLFR, TAFR, D2I, FMI in both groups. Similar correlations were obtained for WC. (WC+HC)/2 was correlated with TLFR, TAFR, (TF+LF)/2, D2I and FMI in N-BMI group. In OB group, the correlations were the same except those with TLFR and TAFR. These correlations were not present with WHR. Correlations were observed between TLFR as well as TAFR and BMI, WC, (WC+HC)/2, (TF+LF)/2, D2I, FMI in N-BMI group. In OB group, correlations between TLFR or TAFR and BMI, WC as well as (WC+HC)/2 were missing. None was noted with WHR. In conclusion, the only correlation valid in both groups was that exists between (TF+LF)/2 and (WC+HC)/2, which was suggested as a link between fat-based and anthropometric indices. (WC+HC)/2, but not WHR, was much more suitable as an anthropometric obesity index.

Keywords: Children, hip circumference, obesity, waist circumference.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 427
519 On the Design of Electronic Control Unitsfor the Safety-Critical Vehicle Applications

Authors: Kyung-Jung Lee, Hyun-Sik Ahn

Abstract:

This paper suggests a design methodology for the hardware and software of the electronic control unit (ECU) of safety-critical vehicle applications such as braking and steering. The architecture of the hardware is a high integrity system such thatit incorporates a high performance 32-bit CPU and a separate peripheral controlprocessor (PCP) together with an external watchdog CPU. Communication between the main CPU and the PCP is executed via a common area of RAM and events on either processor which are invoked by interrupts. Safety-related software is also implemented to provide a reliable, self-testing computing environment for safety critical and high integrity applications. The validity of the design approach is shown by using the hardware-in-the-loop simulation (HILS)for electric power steering(EPS) systemswhich consists of the EPS mechanism, the designed ECU, and monitoring tools.

Keywords: Electronic control unit, electric power steering, functional safety, hardware-in-the-loop simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3368
518 Demulsification of Water-in-Oil Emulsions by Microwave Heating Technology

Authors: Abdurahman H. Nour, Rosli M. Yunus, Azhary. H. Nour

Abstract:

The mechanism of microwave heating is essentially that of dielectric heating. After exposing the emulsion to the microwave Electromagnetic (EM) field, molecular rotation and ionic conduction due to the penetration of (EM) into the emulsion are responsible for the internal heating. To determine the capability of microwave technology in demulsification of crude oil emulsions, microwave demulsification method was applied in a 50-50 % and 20- 80 % water-in-oil emulsions with microwave exposure time varied from 20-180 sec. Transient temperature profiles of water-in-oil emulsions inside a cylindrical container were measured. The temperature rise at a given location was almost horizontal (linear). The average rates of temperature increase of 50-50 % and 20-80 % water-in-oil emulsions are 0.351 and 0.437 oC/sec, respectively. The rate of temperature increase of emulsions decreased at higher temperature due to decreasing dielectric loss of water. These results indicate that microwave demulsification of water-in-oil emulsions does not require chemical additions. Microwave has the potential to be used as an alternative way in the demulsification process.

Keywords: Demulsification, temperature profile, emulsion.Microwave heating, dielectric, volume rate.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3724
517 Carbon Nanotubes–A Successful Hydrogen Storage Medium

Authors: Vijaya Ilango, Avika Gupta

Abstract:

Hydrogen fuel is a zero-emission fuel which uses electrochemical cells or combustion in internal engines, to power vehicles and electric devices. Methods of   hydrogen storage for subsequent use span many approaches, including high pressures, cryogenics and chemical compounds that reversibly release H2 upon heating. Most research into hydrogen storage is focused on storing hydrogen as a lightweight, compact energy carrier for mobile applications. With the accelerating demand for cleaner and more efficient energy sources, hydrogen research has attracted more attention in the scientific community. Until now, full implementation of a hydrogen-based energy system has been hindered in part by the challenge of storing hydrogen gas, especially onboard an automobile. New techniques being researched may soon make hydrogen storage more compact, safe and efficient. In   this overview, few hydrogen storage methods and mechanism of hydrogen uptake in carbon nanotubes are summarized.

