Search results for: code reuse attack.
516 Using HABIT to Estimate the Concentration of CO2 and H2SO4 for Kuosheng Nuclear Power Plant
Authors: Y. Chiang, W. Y. Li, J. R. Wang, S. W. Chen, W. S. Hsu, J. H. Yang, Y. S. Tseng, C. Shih
Abstract:
In this research, the HABIT code was used to estimate the concentration under the CO2 and H2SO4 storage burst conditions for Kuosheng nuclear power plant (NPP). The Final Safety Analysis Report (FSAR) and reports were used in this research. In addition, to evaluate the control room habitability for these cases, the HABIT analysis results were compared with the R.G. 1.78 failure criteria. The comparison results show that the HABIT results are below the criteria. Additionally, some sensitivity studies (stability classification, wind speed and control room intake rate) were performed in this study.
Keywords: BWR, HABIT, habitability, KUOSHENG.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 849515 Topographic Arrangement of 3D Design Components on 2D Maps by Unsupervised Feature Extraction
Authors: Stefan Menzel
Abstract:
As a result of the daily workflow in the design development departments of companies, databases containing huge numbers of 3D geometric models are generated. According to the given problem engineers create CAD drawings based on their design ideas and evaluate the performance of the resulting design, e.g. by computational simulations. Usually, new geometries are built either by utilizing and modifying sets of existing components or by adding single newly designed parts to a more complex design. The present paper addresses the two facets of acquiring components from large design databases automatically and providing a reasonable overview of the parts to the engineer. A unified framework based on the topographic non-negative matrix factorization (TNMF) is proposed which solves both aspects simultaneously. First, on a given database meaningful components are extracted into a parts-based representation in an unsupervised manner. Second, the extracted components are organized and visualized on square-lattice 2D maps. It is shown on the example of turbine-like geometries that these maps efficiently provide a wellstructured overview on the database content and, at the same time, define a measure for spatial similarity allowing an easy access and reuse of components in the process of design development.Keywords: Design decomposition, topographic non-negative matrix factorization, parts-based representation, self-organization, unsupervised feature extraction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1379514 Eco-Friendly Preservative Treated Bamboo Culm: Compressive Strength Analysis
Authors: Perminder JitKaur, Santosh Satya, K. K. Pant, S. N. Naik
Abstract:
Bamboo is extensively used in construction industry. Low durability of bamboo due to fungus infestation and termites attack under storage puts certain constrains for it usage as modern structural material. Looking at many chemical formulations for bamboo treatment leading to severe harmful environment effects, research on eco-friendly preservatives for bamboo treatment has been initiated world-over. In the present studies, eco-friendly preservative for bamboo treatment has been developed. To validate its application for structural purposes, investigation of effect of treatment on compressive strength has been investigated. Neemoil (25%) integrated with copper naphthenate (0.3%) on dilution with kerosene oil impregnated into bamboo culm at 2 bar pressure, has shown weight loss of only 3.15% in soil block analysis method. The results from compressive strength analysis using HEICO Automatic Compression Testing Machine reveal that preservative treatment has not altered the structural properties of bamboo culms. Compressive strength of control (11.72 N/mm2) and above treated samples (11.71 N/mm2) was found to be comparable.
Keywords: Compressive strength, D. strictus bamboo, Ecofriendly treatment, neem oil.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3445513 Numerical Flow Simulation around HSP Propeller in Open Water and behind a Vessel Wake Using RANS CFD Code
Authors: Kadda Boumediene, Mohamed Bouzit
Abstract:
The prediction of the flow around marine propellers and vessel hulls propeller interaction is one of the challenges of Computational fluid dynamics (CFD). The CFD has emerged as a potential tool in recent years and has promising applications. The objective of the current study is to predict the hydrodynamic performances of HSP marine propeller in open water and behind a vessel. The unsteady 3-D flow was modeled numerically along with respectively the K-ω standard and K-ω SST turbulence models for steady and unsteady cases. The hydrodynamic performances such us a torque and thrust coefficients and efficiency show good agreement with the experiment results.
