Search results for: Connection Existence Period (CEP)
1236 Protection of Transformers against Surge Voltage
Authors: Anil S. Khopkar, Umesh N. Soni
Abstract:
Surge voltage arises in the system either by switching operations of heavy load or by natural lightning. Surge voltages cause significant failure of power system equipment if adequate protection not provided. The surge arrestor is device which is connected in a power system to protect the equipment against surge voltages. To protect the transformers against surge voltages, metal oxide surge arrestors (MOSA) are connected across each terminal. The Basic Insulation Level (BIL) of transformers has been defined in the national and international standards based on its voltage rating. While designing transformer insulation, factors such as BIL, surge arrestor ratings, and its operating voltage have to be considered. However, the performance of transformer insulation largely depends on the ratings of the surge arrestor ratings, their location, the margin considered in insulation design, the quantity of surge voltage strikes, etc. This paper demonstrates the role of surge arrestors in protecting transformers against overvoltage, transformer insulation design, the optimum location of surge arrestors and their connection lead length, insulation coordination for transformers, the protection margin in BIL, and methods of safeguarding transformers against surge voltages in detail.
Keywords: Surge voltage, surge arrestors, transformer, protection margin.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 781235 Vibration and Operation Technical Consideration before Field Balance of Gas Turbine Utilities (In Iran Power Plants SIEMENS V94.2 Gas Turbines)
Authors: Omid A. Zargar
Abstract:
One of the most challenging times in operation of big industrial plant or utilities is the time that alert lamp of Bently Nevada connection in main board substation turn on and show the alert condition of machine. All of the maintenance groups usually make a lot of discussion with operation and together rather this alert signal is real or fake. This will be more challenging when condition monitoring vibrationdata shows 1X(X=current rotor frequency) in fast Fourier transform(FFT) and vibration phase trends show 90 degree shift between two non-contact probedirections with overall high radial amplitude amounts. In such situations, CM (condition monitoring) groups usually suspicious about unbalance in rotor. In this paper, four critical case histories related to SIEMENS V94.2 Gas Turbines in Iran power industry discussed in details. Furthermore, probe looseness and fake (unreal) trip in gas turbine power plants discussed. In addition, critical operation decision in alert condition in power plants discussed in details.
Keywords: Gas turbine, field balance, turbine compressors, balancing tools, balancing data collectors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 41231234 Comparative DNA Binding of Iron and Manganese Complexes by Spectroscopic and ITC Techniques and Antibacterial Activity
Authors: Maryam Nejat Dehkordi, Per Lincoln, Hassan Momtaz
Abstract:
Interaction of Schiff base complexes of Iron and Manganese: Iron [N, N’ Bis (5- (triphenyl phosphonium methyl) salicylidene) -1, 2 ethanediamine) chloride, [Fe Salen]Cl; Manganese [N, N’ Bis (5- (triphenyl phosphonium methyl) salicylidene) -1, 2 ethanediamine) acetate, were investigated by spectroscopic and isothermal titration calorimetry techniques (ITC). The absorbance spectra of complexes have shown hyper and hypochromism in the presence of DNA that is indication of interaction of complexes with DNA. The linear dichroism (LD) measurements confirmed the bending of DNA in the presence of complexes. Furthermore, Isothermal titration calorimetry experiments approved that complexes bound to DNA on the base of both electrostatic and hydrophobic interactions. More, ITC profile exhibits the existence of two binding phases for the complexes. Antibacterial activity of ligand and complexes were tested in vitro to evaluate their activity against the gram positive and negative bacteria.