Keywords: Carbon nanotubes, Chemisorption, Hydrogen storage, Physisorption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3152
516 Classification of Computer Generated Images from Photographic Images Using Convolutional Neural Networks

Authors: Chaitanya Chawla, Divya Panwar, Gurneesh Singh Anand, M. P. S Bhatia

Abstract:

This paper presents a deep-learning mechanism for classifying computer generated images and photographic images. The proposed method accounts for a convolutional layer capable of automatically learning correlation between neighbouring pixels. In the current form, Convolutional Neural Network (CNN) will learn features based on an image's content instead of the structural features of the image. The layer is particularly designed to subdue an image's content and robustly learn the sensor pattern noise features (usually inherited from image processing in a camera) as well as the statistical properties of images. The paper was assessed on latest natural and computer generated images, and it was concluded that it performs better than the current state of the art methods.

Keywords: Image forensics, computer graphics, classification, deep learning, convolutional neural networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1173
515 Equilibrium, Kinetic and Thermodynamic Studies of Simultaneous Co-Adsorptive Removal of Phenol and Cyanide Using Chitosan

Authors: Bhumica Agarwal, Priya Sengupta, Chandrajit Balomajumder

Abstract:

The present study analyses the potential of acid treated chitosan for simultaneous co-adsorptive removal of phenol and cyanide from a binary waste water solution. The effects of parameters like pH, temperature, initial concentration, adsorbent dose, and adsorbent size were studied. At an optimum pH of 8, temperature of 30⁰C, initial phenol and cyanide concentration of 200 mg/L and 20 mg/L respectively, adsorbent dose of 30 g/L and size between 0.4-0.6 mm the maximum percentage removal of phenol and cyanide was found to be 60.97% and 90.86% respectively. Amongst the adsorption isotherms applied extended Freundlich best depicted the adsorption of both phenol and cyanide based on lowest MPSD value. The kinetics depicted that chemisorption was the adsorption mechanism and intraparticle diffusion is not the only rate controlling step of the reaction. Thermodynamic studies revealed that phenol adsorption was exothermic and spontaneous whereas that of cyanide was an endothermic process.

 

Keywords: Chitosan, Co-adsorption, Cyanide, Phenol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2416
514 The Design of Imaginable Urban Road Landscape

Authors: Wang Zhenzhen, Wang Xu, Hong Liangping

Abstract:

With the rapid development of cities, the way that people commute has changed greatly, meanwhile, people turn to require more on physical and psychological aspects in the contemporary world. However, the current urban road landscape ignores these changes, for example, those road landscape elements are boring, confusing, fragmented and lack of integrity and hierarchy. Under such current situation, in order to shape beautiful, identifiable and unique road landscape, this article concentrates on the target of imaginability. This paper analyzes the main elements of the urban road landscape, the concept of image and its generation mechanism, and then discusses the necessity and connotation of building imaginable urban road landscape as well as the main problems existing in current urban road landscape in terms of imaginability. Finally, this paper proposes how to design imaginable urban road landscape in details based on a specific case.

Keywords: Identifiability, imaginability, road landscape, the image of the city.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3412
513 A New Protocol for Concealed Data Aggregation in Wireless Sensor Networks

Authors: M. Abbasi Dezfouli, S. Mazraeh, M. H. Yektaie

Abstract:

Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.

Keywords: Wireless Sensor Networks, Security, Concealed Data Aggregation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1733
512 A Dirty Page Migration Method in Process of Memory Migration Based on Pre-copy Technology

Authors: Kang Zijian, Zhang Tingyu, Burra Venkata Durga Kumar

Abstract:

This article investigates the challenges in memory migration during the live migration of virtual machines. We found three challenges probably existing in pre-copy technology. One of the main challenges is the challenge of downtime migration. Decreasing the downtime could promise the normal work for a virtual machine. Although pre-copy technology is greatly decreasing the downtime, we still need to shut down the machine in order to finish the last round of data transfer. This paper provides an optimization scheme for the problems existing in pro-copy technology, mainly the optimization of the dirty page migration mechanism. The typical pre-copy technology copies n-1th’s dirty pages in nth turn. However, our idea is to create a double iteration method to solve this problem.