Keywords: Seiun Maru propeller, steady, unsteady, CFD, HSP.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 839512 Study on the Optimization of Completely Batch Water-using Network with Multiple Contaminants Considering Flow Change
Authors: Jian Du, Shui Hong Hong, Lu Meng, Qing Wei Meng
Abstract:
This work addresses the problem of optimizing completely batch water-using network with multiple contaminants where the flow change caused by mass transfer is taken into consideration for the first time. A mathematical technique for optimizing water-using network is proposed based on source-tank-sink superstructure. The task is to obtain the freshwater usage, recycle assignments among water-using units, wastewater discharge and a steady water-using network configuration by following steps. Firstly, operating sequences of water-using units are determined by time constraints. Next, superstructure is simplified by eliminating the reuse and recycle from water-using units with maximum concentration of key contaminants. Then, the non-linear programming model is solved by GAMS (General Algebra Model System) for minimum freshwater usage, maximum water recycle and minimum wastewater discharge. Finally, numbers of operating periods are calculated to acquire the steady network configuration. A case study is solved to illustrate the applicability of the proposed approach.Keywords: Completely batch process, flow change, multiple contaminants, water-using network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1451511 A Study on the Pressure Void Ratio Relationship for Rock Powder Blends with Brick Dust
Authors: Aktan Ozsoy, Ali Fırat Cabalar, Eyyub Karakan
Abstract:
Climate change is one of the biggest issues facing communities. Increasing population, growing economies, rapid industrialization are the main factors triggering it. On the other hand, the millions of tons of waste have generated by the period of rapid global growth not only harm to the environment but also lead to the use of valuable lands around the world as landfill sites. Moreover, it is rapidly consuming our resources and this forces the human population and wildlife to share increasingly shrinking space. In this direction, it is vital to reuse waste materials with a sustainability philosophy. This study was carried out to contribute to the combat against climate change, conserve our natural resources and the environment. An oedometer (consolidation) test was performed on two waste materials combined in certain proportions to evaluate their sustainable usage. Crushed brick dust (BD) was mixed with rock powder (RP) in 0%, 5%, 10%, 20%, 30%, 40%, and 50% (dry weight of soil). The results obtained revealed the importance of the gradation of the material used in the consolidation test. It was found that there was a negligible difference between the initial and final void ratio of mixtures with BD added.
Keywords: Waste material, oedometer test, environmental geotechnics, sustainability, crushed brick dust, rock powder.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 278510 Analysis of the Elastic Scattering of 12C on 11B at Energy near Coulomb Barrier Using Different Optical Potential Codes
Authors: Sh. Hamada, N. Burtebayev, A. Amar, N. Amangieldy
Abstract:
the aim of that work is to study the proton transfer phenomenon which takes place in the elastic scattering of 12C on 11B at energies near the coulomb barrier. This reaction was studied at four different energies 16, 18, 22, 24 MeV. The experimental data of the angular distribution at these energies were compared to the calculation prediction using the optical potential codes such as ECIS88 and SPIVAL. For the raising in the cross section at backward angles due to the transfer process we could use Distorted Wave Born Approximation (DWUCK5). Our analysis showed that SPIVAL code with l-dependent imaginary potential could be used effectively.Keywords: Transfer reaction, DWBA, Elastic Scattering, Optical Potential Codes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1385509 Behavior of RC Buildings to Tsunami Action
Authors: Carlos H. Cuadra
Abstract:
The present report describes the characteristics of damages and behavior of reinforced concrete buildings during the tsunami action. The discussion is based on the field damage survey in selected cities located on the coast of the zone affected by the Great East Japan Earthquake on March 11, 2011. This earthquake is the most powerful know earthquake that has hit Japan with a magnitude 9.0 and with epicenter located at 129 km of Sendai city (off the coast). The earthquake triggered a destructive tsunami with run up height of up to 40 meters that mainly affect cities located on the Pacific Ocean coast of the Tohoku region (north-east region of Japan). Reinforced concrete buildings in general resist the tsunami without collapse however the non-structural elements like panels and ceilings were severely damaged. The analysis of damages has permitted to understand the behavior of RC buildings under tsunami attack, and has also permitted to establish recommendations for their use to take refuge from tsunami in places where natural topography makes impossible to reach hilltops or other safer places.Keywords: tsunami, RC buildings, East Japan Earthquake, seismic damage
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1484508 An Environmentally Friendly Approach towards the Conservation of Vernacular Architecture
Authors: M. Philokyprou, A. Michael
Abstract:
Contemporary theories of sustainability, concerning the natural and built environment, have recently introduced an environmental attitude towards the architectural design that, in turn, affects the practice of conservation and reuse of the existing building stock. This paper presents an environmentally friendly approach towards the conservation of vernacular architecture and it is based on the results of a research program which involved the investigation of sustainable design elements of traditional buildings in Cyprus. The research in question showed that Cypriot vernacular architecture gave more emphasis on cooling rather than heating strategies. Another notable finding of the investigation was the great importance given to courtyards as they enhance considerably, and in various ways, the microclimatic conditions of the immediate environment with favorable results throughout the year. Moreover, it was shown that the reduction in temperature fluctuation observed in the closed and semi-open spaces, compared to the respective temperature fluctuation of the external environment -due to the thermal inertia of the building envelope- helps towards the achievement of more comfortable living conditions within traditional dwellings. This paper concludes with a proposal of a sustainable approach towards the conservation of the existing environment and the introduction of new environmental criteria for the conservation of traditional buildings, beyond the aesthetic, morphological and structural ones that are generally applied.Keywords: Bioclimatic, conservation, environmental, traditional dwellings, vernacular architecture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2654507 Energy Detection Based Sensing and Primary User Traffic Classification for Cognitive Radio
Authors: Urvee B. Trivedi, U. D. Dalal
Abstract:
As wireless communication services grow quickly; the seriousness of spectrum utilization has been on the rise gradually. An emerging technology, cognitive radio has come out to solve today’s spectrum scarcity problem. To support the spectrum reuse functionality, secondary users are required to sense the radio frequency environment, and once the primary users are found to be active, the secondary users are required to vacate the channel within a certain amount of time. Therefore, spectrum sensing is of significant importance. Once sensing is done, different prediction rules apply to classify the traffic pattern of primary user. Primary user follows two types of traffic patterns: periodic and stochastic ON-OFF patterns. A cognitive radio can learn the patterns in different channels over time. Two types of classification methods are discussed in this paper, by considering edge detection and by using autocorrelation function. Edge detection method has a high accuracy but it cannot tolerate sensing errors. Autocorrelation-based classification is applicable in the real environment as it can tolerate some amount of sensing errors.Keywords: Cognitive radio (CR), probability of detection (PD), probability of false alarm (PF), primary User (PU), secondary user (SU), Fast Fourier transform (FFT), signal to noise ratio (SNR).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1470506 Numerical Simulation of the Flow Field around a 30° Inclined Flat Plate
Authors: M. Raciti Castelli, P. Cioppa, E. Benini
Abstract:
This paper presents a CFD analysis of the flow around a 30° inclined flat plate of infinite span. Numerical predictions have been compared to experimental measurements, in order to assess the potential of the finite volume code of determining the aerodynamic forces acting on a flat plate invested by a fluid stream of infinite extent. Several turbulence models and spatial node distributions have been tested and flow field characteristics in the neighborhood of the flat plate have been numerically investigated, allowing the development of a preliminary procedure to be used as guidance in selecting the appropriate grid configuration and the corresponding turbulence model for the prediction of the flow field over a twodimensional inclined plate.Keywords: CFD, lift, drag, flat plate
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3309505 Detection Characteristics of the Random and Deterministic Signals in Antenna Arrays
Authors: Olesya Bolkhovskaya, Alexey Davydov, Alexander Maltsev
Abstract:
In this paper, approach to incoherent signal detection in multi-element antenna array are researched and modeled. Two types of useful signals with unknown wavefront were considered: first one, deterministic (Barker code), and second one, random (Gaussian distribution). The derivation of the sufficient statistics took into account the linearity of the antenna array. The performance characteristics and detecting curves are modeled and compared for different useful signals parameters and for different number of elements of the antenna array. Results of researches in case of some additional conditions can be applied to a digital communications systems.Keywords: Antenna array, detection curves, performance characteristics, quadrature processing, signal detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1774504 Architecture of Speech-based Registration System
Authors: Mayank Kumar, D B Mahesh Kumar, Ashwin S Kumar, N K Srinath
Abstract:
In this era of technology, fueled by the pervasive usage of the internet, security is a prime concern. The number of new attacks by the so-called “bots", which are automated programs, is increasing at an alarming rate. They are most likely to attack online registration systems. Technology, called “CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) do exist, which can differentiate between automated programs and humans and prevent replay attacks. Traditionally CAPTCHA-s have been implemented with the challenge involved in recognizing textual images and reproducing the same. We propose an approach where the visual challenge has to be read out from which randomly selected keywords are used to verify the correctness of spoken text and in turn detect the presence of human. This is supplemented with a speaker recognition system which can identify the speaker also. Thus, this framework fulfills both the objectives – it can determine whether the user is a human or not and if it is a human, it can verify its identity.