Keywords: Schiff base complexes, Linear dichroism (LD), Isothermal titration calorimetry (ITC).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25981233 Generational PipeLined Genetic Algorithm (PLGA)using Stochastic Selection
Authors: Malay K. Pakhira, Rajat K. De
Abstract:
In this paper, a pipelined version of genetic algorithm, called PLGA, and a corresponding hardware platform are described. The basic operations of conventional GA (CGA) are made pipelined using an appropriate selection scheme. The selection operator, used here, is stochastic in nature and is called SA-selection. This helps maintaining the basic generational nature of the proposed pipelined GA (PLGA). A number of benchmark problems are used to compare the performances of conventional roulette-wheel selection and the SA-selection. These include unimodal and multimodal functions with dimensionality varying from very small to very large. It is seen that the SA-selection scheme is giving comparable performances with respect to the classical roulette-wheel selection scheme, for all the instances, when quality of solutions and rate of convergence are considered. The speedups obtained by PLGA for different benchmarks are found to be significant. It is shown that a complete hardware pipeline can be developed using the proposed scheme, if parallel evaluation of the fitness expression is possible. In this connection a low-cost but very fast hardware evaluation unit is described. Results of simulation experiments show that in a pipelined hardware environment, PLGA will be much faster than CGA. In terms of efficiency, PLGA is found to outperform parallel GA (PGA) also.Keywords: Hardware evaluation, Hardware pipeline, Optimization, Pipelined genetic algorithm, SA-selection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14431232 Biometric Steganography Using Variable Length Embedding
Authors: Souvik Bhattacharyya, Indradip Banerjee, Anumoy Chakraborty, Gautam Sanyal
Abstract:
Recent growth in digital multimedia technologies has presented a lot of facilities in information transmission, reproduction and manipulation. Therefore, the concept of information security is one of the superior articles in the present day situation. The biometric information security is one of the information security mechanisms. It has the advantages as well as disadvantages. The biometric system is at risk to a range of attacks. These attacks are anticipated to bypass the security system or to suspend the normal functioning. Various hazards have been discovered while using biometric system. Proper use of steganography greatly reduces the risks in biometric systems from the hackers. Steganography is one of the fashionable information hiding technique. The goal of steganography is to hide information inside a cover medium like text, image, audio, video etc. through which it is not possible to detect the existence of the secret information. Here in this paper a new security concept has been established by making the system more secure with the help of steganography along with biometric security. Here the biometric information has been embedded to a skin tone portion of an image with the help of proposed steganographic technique.
Keywords: Biometrics, Skin tone detection, Series, Polynomial, Cover Image, Stego Image.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26701231 Effect of Swirl on Gas-Fired Combustion Behavior in a 3-D Rectangular Combustion Chamber
Authors: Man Young Kim
Abstract:
The objective of this work is to investigate the turbulent reacting flow in a three dimensional combustor with emphasis on the effect of inlet swirl flow through a numerical simulation. Flow field is analyzed using the SIMPLE method which is known as stable as well as accurate in the combustion modeling, and the finite volume method is adopted in solving the radiative transfer equation. In this work, the thermal and flow characteristics in a three dimensional combustor by changing parameters such as equivalence ratio and inlet swirl angle have investigated. As the equivalence ratio increases, which means that more fuel is supplied due to a larger inlet fuel velocity, the flame temperature increases and the location of maximum temperature has moved towards downstream. In the mean while, the existence of inlet swirl velocity makes the fuel and combustion air more completely mixed and burnt in short distance. Therefore, the locations of the maximum reaction rate and temperature were shifted to forward direction compared with the case of no swirl.Keywords: Gaseous Fuel, Inlet Swirl, Thermal Radiation, Turbulent Combustion
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16341230 Trial of Fecal Microbial Transplantation for the Prevention of Canine Atopic Dermatitis
Authors: Caroline F. Moeser
Abstract:
The skin-gut axis defines the relationship between the intestinal microbiota and the development of pathological skin diseases. Low diversity within the gut can predispose to the development of allergic skin conditions, and a greater diversity of the gastrointestinal microflora has been associated with a reduction of skin flares in people with atopic dermatitis. Manipulation of the gut microflora has been used as a treatment option for several conditions in people, but there is limited data available on the use of fecal transplantation as a preventative measure in either people or dogs. Six, 4-month-old pups from a litter of 10 were presented for diarrhea and/or signs of skin disease (chronic scratching, otitis externa). Of these pups, two were given probiotics with a resultant resolution of diarrhea. The other four pups were given fecal transplantation, either as a sole treatment or in combination with other treatments. Follow-up on the litter of 10 pups was performed at 18 months of age. At this stage, three out of the four pups that had received fecal transplantation had resolved all clinical signs and had no recurrence of either skin or gastrointestinal symptoms, the other pup had one episode of Malassezia otitis. Of the remaining six pups from the litter, all had developed at least one episode of Malassezia otitis externa within the period of five to 18 months of age. Two pups had developed two Malassezia otitis infections, and one had developed three Malassezia otitis infections during this period. Favrot’s criteria for the diagnosis of canine atopic dermatitis include chronic or recurrent Malassezia infections by the age of three years. Early results from this litter predict a reduction in the development of canine atopic disease in dogs given fecal microbial transplantation. Follow-up studies at three years of age and within a larger population of dogs can enhance understanding of the impact of early fecal transplantation in the prevention of canine atopic dermatitis.
