Search results for: large combustion plants.
1661 The Effect of Screw Parameters on Pullout Strength of Screw Fixation in Cervical Spine
Authors: S. Ritddech, P. Aroonjarattham, K. Aroonjarattham
Abstract:
The pullout strength had an effect on the stability of plate screw fixation when inserted in the cervical spine. Nine different titanium alloy bone screws were used to test the pullout strength through finite element analysis. The result showed that the Moss Miami I can bear the highest pullout force at 1,075 N, which causes the maximum von Mises stress at 858.87 MPa, a value over the yield strength of titanium. The bone screw should have large outer diameter, core diameter and proximal root radius to increase the pullout strength.
Keywords: Pullout strength, Screw parameter, Cervical spine, Finite element analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31561660 A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization
Authors: Hebberly Ahatlan
Abstract:
The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, Information Technology (IT) and Operational Technology (OT) convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.
Keywords: Digitalization, IT/OT convergence, semantic interoperability, TEIA alliance, VPP.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1201659 Grid Computing for the Bi-CGSTAB Applied to the Solution of the Modified Helmholtz Equation
Authors: E. N. Mathioudakis, E. P. Papadopoulou
Abstract:
The problem addressed herein is the efficient management of the Grid/Cluster intense computation involved, when the preconditioned Bi-CGSTAB Krylov method is employed for the iterative solution of the large and sparse linear system arising from the discretization of the Modified Helmholtz-Dirichlet problem by the Hermite Collocation method. Taking advantage of the Collocation ma-trix's red-black ordered structure we organize efficiently the whole computation and map it on a pipeline architecture with master-slave communication. Implementation, through MPI programming tools, is realized on a SUN V240 cluster, inter-connected through a 100Mbps and 1Gbps ethernet network,and its performance is presented by speedup measurements included.
Keywords: Collocation, Preconditioned Bi-CGSTAB, MPI, Grid and DSM Systems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16841658 A Survey on Metric of Software Cognitive Complexity for OO design
Authors: A.Aloysius, L. Arockiam
Abstract:
In modern era, the biggest challenge facing the software industry is the upcoming of new technologies. So, the software engineers are gearing up themselves to meet and manage change in large software system. Also they find it difficult to deal with software cognitive complexities. In the last few years many metrics were proposed to measure the cognitive complexity of software. This paper aims at a comprehensive survey of the metric of software cognitive complexity. Some classic and efficient software cognitive complexity metrics, such as Class Complexity (CC), Weighted Class Complexity (WCC), Extended Weighted Class Complexity (EWCC), Class Complexity due to Inheritance (CCI) and Average Complexity of a program due to Inheritance (ACI), are discussed and analyzed. The comparison and the relationship of these metrics of software complexity are also presented.Keywords: Software Metrics, Software Complexity, Cognitive Informatics, Cognitive Complexity, Software measurement
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30261657 Technical, Environmental, and Financial Assessment for the Optimal Sizing of a Run-of-River Small Hydropower Project: A Case Study in Colombia
Authors: David Calderón Villegas, Thomas Kalitzky
Abstract:
Run-of-river (RoR) hydropower projects represent a viable, clean, and cost-effective alternative to dam-based plants and provide decentralized power production. However, RoR schemes’ cost-effectiveness depends on the proper selection of site and design flow, which is a challenging task because it requires multivariate analysis. In this respect, this study presents the development of an investment decision support tool for assessing the optimal size of an RoR scheme considering the technical, environmental, and cost constraints. The net present value (NPV) from a project perspective is used as an objective function for supporting the investment decision. The tool has been tested by applying it to an actual RoR project recently proposed in Colombia. The obtained results show that the optimum point in financial terms does not match the flow that maximizes energy generation from exploiting the river's available flow. For the case study, the flow that maximizes energy corresponds to a value of 5.1 m3/s. In comparison, an amount of 2.1 m3/s maximizes the investors NPV. Finally, a sensitivity analysis is performed to determine the NPV as a function of the debt rate changes and the electricity prices and the CapEx. Even for the worst-case scenario, the optimal size represents a positive business case with an NPV of 2.2 USD million and an internal rate of return (IRR) 1.5 times higher than the discount rate.