Keywords: CAPTCHA, automatic speech recognition, keyword spotting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1547503 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field
Authors: Tun Myat Aung, Ni Ni Hla
Abstract:
This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.cKeywords: Discrete logarithm problem, general attacks, elliptic curves, strong curves, prime field, binary field, attack experiments.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1178502 A Cell-centered Diffusion Finite Volume Scheme and it's Application to Magnetic Flux Compression Generators
Authors: Qiang Zhao, Yina Shi, Guangwei Yuan, Zhiwei Dong
Abstract:
A cell-centered finite volume scheme for discretizing diffusion operators on distorted quadrilateral meshes has recently been designed and added to APMFCG to enable that code to be used as a tool for studying explosive magnetic flux compression generators. This paper describes this scheme. Comparisons with analytic results for 2-D test cases are presented, as well as 2-D results from a test of a "realistic" generator configuration.
Keywords: Cell-centered FVM, distorted meshes, diffusion scheme, MFCG.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1364501 Industrial Waste Monitoring
Authors: Khairuddin Bin Osman, Ngo Boon Kiat, A. Hamid Bin hamidon, Khairul Azha Bin A. Aziz, Hazli Rafis Bin Abdul Rahman, Mazran Bin Esro
Abstract:
Conventional industrial monitoring systems are tedious, inefficient and the at times integrity of the data is unreliable. The objective of this system is to monitor industrial processes specifically the fluid level which will measure the instantaneous fluid level parameter and respond by text messaging the exact value of the parameter to the user when being enquired by a privileged access user. The development of the embedded program code and the circuit for fluid level measuring are discussed as well. Suggestions for future implementations and efficient remote monitoring works are included.Keywords: Industrial monitoring system, text messaging, embedded programming.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1683500 A Socio-Technical Approach to Cyber-Risk Assessment
Authors: Kitty Kioskli, Nineta Polemi
Abstract:
Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.
Keywords: Attacker, behavioural models, cyber risk assessment, cyber-security, human factors, investigative psychology, ISO27001, ISO27005.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 970499 Unsupervised Clustering Methods for Identifying Rare Events in Anomaly Detection
Authors: Witcha Chimphlee, Abdul Hanan Abdullah, Mohd Noor Md Sap, Siriporn Chimphlee, Surat Srinoy
Abstract:
It is important problems to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). Although preventative techniques such as access control and authentication attempt to prevent intruders, these can fail, and as a second line of defence, intrusion detection has been introduced. Rare events are events that occur very infrequently, detection of rare events is a common problem in many domains. In this paper we propose an intrusion detection method that combines Rough set and Fuzzy Clustering. Rough set has to decrease the amount of data and get rid of redundancy. Fuzzy c-means clustering allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. The experimental results on Knowledge Discovery and Data Mining-(KDDCup 1999) Dataset show that the method is efficient and practical for intrusion detection systems.Keywords: Network and security, intrusion detection, fuzzy cmeans, rough set.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2861498 Adaptive Equalization Using Controlled Equal Gain Combining for Uplink/Downlink MC-CDMA Systems
Authors: Miloud Frikel , Boubekeur Targui, Francois Hamon, Mohammed M'SAAD
Abstract:
In this paper we propose an enhanced equalization technique for multi-carrier code division multiple access (MC-CDMA). This method is based on the control of Equal Gain Combining (EGC) technique. Indeed, we introduce a new level changer to the EGC equalizer in order to adapt the equalization parameters to the channel coefficients. The optimal equalization level is, first, determined by channel training. The new approach reduces drastically the mutliuser interferences caused by interferes, without increasing the noise power. To compare the performances of the proposed equalizer, the theoretical analysis and numerical performances are given.
Keywords: MC-CDMA, Equalization, EGC, Single User Detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1408497 A Comparative Study on the Performance of Viscous and Friction Dampers under Seismic Excitation
Authors: Apetsi K. Ampiah, Zhao Xin
Abstract:
Earthquakes over the years have been known to cause devastating damage on buildings and induced huge loss on human life and properties. It is for this reason that engineers have devised means of protecting buildings and thus protecting human life. Since the invention of devices such as the viscous and friction dampers, scientists/researchers have been able to incorporate these devices into buildings and other engineering structures. The viscous damper is a hydraulic device which dissipates the seismic forces by pushing fluid through an orifice, producing a damping pressure which creates a force. In the friction damper, the force is mainly resisted by converting the kinetic energy into heat by friction. Devices such as viscous and friction dampers are able to absorb almost all the earthquake energy, allowing the structure to remain undamaged (or with some amount of damage) and ready for immediate reuse (with some repair works). Comparing these two devices presents the engineer with adequate information on the merits and demerits of these devices and in which circumstances their use would be highly favorable. This paper examines the performance of both viscous and friction dampers under different ground motions. A two-storey frame installed with both devices under investigation are modeled in commercial computer software and analyzed under different ground motions. The results of the performance of the structure are then tabulated and compared. Also included in this study is the ease of installation and maintenance of these devices.