Keywords: Canine atopic dermatitis, fecal microbial transplant, skin-gut axis, otitis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8261229 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment
Authors: Wenqing Fan, Yixuan Cheng, Wei Huang
Abstract:
The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.
Keywords: DIR Triad Model, DVE, vulnerability intelligence, vulnerability recurrence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6911228 Study of Aluminum, Copper and Molybdenum Pollution in Groundwater Sources Surrounding (Miduk) Shahr-E- Babak Copper Complex Tailings Dam
Authors: Maryam Kargar, Neamatolah Khorasani, Mahmoud Karami, Gholam-Reza Rafiee, Reza Naseh
Abstract:
Interpolated contour maps drawn for aluminum, copper and molybdenum in downstream monitoring boreholes of water dam in Miduk Copper Complex and the values of pH, redox potential (Eh) and distance from water dam indicate different trends of variation and behavior of these three elements in downward groundwater resources. As these maps exhibit, aluminum is dominant in the most alkaline (pH = 9-11) borehole (MB5) to water dam. The highest concentration of molybdenum is found in the nearest borehole (MB6) to water dam. Main concentration of copper is observed in the most oxidized borehole (MB3 with Eh=293.2mV). The spatial difference among sampling stations can be attributed to the existence of faults and diaclases in the geologic structure of Miduk region which causes the groundwater sampling sites to be impressed by different contamination sources (toe seepage and upper seepage water originated from different zones of tailings dump).Keywords: Contour maps, Monitoring borehole, Toe seepage, Upper seepage.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22221227 A View of Flexible Housing in China
Authors: Shanshan Li
Abstract:
Beginning with the debate of concept, this essay explains the historical source and development of flexible housing in China. In the former part, the flexibility contained in traditional house is explored. While in the latter, the relevant practices in modern times are systematically analyzed as three phases–the Embryonic Period (1949 - 1980), the Systematic Practice (1981 - 2000), as well as the Integrated Trend and Prosperity (2001 - present). As a conclusion, the generalized flexibility is tentatively discussed.
Keywords: Flexibility, Long-term effectiveness, Variety, Social background.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22891226 Study of Mixed Convection in a Vertical Channel Filled with a Reactive Porous Medium in the Absence of Local Thermal Equilibrium
Authors: Hamid Maidat, Khedidja Bouhadef, Djamel Eddine Ameziani, Azzedine Abdedou
Abstract:
This work consists of a numerical simulation of convective heat transfer in a vertical plane channel filled with a heat generating porous medium, in the absence of local thermal equilibrium. The walls are maintained to a constant temperature and the inlet velocity is uniform. The dynamic range is described by the Darcy-Brinkman model and the thermal field by two energy equations model. A dimensionless formulation is developed for performing a parametric study based on certain dimensionless groups such as, the Biot interstitial number, the thermal conductivity ratio and the volumetric heat generation, q '''. The governing equations are solved using the finite volume method, gave rise to a multitude of results concerning in particular the thermal field in the porous channel and the existence or not of the local thermal equilibrium.Keywords: Mixed convection, porous medium, power generation, local thermal non equilibrium model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15851225 Children and Advertising: Issues in Consumer Socialization Process
Authors: Laimona Sliburyte
Abstract:
Today advertising is actively penetrating into many spheres of our lives. We cannot imagine the existence of a lot of economic activities without advertising. That mostly concerns trade and services. Everyone of us should look better into the everyday communication and carefully consider the amount and the quality of the information we receive as well as its influence on our behaviour. Special attention should be paid to the young generation. Theoretical and practical research has proved the ever growing influence of information (especially the one contained in advertising) on a society; on its economics, culture, religion, politics and even people-s private lives and behaviour. Children have plenty of free time and, therefore, see a lot of different advertising. Though education of children is in the hands of parents and schools, advertising makers and customers should think with responsibility about the selection of time and transmission channels of child targeted advertising. The purpose of the present paper is to investigate the influence of advertising upon consumer views and behaviour of children in different age groups. The present investigation has clarified the influence of advertising as a means of information on a certain group of society, which in the modern information society is the most vulnerable – children. In this paper we assess children-s perception and their understanding of advertising.