Keywords: small hydropower, renewable energy, RoR schemes, optimal sizing, financial analysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6001656 Universal Method for Timetable Construction based on Evolutionary Approach
Authors: Maciej Norberciak
Abstract:
Timetabling problems are often hard and timeconsuming to solve. Most of the methods of solving them concern only one problem instance or class. This paper describes a universal method for solving large, highly constrained timetabling problems from different domains. The solution is based on evolutionary algorithm-s framework and operates on two levels – first-level evolutionary algorithm tries to find a solution basing on given set of operating parameters, second-level algorithm is used to establish those parameters. Tabu search is employed to speed up the solution finding process on first level. The method has been used to solve three different timetabling problems with promising results.Keywords: Evolutionary algorithms, tabu search, timetabling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18421655 Identification of Impact of Electromagnetic Fields at Low and High Frequency on Human Body
Authors: P. Sowa
Abstract:
The article reviews the current state of large-scale studies about the impact of electromagnetic field on natural environment. The scenario of investigations – simulation of natural conditions at the workplace, taking into consideration the influence both low and high frequency electromagnetic fields is shown.The biological effects of low and high frequency electromagnetic fields are below presented. Results of investigation with animals are shown. The norms and regulations concerning the levels of electromagnetic field intensity are reviewed.Keywords: Electromagnetic field and environment, biological effects of electric field on human body, simulation of natural condition at workplace
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17951654 Behavior Model Mapping and Transformation using Model-Driven Architecture
Authors: Mohammed Abdalla Osman Mukhtar, Azween Abdullah, Alan Giffin Downe
Abstract:
Model mapping and transformation are important processes in high level system abstractions, and form the cornerstone of model-driven architecture (MDA) techniques. Considerable research in this field has devoted attention to static system abstraction, despite the fact that most systems are dynamic with high frequency changes in behavior. In this paper we provide an overview of work that has been done with regard to behavior model mapping and transformation, based on: (1) the completeness of the platform independent model (PIM); (2) semantics of behavioral models; (3) languages supporting behavior model transformation processes; and (4) an evaluation of model composition to effect the best approach to describing large systems with high complexity.
Keywords: MDA; PIM, PSM, QVT, Model Transformation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17611653 3G WCDMA Mobile Network DoS Attack and Detection Technology
Authors: JooHyung Oh, Dongwan Kang, Sekwon Kim, ChaeTae Im
Abstract:
Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and malicious traffic technologies was not ready. So Malicious or potentially malicious traffic originating from mobile malware infected smart devices can cause serious problems to the 3G mobile networks, such as DoS and scanning attack in wired networks. This paper describes the DoS security threat in the 3G mobile network and proposes a detection technology.Keywords: 3G, WCDMA, DoS, Security Threat
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32671652 Using Neural Network for Execution of Programmed Pulse Width Modulation (PPWM) Method
Authors: M. Tarafdar Haque, A. Taheri
Abstract:
Application of neural networks in execution of programmed pulse width modulation (PPWM) of a voltage source inverter (VSI) is studied in this paper. Using the proposed method it is possible to cancel out the desired harmonics in output of VSI in addition to control the magnitude of fundamental harmonic, contineously. By checking the non-trained values and a performance index, the most appropriate neural network is proposed. It is shown that neural networks may solve the custom difficulties of practical utilization of PPWM such as large size of memory, complex digital circuits and controlling the magnitude of output voltage in a discrete manner.Keywords: Neural Network, Inverter, PPWM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16921651 A PWM Controller with Multiple-Access Table Look-up for DC-DC Buck Conversion
Authors: Steve Hung-Lung Tu, Chu-Tse Lee
Abstract:
A new power regulator controller with multiple-access PID compensator is proposed, which can achieve a minimum memory requirement for fully table look-up. The proposed regulator controller employs hysteresis comparators, an error process unit (EPU) for voltage regulation, a multiple-access PID compensator and a lowpower- consumption digital PWM (DPWM). Based on the multipleaccess mechanism, the proposed controller can alleviate the penalty of large amount of memory employed for fully table look-up based PID compensator in the applications of power regulation. The proposed controller has been validated with simulation results.Keywords: Multiple access, PID compensator, PWM, Buck conversion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14401650 Cissampelos capensis Rhizome Extract Induces Intracellular ROS Production, Capacitation and DNA Fragmentation in Human Spermatozoa
Authors: S. Shalaweh, P. Bouic, F. Weitz, R. Henkel