Keywords: Virtual machine, pre-copy technology, memory migration process, downtime, dirty pages migration method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 168
511 Solid Particle Erosion of Heat Treated TNB-V4 at Ambient and Elevated Temperatures

Authors: Muhammad Naveed, Richard Stechow, Sebastian Bolz, Katharina Hobusch, Sabine Weiß

Abstract:

Solid particle erosion has been identified as a critical wear phenomenon which takes place during operation of aeroengines in dusty environment. The present work discusses the erosion behavior of Ti-44.5Al-6.25Nb-0.8Mo-0.1B alloy (TNB-V4) which finds its application in low pressure gas turbines and can be used for high pressure compressors too. Prior to the erosion tests, the alloy was heat treated to improve the mechanical properties. Afterwards, specimens were eroded at impact angles of 30° and 90° at room and high temperatures (100 °C-400 °C). Volume loss and erosion behavior are studied through gravimetric analysis, whereas erosion mechanisms are characterized through scanning electron microscopy. The results indicate a clear difference in the erosion mechanism for different impact angles. The influence of the test temperature on the erosion behavior of the alloy is also discussed in the present contribution.

Keywords: Solid particle erosion, gamma TiAl, TNB-V4, high temperature erosion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1516
510 Negative Emotions and Ways of Overcoming them in Prison

Authors: Katarzyna Czubak

Abstract:

The aim of this paper is description of the notion of the death for prisoners and the ways of deal with. They express indifference, coldness, inability to accept the blame, they have no shame and no empathy. Is it enough to perform acts verging on the death. In this paper we described mechanisms and regularities of selfdestructive behaviour in the view of the relevant literature? The explanation of the phenomenon is of a biological and sociopsychological nature. It must be clearly stated that all forms of selfdestructive behaviour result from various impulses, conflicts and deficits. That is why they should be treated differently in terms of motivation and functions which they perform in a given group of people. Behind self-destruction there seems to be a motivational mechanism which forces prisoners to rebel and fight against the hated law and penitentiary systems. The imprisoned believe that pain and suffering inflicted on them by themselves are better than passive acceptance of repression. The variety of self-destruction acts is wide, and some of them take strange forms. We assume that a life-death barrier is a kind of game for them. If they cannot change the degrading situation, their life loses sense.

Keywords: Self- destruction, Simulation, Negative emotions, Consequences of conviction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1486
509 The Use of Voltage Stability Indices and Proposed Instability Prediction to Coordinate with Protection Systems

Authors: R. Leelaruji, V. Knazkins

Abstract:

This paper proposes a methodology for mitigating the occurrence of cascading failure in stressed power systems. The methodology is essentially based on predicting voltage instability in the power system using a voltage stability index and then devising a corrective action in order to increase the voltage stability margin. The paper starts with a brief description of the cascading failure mechanism which is probable root cause of severe blackouts. Then, the voltage instability indices are introduced in order to evaluate stability limit. The aim of the analysis is to assure that the coordination of protection, by adopting load shedding scheme, capable of enhancing performance of the system after the major location of instability is determined. Finally, the proposed method to generate instability prediction is introduced.

Keywords: Blackouts, cascading failure, voltage stability indices, singular value decomposition, load shedding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1550
508 The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study

Authors: M. Abbasi Dezfouli, S. Mazraeh, M. H. Yektaie

Abstract:

Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.

Keywords: Wireless Sensor Networks, Security, Concealed Data Aggregation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1766
507 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN

Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu

Abstract:

Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.

Keywords: DDoS detection, EMD, relative entropy, SDN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 765