Keywords: Advertising, children, children targeted advertising, consumer socialization process.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26921224 The Causal Relationships between Destination Image, Tourist Satisfaction and Revisit Intention: A Case of the United Arab Emirates
Authors: Abdul Raheem Jasim Mohammed, Mohd Salehuddin Mohd Zahari, Salim Abdul Talib, Mohd Zulhilmi Suhaimi
Abstract:
The connection between past travel experience and tourists’ revisit behavioral intentions has not been widely explored but the existing studies suggest a close relationship between them. Destination image can equally be construed as having effects on the attitudes of the tourists at the end of their actual visitation and the satisfaction of a tourist with his or her travel experiences contributes to a revisit intention towards a particular destination. With strong marketing efforts, UAE is not only considered to be successful in attracting foreign investors, but is becoming the most popular tourism destination in the Arab region. UAE is seriously developing its tourism image and taking serious initiatives to attract new or repeat visitations from the international tourists. This study empirically investigates the causal relationships between tourism destination image, tourist satisfaction and revisit intention using UAE as a contextual study setting. A very clear picture emerged which provides a host country with potential implications for its tourism industry practitioners, Department of Tourism and Commerce Marketing and the travel agencies who act as the intermediaries between the potential tourists and the hotel operators.
Keywords: Destination image, tourist satisfaction, revisit intention.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32181223 Development of Coronal Field and Solar Wind Components for MHD Interplanetary Simulations
Authors: Ljubomir Nikolic, Larisa Trichtchenko
Abstract:
The connection between solar activity and adverse phenomena in the Earth’s environment that can affect space and ground based technologies has spurred interest in Space Weather (SW) research. A great effort has been put on the development of suitable models that can provide advanced forecast of SW events. With the progress in computational technology, it is becoming possible to develop operational large scale physics based models which can incorporate the most important physical processes and domains of the Sun-Earth system. In order to enhance our SW prediction capabilities we are developing advanced numerical tools. With operational requirements in mind, our goal is to develop a modular simulation framework of propagation of the disturbances from the Sun through interplanetary space to the Earth. Here, we report and discuss on the development of coronal field and solar wind components for a large scale MHD code. The model for these components is based on a potential field source surface model and an empirical Wang-Sheeley-Arge solar wind relation.
Keywords: Space weather, numerical modeling, coronal field, solar wind.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21391222 Application of LSB Based Steganographic Technique for 8-bit Color Images
Authors: Mamta Juneja, Parvinder S. Sandhu, Ekta Walia
Abstract:
Steganography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. One of the most common methods of implementation is Least Significant Bit Insertion, in which the least significant bit of every byte is altered to form the bit-string representing the embedded file. Altering the LSB will only cause minor changes in color, and thus is usually not noticeable to the human eye. While this technique works well for 24-bit color image files, steganography has not been as successful when using an 8-bit color image file, due to limitations in color variations and the use of a colormap. This paper presents the results of research investigating the combination of image compression and steganography. The technique developed starts with a 24-bit color bitmap file, then compresses the file by organizing and optimizing an 8-bit colormap. After the process of compression, a text message is hidden in the final, compressed image. Results indicate that the final technique has potential of being useful in the steganographic world.
Keywords: Compression, Colormap, Encryption, Steganographyand LSB Insertion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30011221 Water Resources Vulnerability Assessment to Climate Change in a Semi-Arid Basin of South India
Authors: K. Shimola, M. Krishnaveni
Abstract:
This paper examines vulnerability assessment of water resources in a semi-arid basin using the 4-step approach. The vulnerability assessment framework is developed to study the water resources vulnerability which includes the creation of GIS-based vulnerability maps. These maps represent the spatial variability of the vulnerability index. This paper introduces the 4-step approach to assess vulnerability that incorporates a new set of indicators. The approach is demonstrated using a framework composed of a precipitation data for (1975–2010) period, temperature data for (1965–2010) period, hydrological model outputs and the water resources GIS data base. The vulnerability assessment is a function of three components such as exposure, sensitivity and adaptive capacity. The current water resources vulnerability is assessed using GIS based spatio-temporal information. Rainfall Coefficient of Variation, monsoon onset and end date, rainy days, seasonality indices, temperature are selected for the criterion ‘exposure’. Water yield, ground water recharge, evapotranspiration (ET) are selected for the criterion ‘sensitivity’. Type of irrigation and storage structures are selected for the criterion ‘Adaptive capacity’. These indicators were mapped and integrated in GIS environment using overlay analysis. The five sub-basins, namely Arjunanadhi, Kousiganadhi, Sindapalli-Uppodai and Vallampatti Odai, fall under medium vulnerability profile, which indicates that the basin is under moderate stress of water resources. The paper also explores prioritization of sub-basinwise adaptation strategies to climate change based on the vulnerability indices.