Abstract:
More than 3000 plants of notable phyto-therapeutic value grow in South Africa; these include Cissampelos capensis, commonly known in Afrikaans as dawidjie or dawidjiewortel. C. capensis is the most significant and popular medicinal plant used by the Khoisan as well as other rural groups in the Western region of South Africa. Its rhizomes are traditionally used to treat male fertility problems. Yet, no studies have investigated the effects of this plant or its extracts on human spermatozoa. Therefore, this study aimed at investigating the effects of C. capensis rhizome extract (CRE) fractions on ejaculated human spermatozoa in vitro. Spermatozoa from a total of 77 semen samples were washed with human tubular fluid medium supplemented with bovine serum albumin (HTF-BSA) and incubated for 2 hours with 20 μg/ml progesterone (P4) followed by incubation with different concentrations (0, 0.05, 0.5, 5, 50, 200 μg/ml) of fractionated CRE (F1=0% MeOH, F2=30% MeOH, F3=60% MeOH and F4=100% MeOH) for 1.5 hours at 37°C. A sample without addition of CRE fractions served as control. Samples were analyzed for sperm motility, reactive oxygen species (ROS), DNA-fragmentation, acrosome reaction and capacitation. Results showed that F1 resulted in significantly higher values for ROS, capacitation and hyper-activation compared to F2, F3, and F4 with P4-stimulated samples generally having higher values. No significant effect was found for the other parameters. In conclusion, alkaloids present in F1 of CRE appear to have triggered sperm intrinsic ROS production leading to sperm capacitation and acrosome reaction induced by P4.Keywords: Capacitation, acrosome reaction, Cissampelos capensis, DNA fragmentation, ROS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19191649 Compact Slotted Broadband Antenna for Wireless Applications
Authors: M. M. Sharma, Swati Gupta, Deepak Bhatnagar, R. P. Yadav
Abstract:
This paper presents the theoretical investigation of a slotted patch antenna. The main objective of proposed work is to obtain a large bandwidth antenna with reduced size. The antenna has a compact size of 21.1mm x 20.25mm x 8.5mm. Two designs with minor variation are studied which provide wide impedance bandwidths of 24.056% and 25.63% respectively with the use of parasitic elements when excited by a probe feed. The advantages of this configuration are its compact size and the wide range of frequencies covered. A parametric study is also conducted to investigate the characteristics of the antenna under different conditions. The measured return loss and radiation pattern indicate the suitability of this design for WLAN applications, namely, Wi- Max, 802.11a/b/g and ISM bands.Keywords: Inset feed, microstrip antenna, parasitic patch, shorting wall, slot, wi-max.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17391648 Buckling Analysis of a Five-walled CNT with Nonlocal Theory
Authors: Alireza Bozorgian, Navid Majdi Nasab, Abdolreza Memari
Abstract:
A continuum model is presented to study vdW interaction on buckling analysis of multi-walled walled carbon nanotube. In previous studies, only the vdW interaction between adjacent two layers was considered and the vdW interaction between the other two layers was neglected. The results show that the vdW interaction cofficients are dependent on the change of interlayer spacing and the radii of tubes. With increase of radii the vdW coefficients approach a constant value. The numerical results show that the effect of vdW interaction on the critical strain for a doublewalled CNT is negligible when the radius is large enough for the both the cases of before and after buckling.Keywords: Buckling, Carbon nanotube, van der Waals interaction, Multi-walled Carbon nanotube, Critical Strain, Prebuckling Pressure
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13791647 Finding More Non-Supersingular Elliptic Curves for Pairing-Based Cryptosystems
Authors: Pu Duan, Shi Cui, Choong Wah Chan
Abstract:
Finding suitable non-supersingular elliptic curves for pairing-based cryptosystems becomes an important issue for the modern public-key cryptography after the proposition of id-based encryption scheme and short signature scheme. In previous work different algorithms have been proposed for finding such elliptic curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3, 4, 5}. In this paper a new method is presented to find more non-supersingular elliptic curves for pairing-based cryptosystems with general embedding degree k and large values of cofactor h. In addition, some effective parameters of these non-supersingular elliptic curves are provided in this paper.Keywords: Family of group order, kth root of unity, non-supersingular elliptic curves polynomial field.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17341646 The Role of Railway Services in Sustainable Urban Development
Authors: Kazufumi Ueno
Abstract:
Kobe City is a metropolis including large suburbs, where housing communities have been developed for many years. People have been recently moving to the urban areas and the suburbs are losing their power to attract population. At the same time, many blocks of high-rise flats have being built near railway stations adjoining town centers, and are drawing people of all generations. Residents with different lifestyle preferences are making good use of town centers and city centers based on effective railway services to live together happily in a household as well as the same flats. Thus railway services can play an essential role in sustainable urban development.