Keywords: Friction damper, seismic, slip load, viscous damper.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 714496 Static Modeling of the Delamination of a Composite Material Laminate in Mode II
Authors: Y. Madani, H. Achache, B. Boutabout
Abstract:
The purpose of this paper is to analyze numerically by the three-dimensional finite element method, using ABAQUS calculation code, the mechanical behavior of a unidirectional and multidirectional delaminated stratified composite under mechanical loading in Mode II. This study consists of the determination of the energy release rate G in mode II as well as the distribution of equivalent von Mises stresses along the damaged zone by varying several parameters such as the applied load and the delamination length. It allowed us to deduce that the high energy release rate favors delamination at the free edges of a stratified plate subjected to bending.
Keywords: Delamination, energy release rate, finite element method, stratified composite.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 709495 A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks
Authors: J. Jenefa, E. A. Mary Anita
Abstract:
Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.
Keywords: Non-repudiation, privacy preservation, public key cryptography, self- generated pseudonym.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1448494 Strategic Leadership and Sustainable Project Management in Enugu, Nigeria
Authors: Nnadi Ezekiel Ejiofor
Abstract:
The study investigates the connection between strategic leadership and project management sustainability, with an emphasis on building projects Nigeria. The study set out to accomplish two specific goals: first, it sought to establish a link between creative project management and resource efficiency in construction projects in Nigeria; and second, it sought to establish a link between innovative thinking and waste minimization in those same projects. A structured questionnaire was used to collect primary data from 45 registered construction enterprises in the study area as part of the study's descriptive research approach. Due to the nonparametric nature of the data, Spearman Rank Order Correlation was used to evaluate the acquired data. The findings demonstrate that creative project management had a significant positive impact on resource efficiency in construction projects carried out by project management firms (r =.849; p.001), and that innovative thinking had a significant impact on waste reduction in those same projects (r =.849; p.001). It was determined that strategic leadership had a significant impact on the sustainability of project management, and it was thus advised that project managers should foresee, prepare for, and effectively communicate present and future developments to project staff in order to ensure that the objective of sustainable initiatives, such as recycling and reuse, is implemented in construction projects.
Keywords: Construction, project management, strategic leadership, sustainability, waste reduction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 109493 Linking Urban Planning and Water Planning to Achieve Sustainable Development and Liveability Outcomes in the New Growth Areas of Melbourne, Australia
Authors: Dennis Corbett
Abstract:
The city of Melbourne in Victoria, Australia, provides a number of examples of how a growing city can integrate urban planning and water planning to achieve sustainable urban development, environmental protection, liveability and integrated water management outcomes, and move towards becoming a “Water Sensitive City". Three examples are provided - the development at Botanic Ridge, where a 318 hectare residential development is being planned and where integrated water management options are being implemented using a “triple bottom line" sustainability investment approach; the Toolern development, which will capture and reuse stormwater and recycled water to greatly reduce the suburb-s demand for potable water, and the development at Kalkallo where a 1,200 hectare industrial precinct development is planned which will merge design of the development's water supply, sewerage services and stormwater system. The Paper argues that an integrated urban planning and water planning approach is fundamental to creating liveable, vibrant communities which meet social and financial needs while being in harmony with the local environment. Further work is required on developing investment frameworks and risk analysis frameworks to ensure that all possible solutions can be assessed equally.