Keywords: Adaptive capacity, exposure, overlay analysis, sensitivity, vulnerability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11241220 Potential Climate Change Impacts on the Hydrological System of the Harvey River Catchment
Authors: Hashim Isam Jameel Al-Safi, P. Ranjan Sarukkalige
Abstract:
Climate change is likely to impact the Australian continent by changing the trends of rainfall, increasing temperature, and affecting the accessibility of water quantity and quality. This study investigates the possible impacts of future climate change on the hydrological system of the Harvey River catchment in Western Australia by using the conceptual modelling approach (HBV mode). Daily observations of rainfall and temperature and the long-term monthly mean potential evapotranspiration, from six weather stations, were available for the period (1961-2015). The observed streamflow data at Clifton Park gauging station for 33 years (1983-2015) in line with the observed climate variables were used to run, calibrate and validate the HBV-model prior to the simulation process. The calibrated model was then forced with the downscaled future climate signals from a multi-model ensemble of fifteen GCMs of the CMIP3 model under three emission scenarios (A2, A1B and B1) to simulate the future runoff at the catchment outlet. Two periods were selected to represent the future climate conditions including the mid (2046-2065) and late (2080-2099) of the 21st century. A control run, with the reference climate period (1981-2000), was used to represent the current climate status. The modelling outcomes show an evident reduction in the mean annual streamflow during the mid of this century particularly for the A1B scenario relative to the control run. Toward the end of the century, all scenarios show a relatively high reduction trends in the mean annual streamflow, especially the A1B scenario, compared to the control run. The decline in the mean annual streamflow ranged between 4-15% during the mid of the current century and 9-42% by the end of the century.
Keywords: Climate change impact, Harvey catchment, HBV model, hydrological modelling, GCMs, LARS-WG, Australia.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14341219 Power of Doubling: Population Growth and Resource Consumption
Authors: Sarika Bahadure
Abstract:
Sustainability starts with conserving resources for future generations. Since human’s existence on this earth, he has been consuming natural resources. The resource consumption pace in the past was very slow, but industrialization in 18th century brought a change in the human lifestyle. New inventions and discoveries upgraded the human workforce to machines. The mass manufacture of goods provided easy access to products. In the last few decades, the globalization and change in technologies brought consumer oriented market. The consumption of resources has increased at a very high scale. This overconsumption pattern brought economic boom and provided multiple opportunities, but it also put stress on the natural resources. This paper tries to put forth the facts and figures of the population growth and consumption of resources with examples. This is explained with the help of the mathematical expression of doubling known as exponential growth. It compares the carrying capacity of the earth and resource consumption of humans’ i.e. ecological footprint and bio-capacity. Further, it presents the need to conserve natural resources and re-examine sustainable resource use approach for sustainability.
Keywords: Consumption, exponential growth, population, resources, sustainability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11111218 Investigating the Geopolymerization Process of Aluminosilicates and Its Impact on the Compressive Strength of the Produced Geopolymers
Authors: Heba Z. Fouad, Tarek M. Madkour, Safwan A. Khedr
Abstract:
This paper investigates multiple factors that impact the formation of geopolymers and their compressive strength to be utilized in construction as an environmentally-friendly material. Bentonite and Kaolinite were thermally calcinated at 750 °C to obtain Metabentonite and Metakaolinite with higher reactivity. Both source materials were activated using a solution of sodium hydroxide (NaOH). Thereafter, samples were cured at different temperatures. The samples were analyzed chemically using a host of spectroscopic techniques. The bulk density and compressive strength of the produced geopolymer pastes were studied. Findings indicate that the ratio of NaOH solution to source material affects the compressive strength, being optimal at 0.54. Moreover, controlled heat curing was proven effective to improve compressive strength. The existence of characteristic Fourier Transform Infrared Spectroscopy (FTIR) peaks at approximately 1020 cm-1 and 460 cm-1 which correspond to the asymmetric stretching vibration of Si-O-T and bending vibration of Si-O-Si, hence, confirming the formation of the target geopolymer.