Keywords: Compact town, railway services, suburbs, sustainable development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18291645 Evaluating the Innovation Ability of Manufacturing Resources
Authors: M.F. Zaeh, G. Reinhart, U. Lindemann, F. Karl, W. Biedermann
Abstract:
Due to today-s turbulent environment, manufacturing resources, particularly in assembly, must be reconfigured frequently. These reconfigurations are caused by various, partly cyclic, influencing factors. Hence, it is important to evaluate the innovation ability - the capability of resources to implement innovations quickly and efficiently without large expense - of manufacturing resources. For this purpose, a new methodology is presented in this article. Within the methodology, design structure matrices and graph theory are used. The results of the methodology include different indices to evaluate the innovation ability of the manufacturing resources. Due to the cyclicity of the influencing factors, the methodology can be used to synchronize the realization of adaptations.
Keywords: Changeability, Cycle Management, Design StructureMatrices, Graph Theory, Manufacturing Resource Planning, Production Management
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14861644 1/Sigma Term Weighting Scheme for Sentiment Analysis
Authors: Hanan Alshaher, Jinsheng Xu
Abstract:
Large amounts of data on the web can provide valuable information. For example, product reviews help business owners measure customer satisfaction. Sentiment analysis classifies texts into two polarities: positive and negative. This paper examines movie reviews and tweets using a new term weighting scheme, called one-over-sigma (1/sigma), on benchmark datasets for sentiment classification. The proposed method aims to improve the performance of sentiment classification. The results show that 1/sigma is more accurate than the popular term weighting schemes. In order to verify if the entropy reflects the discriminating power of terms, we report a comparison of entropy values for different term weighting schemes.
Keywords: Sentiment analysis, term weighting scheme, 1/sigma.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5351643 A New SIR-based Model for Influenza Epidemic
Authors: Kang-Hung Yang, Jin-Yuan Hsu
Abstract:
In recent years, several severe large-scale influenza outbreaks happened in many countries, such as SARS in 2005 or H1N1 in 2009. Those influenza Epidemics have greatly impacts not only on people-s life and health, but medical systems in different countries. Although severe diseases are more experienced, they are not fully controlled. Governments have different policies to control the spreads of diseases. However, those policies have both positive and negative social or economical influence on people and society. Therefore, it is necessary and essential to develop an appropriate model for evaluations of policies. Consequently, a proper measure can be implemented to confront the diseases. The main goal of this study is to develop a SIR-based model for the further evaluations of the candidate policies during the influenza outbreaks.Keywords: SIR, influenza, systems dynamic model, H1N1
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29141642 Solving 94-bit ECDLP with 70 Computers in Parallel
Authors: Shunsuke Miyoshi, Yasuyuki Nogami, Takuya Kusaka, Nariyoshi Yamai
Abstract:
Elliptic curve discrete logarithm problem(ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard’s rho method to evaluate the security of ECDLP on Barreto-Naehrig(BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers.Keywords: Pollard’s rho method, BN curve, Montgomery multiplication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18711641 Topological Properties of an Exponential Random Geometric Graph Process