Keywords: Integrated water management, stormwater management, sustainable urban development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2108492 DJess A Knowledge-Sharing Middleware to Deploy Distributed Inference Systems
Authors: Federico Cabitza, Bernardo Dal Seno
Abstract:
In this paper DJess is presented, a novel distributed production system that provides an infrastructure for factual and procedural knowledge sharing. DJess is a Java package that provides programmers with a lightweight middleware by which inference systems implemented in Jess and running on different nodes of a network can communicate. Communication and coordination among inference systems (agents) is achieved through the ability of each agent to transparently and asynchronously reason on inferred knowledge (facts) that might be collected and asserted by other agents on the basis of inference code (rules) that might be either local or transmitted by any node to any other node.Keywords: Knowledge-Based Systems, Expert Systems, Distributed Inference Systems, Parallel Production Systems, Ambient Intelligence, Mobile Agents.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1796491 Combining Diverse Neural Classifiers for Complex Problem Solving: An ECOC Approach
Authors: R. Ebrahimpour, M. Abbasnezhad Arabi, H. Babamiri Moghaddam
Abstract:
Combining classifiers is a useful method for solving complex problems in machine learning. The ECOC (Error Correcting Output Codes) method has been widely used for designing combining classifiers with an emphasis on the diversity of classifiers. In this paper, in contrast to the standard ECOC approach in which individual classifiers are chosen homogeneously, classifiers are selected according to the complexity of the corresponding binary problem. We use SATIMAGE database (containing 6 classes) for our experiments. The recognition error rate in our proposed method is %10.37 which indicates a considerable improvement in comparison with the conventional ECOC and stack generalization methods.Keywords: Error correcting output code, combining classifiers, neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1401490 Design Alternatives for Lateral Force-Resisting Systems of Tall Buildings in Dubai, UAE
Authors: Mohammad AlHamaydeh, Sherif Yehia, Nader Aly, Ammar Douba, Layane Hamzeh
Abstract:
Four design alternatives for lateral force-resisting systems of tall buildings in Dubai, UAE are presented. Quantitative comparisons between the different designs are also made. This paper is intended to provide different feasible lateral systems to be used in Dubai in light of the available seismic hazard studies of the UAE. The different lateral systems are chosen in conformance with the International Building Code (IBC). Moreover, the expected behavior of each system is highlighted and light is shed on some of the cost implications associated with lateral system selection.Keywords: Concrete, Dual, Dubai UAE Seismicity, Special Moment-Resisting Frames (SMRF), Special Shear Wall, Steel
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3524489 Adaptive Subchannel Allocation for MC-CDMA System
Authors: Cuiran Li, Jianli Xie, Chengshu Li
Abstract:
Multicarrier code-division multiple-access is one of the effective techniques to gain its multiple access capability, robustness against fading, and to mitigate the ISI. In this paper, we propose an improved mulcarrier CDMA system with adaptive subchannel allocation. We analyzed the performance of our proposed system in frequency selective fading environment with narrowband interference existing and compared it with that of parallel transmission over many subchannels (namely, conventional MC-CDMA scheme) and DS-CDMA system. Simulation results show that adaptive subchannel allocation scheme, when used in conventional multicarrier CDMA system, the performance will be greatly improved.Keywords: MC-CDMA, Rayleigh fading, Narrowbandinterference, Channel estimation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1573488 Study of a Four-Bed Pressure Swing Adsorption for Oxygen Separation from Air
Authors: Moghadazadeh Zahra, Towfighi Jafar, Mofarahi Masoud
Abstract:
This article is presented an experimental and modeling study of a four-bed pressure swing adsorption process using zeolite13X to provide oxygen-enriched air. The binary mixture N2/O2 (79/21 vol %) was used as a feed stream. The effects of purge/feed ratio (P/F), adsorption pressure, cyclic time and product flow rate on product purity and recovery under nonisothermal condition were studied. The adsorption dynamics of process were determined using a mathematical model incorporated mass and energy balances. A Mathlab code using finite difference method was developed to solve the set of coupled differential-algebraic equations, and the simulation results are agreed well with experimental results.Keywords: Pressure swing adsorption (PSA), Oxygen, Zeolite 13X.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3865487 An Optimal Algorithm for HTML Page Building Process
Authors: Maryam Jasim Abdullah, Bassim. H. Graimed, Jalal. S. Hameed
Abstract:
Demand over web services is in growing with increases number of Web users. Web service is applied by Web application. Web application size is affected by its user-s requirements and interests. Differential in requirements and interests lead to growing of Web application size. The efficient way to save store spaces for more data and information is achieved by implementing algorithms to compress the contents of Web application documents. This paper introduces an algorithm to reduce Web application size based on reduction of the contents of HTML files. It removes unimportant contents regardless of the HTML file size. The removing is not ignored any character that is predicted in the HTML building process.
Keywords: HTML code, HTML tag, WEB applications, Document compression, DOM tree.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2038