Keywords: alcination of metakaolinite, compressive strength, FTIR analysis, geopolymer, green cement
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3841217 Co-tier and Co-channel Interference Avoidance Algorithm for Femtocell Networks
Authors: S. Padmapriya, M. Tamilarasi
Abstract:
Femtocells are regarded as a milestone for next generation cellular networks. As femtocells are deployed in an unplanned manner, there is a chance of assigning same resource to neighboring femtocells. This scenario may induce co-channel interference and may seriously affect the service quality of neighboring femtocells. In addition, the dominant transmit power of a femtocell will induce co-tier interference to neighboring femtocells. Thus to jointly handle co-tier and co-channel interference, we propose an interference-free power and resource block allocation (IFPRBA) algorithm for closely located, closed access femtocells. Based on neighboring list, inter-femto-base station distance and uplink noise power, the IFPRBA algorithm assigns non-interfering power and resource to femtocells. The IFPRBA algorithm also guarantees the quality of service to femtouser based on the knowledge of resource requirement, connection type, and the tolerable delay budget. Simulation result shows that the interference power experienced in IFPRBA algorithm is below the tolerable interference power and hence the overall service success ratio, PRB efficiency and network throughput are maximum when compared to conventional resource allocation framework for femtocell (RAFF) algorithm.
Keywords: Co-channel interference, co-tier interference, femtocells, guaranteed QoS, power optimization, resource assignment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24661216 Health Risk Assessment for Sewer Workers using Bayesian Belief Networks
Authors: Kevin Fong-Rey Liu, Ken Yeh, Cheng-Wu Chen, Han-Hsi Liang
Abstract:
The sanitary sewerage connection rate becomes an important indicator of advanced cities. Following the construction of sanitary sewerages, the maintenance and management systems are required for keeping pipelines and facilities functioning well. These maintenance tasks often require sewer workers to enter the manholes and the pipelines, which are confined spaces short of natural ventilation and full of hazardous substances. Working in sewers could be easily exposed to a risk of adverse health effects. This paper proposes the use of Bayesian belief networks (BBN) as a higher level of noncarcinogenic health risk assessment of sewer workers. On the basis of the epidemiological studies, the actual hospital attendance records and expert experiences, the BBN is capable of capturing the probabilistic relationships between the hazardous substances in sewers and their adverse health effects, and accordingly inferring the morbidity and mortality of the adverse health effects. The provision of the morbidity and mortality rates of the related diseases is more informative and can alleviate the drawbacks of conventional methods.Keywords: Bayesian belief networks, sanitary sewerage, healthrisk assessment, hazard quotient, target organ-specific hazard index.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17061215 Towards a New Methodology for Developing Web-Based Systems
Authors: Omer Ishag Eldai, Ahmed Hassan M. H. Ali, S. Raviraja
Abstract:
Web-based systems have become increasingly important due to the fact that the Internet and the World Wide Web have become ubiquitous, surpassing all other technological developments in our history. The Internet and especially companies websites has rapidly evolved in their scope and extent of use, from being a little more than fixed advertising material, i.e. a "web presences", which had no particular influence for the company's business, to being one of the most essential parts of the company's core business. Traditional software engineering approaches with process models such as, for example, CMM and Waterfall models, do not work very well since web system development differs from traditional development. The development differs in several ways, for example, there is a large gap between traditional software engineering designs and concepts and the low-level implementation model, many of the web based system development activities are business oriented (for example web application are sales-oriented, web application and intranets are content-oriented) and not engineering-oriented. This paper aims to introduce Increment Iterative extreme Programming (IIXP) methodology for developing web based systems. In difference to the other existence methodologies, this methodology is combination of different traditional and modern software engineering and web engineering principles.Keywords: Web based systems, Web engineering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18511214 Long Term Evolution Multiple-Input Multiple-Output Network in Unmanned Air Vehicles Platform
Authors: Ashagrie Getnet Flattie
Abstract:
Line-of-sight (LOS) information, data rates, good quality, and flexible network service are limited by the fact that, for the duration of any given connection, they experience severe variation in signal strength due to fading and path loss. Wireless system faces major challenges in achieving wide coverage and capacity without affecting the system performance and to access data everywhere, all the time. In this paper, the cell coverage and edge rate of different Multiple-input multiple-output (MIMO) schemes in 20 MHz Long Term Evolution (LTE) system under Unmanned Air Vehicles (UAV) platform are investigated. After some background on the enormous potential of UAV, MIMO, and LTE in wireless links, the paper highlights the presented system model which attempts to realize the various benefits of MIMO being incorporated into UAV platform. The performances of the three MIMO LTE schemes are compared with the performance of 4x4 MIMO LTE in UAV scheme carried out to evaluate the improvement in cell radius, BER, and data throughput of the system in different morphology. The results show that significant performance gains such as bit error rate (BER), data rate, and coverage can be achieved by using the presented scenario.Keywords: BER, LTE, MIMO, path loss, UAV.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13911213 Molecular Characterization of Echinococcus granulosus through Amplification of 12S rRNA Gene and Cox1 Gene Fragments from Cattle in Chittagong, Bangladesh
Authors: M. Omer Faruk, A. M. A. M. Zonaed Siddiki, M. Fazal Karim, Md. Masuduzzaman, S. Chowdhury, Md. Shafiqul Islam, M. Alamgir Hossain
Abstract:
The dog tapeworms Echinococcus granulosus develop hydatid cysts in various organs in human and domestic animals worldwide including Bangladesh. The aim of this study was to identify and characterize the genotype of E. granulosus isolated from cattle using 12S rRNA and Cytochrome oxidase 1 (COX 1) genes. A total of 43 hydatid cyst samples were collected from 390 examined cattle samples derived from slaughterhouses. Among them, three cysts were fertile. Genomic DNA was extracted from germinal membrane and/or protoscoleces followed by PCR amplification of mitochondrial 12S rRNA and Cytochrome oxidase 1 gene fragments. The sequence data revealed existence of G1 (64.28%) and possible G3 (21.43%) genotypes for the first time in Bangladesh. The study indicates that common sheep strain G1 is the dominant subtype of E. granulosus in Chittagong region of Bangladesh. This will increase our understanding of the epidemiology of hydatidosis in the southern part of the country and will be useful to plan suitable control measures in the long run.
Keywords: Echinococcus granulosus, molecular characterization, cattle, Bangladesh.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10751212 A Comparative Analysis of Machine Learning Techniques for PM10 Forecasting in Vilnius
Authors: M. A. S. Fahim, J. Sužiedelytė Visockienė
Abstract:
With the growing concern over air pollution (AP), it is clear that this has gained more prominence than ever before. The level of consciousness has increased and a sense of knowledge now has to be forwarded as a duty by those enlightened enough to disseminate it to others. This realization often comes after an understanding of how poor air quality indices (AQI) damage human health. The study focuses on assessing air pollution prediction models specifically for Lithuania, addressing a substantial need for empirical research within the region. Concentrating on Vilnius, it specifically examines particulate matter concentrations 10 micrometers or less in diameter (PM10). Utilizing Gaussian Process Regression (GPR) and Regression Tree Ensemble, and Regression Tree methodologies, predictive forecasting models are validated and tested using hourly data from January 2020 to December 2022. The study explores the classification of AP data into anthropogenic and natural sources, the impact of AP on human health, and its connection to cardiovascular diseases. The study revealed varying levels of accuracy among the models, with GPR achieving the highest accuracy, indicated by an RMSE of 4.14 in validation and 3.89 in testing.
Keywords: Air pollution, anthropogenic and natural sources, machine learning, Gaussian process regression, tree ensemble, forecasting models, particulate matter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1171211 West African Islamic Civilization: Sokoto Caliphate and Science Education
Authors: Hassan Attahiru Gwandu
Abstract:
This study aims at surveying and analyzing the contribution of Sokoto scholars or Sokoto Caliphate in the development of science and technology in West Africa. Today, it is generally accepted that the 19th century Islamic revivalism in Hausaland was a very important revolution in the history of Hausa society and beyond. It is therefore, as a result of this movement or Jihad; the Hausaland (West Africa in general) witnessed several changes and transformations. These changes were in different sectors of life from politics, economy to social and religious aspect. It is these changes especially on religion that will be given considerations in this paper. The jihad resulted is the establishment of an Islamic state of Sokoto Caliphate, the revival Islam and development of learning and scholarship. During the existence of this Caliphate, a great deal of scholarship on Islamic laws were revived, written and documented by mostly, the three Jihad leaders; Usmanu Danfodiyo, his brother Abdullahi Fodiyo and his son Muhammad Bello. The trio had written more than one thousand books and made several verdicts on Islamic medicine. This study therefore, seeks to find out the contributions of these scholars or the Sokoto caliphate in the development of science in West Africa.