Authors: Yilun Shang
Abstract:
In this paper we consider a one-dimensional random geometric graph process with the inter-nodal gaps evolving according to an exponential AR(1) process. The transition probability matrix and stationary distribution are derived for the Markov chains concerning connectivity and the number of components. We analyze the algorithm for hitting time regarding disconnectivity. In addition to dynamical properties, we also study topological properties for static snapshots. We obtain the degree distributions as well as asymptotic precise bounds and strong law of large numbers for connectivity threshold distance and the largest nearest neighbor distance amongst others. Both exact results and limit theorems are provided in this paper.Keywords: random geometric graph, autoregressive process, degree, connectivity, Markovian, wireless network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14581640 A Sliding Mesh Technique and Compressibility Correction Effects of Two-equation Turbulence Models for a Pintle-Perturbed Flow Analysis
Authors: J. Y. Heo, H. G. Sung
Abstract:
Numerical simulations have been performed for assessment of compressibility correction of two-equation turbulence models suitable for large scale separation flows perturbed by pintle strokes. In order to take into account pintle movement, a sliding mesh method was applied. The chamber pressure, mass flow rate, and thrust have been analyzed, and the response lag and sensitivity at the chamber and nozzle were estimated for a movable pintle. The nozzle performance for pintle reciprocating as its insertion and extraction processes, were analyzed to better understand the dynamic performance of the pintle nozzle.
Keywords: Pintle, sliding mesh, turbulent model, compressibility correction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22651639 Extension of the Client-Centric Approach under Small Buffer Space
Authors: Hsiang-Fu Yu, Yu-Chan Hsu, Chun Fang, Hao-Yun Yang
Abstract:
Periodic broadcast is a cost-effective solution for large-scale distribution of popular videos because this approach guarantees constant worst service latency, regardless of the number of video requests. An essential periodic broadcast method is the client-centric approach (CCA), which allows clients to use smaller receiving bandwidth to download broadcast data. An enhanced version, namely CCA++, was proposed to yield a shorter waiting time. This work further improves CCA++ in reducing client buffer requirements. The new scheme decreases the buffer requirements by as much as 52% when compared to CCA++. This study also provides an analytical evaluation to demonstrate the performance advantage, as compared with particular schemes.
Keywords: Periodic broadcast, client-centric approach, buffer space, multimedia communications.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17741638 Efficient Alias-free Level Crossing Sampling
Authors: Negar Riazifar, Nigel G. Stocks
Abstract:
This paper proposes strategies in level crossing (LC) sampling and reconstruction that provide alias-free high-fidelity signal reconstruction for speech signals without exponentially increasing sample number with increasing bit-depth. We introduce methods in LC sampling that reduce the sampling rate close to the Nyquist frequency even for large bit-depth. The results indicate that larger variation in the sampling intervals leads to alias-free sampling scheme; this is achieved by either reducing the bit-depth or adding a jitter to the system for high bit-depths. In conjunction with windowing, the signal is reconstructed from the LC samples using an efficient Toeplitz reconstruction algorithm.