Keywords: Sokoto Caliphate, scholarship, science and technology, West Africa.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22851210 Effects of Capacitor Bank Defects on Harmonic Distortion and Park's Pattern Analysis in Induction Motors
Authors: G. Das, S. Das, P. Purkait, A. Dasgupta, M. Kumar
Abstract:
Properly sized capacitor banks are connected across induction motors for several reasons including power factor correction, reducing distortions, increasing capacity, etc. Total harmonic distortion (THD) and power factor (PF) are used in such cases to quantify the improvements obtained through connection of the external capacitor banks. On the other hand, one of the methods for assessing the motor internal condition is by the use of Park-s pattern analysis. In spite of taking adequate precautionary measures, the capacitor banks may sometimes malfunction. Such a minor fault in the capacitor bank is often not apparently discernible. This may however, give rise to substantial degradation of power factor correction performance and may also damage the supply profile. The case is more severe with the fact that the Park-s pattern gets distorted due to such external capacitor faults, and can give anomalous results about motor internal fault analyses. The aim of this paper is to present simulation and hardware laboratory test results to have an understanding of the anomalies in harmonic distortion and Park-s pattern analyses in induction motors due to capacitor bank defects.
Keywords: Capacitor bank, harmonic distortion, induction motor, Park's pattern, PSCAD simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 39361209 Analytical Modelling of Surface Roughness during Compacted Graphite Iron Milling Using Ceramic Inserts
Authors: S. Karabulut, A. Güllü, A. Güldas, R. Gürbüz
Abstract:
This study investigates the effects of the lead angle and chip thickness variation on surface roughness during the machining of compacted graphite iron using ceramic cutting tools under dry cutting conditions. Analytical models were developed for predicting the surface roughness values of the specimens after the face milling process. Experimental data was collected and imported to the artificial neural network model. A multilayer perceptron model was used with the back propagation algorithm employing the input parameters of lead angle, cutting speed and feed rate in connection with chip thickness. Furthermore, analysis of variance was employed to determine the effects of the cutting parameters on surface roughness. Artificial neural network and regression analysis were used to predict surface roughness. The values thus predicted were compared with the collected experimental data, and the corresponding percentage error was computed. Analysis results revealed that the lead angle is the dominant factor affecting surface roughness. Experimental results indicated an improvement in the surface roughness value with decreasing lead angle value from 88° to 45°.Keywords: CGI, milling, surface roughness, ANN, regression, modeling, analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19691208 Annoyance Caused by Air Pollution: A Comparative Study of Two Industrialized Regions
Authors: Milena M. Melo, Jane M. Santos, Severine Frere, Valderio A. Reisen, Neyval C. Reis Jr., Maria de Fátima S. Leite
Abstract:
Although there had been a many studies that shows the impact of air pollution on physical health, comparatively less was known of human behavioral responses and annoyance impacts. Annoyance caused by air pollution is a public health problem because it can be an ambient stressor causing stress and disease and can affect quality of life. The objective of this work is to evaluate the annoyance caused by air pollution in two different industrialized urban areas, Dunkirk (France) and Vitoria (Brazil). The populations of these cities often report feeling annoyed by dust. Surveys were conducted, and the collected data were analyzed using statistical analyses. The results show that sociodemographic variables, importance of air quality, perceived industrial risk, perceived air pollution and occurrence of health problems play important roles in the perceived annoyance. These results show the existence of a common problem in geographically distant areas and allow stakeholders to develop prevention strategies.
Keywords: Air pollution, annoyance, industrial risks, perception of pollution, public health, settled dust.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23141207 Critical Cylindrical Effect and Space-Time Exchange in Rotational Reference Frames of Special Relativity
Authors: Rui Yin, Ming Yin, Yang Wang
Abstract:
For a rotational reference frame of the theory of special relativity, the critical radius is defined as the distance from the axis to the point where the tangential velocity is equal to the speed of light, and the critical cylinder as the set of all points separated from the axis by this critical radius. Based on these terms, two relativistic effects of rotation are discovered: (i) the tangential velocity in the region of Outside Critical Cylinder (OCC) is not superluminal, due to the existence of space-time exchange; (ii) some of the physical quantities of the rotational body have an opposite mathematic sign at OCC versus those at Inside Critical Cylinder (ICC), which is termed as the Critical Cylindrical Effect (CCE). The laboratory experiments demonstrate that the repulsive force exerted on an anion by electrons will change to an attractive force by the electrons in precession while the anion is at OCC of the precession. 36 screenshots from four experimental videos are provided. Theoretical proofs for both space-time exchange and CCE are then presented. The CCEs of field force are also discussed.
Keywords: Critical radius, critical cylindrical effect, special relativity, space-time exchange.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 57