Keywords: Alias-free, level crossing sampling, spectrum, trigonometric polynomial.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3161637 Stability of Interconnected Systems under Structural Perturbation: Decomposition-Aggregation Approach
Authors: M. Kidouche, H. Habbi, M. Zelmat
Abstract:
In this paper, the decomposition-aggregation method is used to carry out connective stability criteria for general linear composite system via aggregation. The large scale system is decomposed into a number of subsystems. By associating directed graphs with dynamic systems in an essential way, we define the relation between system structure and stability in the sense of Lyapunov. The stability criteria is then associated with the stability and system matrices of subsystems as well as those interconnected terms among subsystems using the concepts of vector differential inequalities and vector Lyapunov functions. Then, we show that the stability of each subsystem and stability of the aggregate model imply connective stability of the overall system. An example is reported, showing the efficiency of the proposed technique.Keywords: Composite system, Connective stability, Lyapunovfunctions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15051636 Mitigation of Flicker using STATCOM with Three-Level 12-pulse Voltage Source Inverter
Authors: Ali Z a'fari
Abstract:
Voltage flicker is a disturbance in electrical power systems. The reason for this disturbance is mainly the large nonlinear loads such as electric arc furnaces. Synchronous static compensator (STATCOM) is considered as a proper technique to mitigate the voltage flicker. Application of more suitable and precise power electronic converter leads to a more precise performance of the compensator. In this paper a three-level 12-pulse voltage source inverter (VSI) with a 12-terminal transformer connected to the ac system is studied and the obtained results are compared with the performance of a STATCOM using a simple two-level VSI and an optimal and more precise performance of the proposed scheme is achieved.Keywords: Flicker mitigation, STATCOM, Inverter, 12-pulse, 3- level
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19931635 Problems and Possible Solutions with the Development of a Computer Model of Quantum Theory
Authors: Hans H. Diel
Abstract:
A computer model of Quantum Theory (QT) has been developed by the author. Major goal of the computer model was support and demonstration of an as large as possible scope of QT. This includes simulations for the major QT (Gedanken-) experiments such as, for example, the famous double-slit experiment. Besides the anticipated difficulties with (1) transforming exacting mathematics into a computer program, two further types of problems showed up, namely (2) areas where QT provides a complete mathematical formalism, but when it comes to concrete applications the equations are not solvable at all, or only with extremely high effort; (3) QT rules which are formulated in natural language and which do not seem to be translatable to precise mathematical expressions, nor to a computer program. The paper lists problems in all three categories and describes also the possible solutions or circumventions developed for the computer model.Keywords: Computability, Foundation of Quantum Mechanics, Measurement Process, Modeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17021634 Antifungal Activity of Medicinal Plants Used Traditionally for the Treatment of Fungal Infections and Related Ailments in South Africa
Authors: T. C. Machaba, S. M. Mahlo
Abstract:
The current study investigates the antifungal properties of crude plant extracts from selected medicinal plant species. Eight plant species used by the traditional healers and local people to treat fungal infections were selected for further phytochemical analysis and biological assay. The selected plant species were extracted with solvent of various polarities such as acetone, methanol, ethanol, hexane, dichloromethane, ethyl acetate and water. Leaf, roots and bark extracts of Maerua juncea Pax, Albuca seineri (Engl & K. Krause) J.C Manning & Goldblatt, Senna italica Mill., Elephantorrhiza elephantina (Burch.) Skeels, Indigofera circinata Benth., Schinus molle L., Asparagus buchananii Bak., were screened for antifungal activity against three animal fungal pathogens (Candida albicans, Aspergillus fumigatus and Cryptococcus neoformans). All plant extracts were active against the tested microorganisms. Acetone, dichloromethane, hexane and ethanol extracts of Senna italica and Elephantorrhiza elephantine had excellent activity against Candida albicans and A. fumigatus with the lowest MIC value of 0.02 mg/ml. Bioautography assay was used to determine the number of antifungal compounds presence in the plant extracts. No active compounds were observed in plant extracts of Indigofera circinnata, Schinus molle and Pentarrhinum insipidum with good antifungal activity against C. albicans and A. fumigatus indicating possible synergism between separated metabolites.Keywords: Antifungal activity, minimum inhibitory concentration, bioautography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14181633 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al Amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: Computer viruses, virus detection, signature-based, behaviour-based, heuristic-based.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 45981632 Demand and Price Evolution Forecasting as Tools for Facilitating the RoadMapping Process of the Photonic Component Industry
Authors: T. Kamalakis, I. Neokosmidis, D. Varoutas, T. Sphicopoulos
Abstract:
The photonic component industry is a highly innovative industry with a large value chain. In order to ensure the growth of the industry much effort must be devoted to road mapping activities. In such activities demand and price evolution forecasting tools can prove quite useful in order to help in the roadmap refinement and update process. This paper attempts to provide useful guidelines in roadmapping of optical components and considers two models based on diffusion theory and the extended learning curve for demand and price evolution forecasting.Keywords: Roadmapping, Photonic Components, Forecasting, Diffusion Theory.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1379